• Welcome to Overclockers Forums! Join us to reply in threads, receive reduced ads, and to customize your site experience!

Programs keep crashing to desktop.

Overclockers is supported by our readers. When you click a link to make a purchase, we may earn a commission. Learn More.

Chris215

Member
Joined
Jul 8, 2005
I don't know what caused this, but when I'm going through my harddrives moving things or opening a program it would crash and go back to my desktop.

Code:
Microsoft (R) DrWtsn32
Copyright (C) 1985-2001 Microsoft Corp. All rights reserved.



Application exception occurred:
        App: C:\WINDOWS\explorer.exe (pid=3348)
        When: 4/9/2007 @ 13:43:20.578
        Exception number: c0000094 (divide by zero)

*----> System Information <----*
        Computer Name: CHRIS
        User Name: Chris
        Terminal Session Id: 0
        Number of Processors: 2
        Processor Type: x86 Family 15 Model 3 Stepping 4
        Windows Version: 5.1
        Current Build: 2600
        Service Pack: 2
        Current Type: Multiprocessor Free
        Registered Organization: 
        Registered Owner: Chris

*----> Task List <----*
   0 System Process
   4 System
 740 smss.exe
 804 csrss.exe
 836 winlogon.exe
 880 services.exe
 892 lsass.exe
1064 Ati2evxx.exe
1084 svchost.exe
1148 svchost.exe
1260 svchost.exe
1328 svchost.exe
1460 svchost.exe
1576 Ati2evxx.exe
1660 spoolsv.exe
 336 Error 0xD0000022
 348 SOUNDMAN.EXE
 400 ALCWZRD.EXE
 416 jusched.exe
 440 ctfmon.exe
 600 Error 0xD0000022
 616 DkService.exe
 724 svchost.exe
2084 alg.exe
2640 svchost.exe
 228 Error 0xD0000022
2412 winamp.exe
3348 explorer.exe
3536 drwtsn32.exe

*----> Module List <----*
(0000000000400000 - 0000000000409000: C:\WINDOWS\system32\Normaliz.dll
(0000000001000000 - 00000000010ff000: C:\WINDOWS\explorer.exe
(00000000015f0000 - 00000000018b6000: C:\WINDOWS\system32\msi.dll
(00000000018c0000 - 0000000001e8a000: C:\WINDOWS\system32\ieframe.dll
(00000000028d0000 - 00000000028dd000: C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
(0000000002900000 - 0000000002912000: C:\WINDOWS\system32\browselc.dll
(0000000002980000 - 0000000002ea7000: C:\Program Files\Siber Systems\AI RoboForm\roboform.dll
(0000000002fc0000 - 0000000003048000: C:\WINDOWS\system32\shdoclc.dll
(0000000003290000 - 00000000032ac000: C:\Program Files\Adobe\Acrobat 7.0\ActiveX\PDFShell.dll
(0000000003400000 - 000000000342d000: C:\Program Files\WinRAR\rarext.dll
(0000000003430000 - 000000000343c000: C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\ShellEx.dll
(0000000003c60000 - 0000000003d54000: C:\Program Files\K-Lite Codec Pack\filters\vsfilter.dll
(0000000003dd0000 - 0000000003e39000: C:\Program Files\K-Lite Codec Pack\filters\FLVSplitter.ax
(0000000003e70000 - 0000000003eac000: C:\Program Files\Common Files\Ahead\DSFilter\NeMP4Splitter.ax
(00000000085b0000 - 00000000085c5000: C:\WINDOWS\system32\wmpshell.dll
(0000000010000000 - 0000000010025000: C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\scrchpg.dll
(0000000020000000 - 00000000202c5000: C:\WINDOWS\system32\xpsp2res.dll
(000000004ec50000 - 000000004edf3000: C:\WINDOWS\WinSxS\x86_Microsoft.Windows.GdiPlus_6595b64144ccf1df_1.0.2600.2180_x-ww_522f9f82\gdiplus.dll
(000000005ad70000 - 000000005ada8000: C:\WINDOWS\system32\UxTheme.dll
(000000005b860000 - 000000005b8b4000: C:\WINDOWS\system32\NETAPI32.dll
(000000005ba60000 - 000000005bad1000: C:\WINDOWS\system32\themeui.dll
(000000005cad0000 - 000000005caf7000: C:\WINDOWS\system32\shmedia.dll
(000000005cb70000 - 000000005cb96000: C:\WINDOWS\system32\ShimEng.dll
(000000005d090000 - 000000005d12a000: C:\WINDOWS\system32\comctl32.dll
(000000005edd0000 - 000000005ede7000: C:\WINDOWS\system32\OLEPRO32.DLL
(0000000060ca0000 - 0000000060d2c000: C:\WINDOWS\system32\qedit.dll
(0000000061410000 - 0000000061534000: C:\WINDOWS\system32\urlmon.dll
(000000006c1b0000 - 000000006c1fd000: C:\WINDOWS\system32\DUSER.dll
(000000006c230000 - 000000006c24e000: C:\WINDOWS\system32\dsuiext.dll
(000000006c260000 - 000000006c29d000: C:\WINDOWS\system32\dsquery.dll
(000000006e850000 - 000000006e895000: C:\WINDOWS\system32\iertutil.dll
(000000006f880000 - 000000006fa4a000: C:\WINDOWS\AppPatch\AcGenral.DLL
(0000000071aa0000 - 0000000071aa8000: C:\WINDOWS\system32\WS2HELP.dll
(0000000071ab0000 - 0000000071ac7000: C:\WINDOWS\system32\WS2_32.dll
(0000000071b20000 - 0000000071b32000: C:\WINDOWS\system32\MPR.dll
(0000000071bf0000 - 0000000071c03000: C:\WINDOWS\System32\SAMLIB.dll
(0000000071c10000 - 0000000071c1e000: C:\WINDOWS\System32\ntlanman.dll
(0000000071c80000 - 0000000071c87000: C:\WINDOWS\System32\NETRAP.dll
(0000000071c90000 - 0000000071cd0000: C:\WINDOWS\System32\NETUI1.dll
(0000000071cd0000 - 0000000071ce7000: C:\WINDOWS\System32\NETUI0.dll
(0000000071d40000 - 0000000071d5c000: C:\WINDOWS\system32\actxprxy.dll
(0000000072d10000 - 0000000072d18000: C:\WINDOWS\system32\msacm32.drv
(0000000072d20000 - 0000000072d29000: C:\WINDOWS\system32\wdmaud.drv
(0000000073000000 - 0000000073026000: C:\WINDOWS\system32\WINSPOOL.DRV
(0000000073b30000 - 0000000073b45000: C:\WINDOWS\system32\mscms.dll
(0000000073b50000 - 0000000073b67000: C:\WINDOWS\system32\AVIFIL32.dll
(0000000073ba0000 - 0000000073bb3000: C:\WINDOWS\system32\sti.dll
(0000000074720000 - 000000007476b000: C:\WINDOWS\system32\MSCTF.dll
(0000000074810000 - 000000007497c000: C:\WINDOWS\system32\quartz.dll
(0000000074ad0000 - 0000000074ad8000: C:\WINDOWS\system32\POWRPROF.dll
(0000000074ae0000 - 0000000074ae7000: C:\WINDOWS\system32\CFGMGR32.dll
(0000000074af0000 - 0000000074afa000: C:\WINDOWS\system32\BatMeter.dll
(0000000074b30000 - 0000000074b6c000: C:\WINDOWS\system32\webcheck.dll
(00000000754d0000 - 0000000075550000: C:\WINDOWS\system32\CRYPTUI.dll
(00000000755c0000 - 00000000755ee000: C:\WINDOWS\system32\msctfime.ime
(0000000075a70000 - 0000000075a91000: C:\WINDOWS\system32\MSVFW32.dll
(0000000075cf0000 - 0000000075d81000: C:\WINDOWS\system32\MLANG.dll
(0000000075e90000 - 0000000075f40000: C:\WINDOWS\system32\SXS.DLL
(0000000075f40000 - 0000000075f51000: C:\WINDOWS\system32\devenum.dll
(0000000075f60000 - 0000000075f67000: C:\WINDOWS\System32\drprov.dll
(0000000075f70000 - 0000000075f79000: C:\WINDOWS\System32\davclnt.dll
(0000000075f80000 - 000000007607d000: C:\WINDOWS\system32\BROWSEUI.dll
(0000000076280000 - 00000000762a1000: C:\WINDOWS\system32\stobject.dll
(0000000076360000 - 0000000076370000: C:\WINDOWS\system32\WINSTA.dll
(0000000076380000 - 0000000076385000: C:\WINDOWS\system32\MSIMG32.dll
(0000000076390000 - 00000000763ad000: C:\WINDOWS\system32\IMM32.DLL
(00000000763b0000 - 00000000763f9000: C:\WINDOWS\system32\comdlg32.dll
(0000000076400000 - 00000000765a6000: C:\WINDOWS\system32\NETSHELL.dll
(0000000076600000 - 000000007661d000: C:\WINDOWS\System32\CSCDLL.dll
(00000000767a0000 - 00000000767b3000: C:\WINDOWS\system32\NTDSAPI.dll
(0000000076980000 - 0000000076988000: C:\WINDOWS\system32\LINKINFO.dll
(0000000076990000 - 00000000769b5000: C:\WINDOWS\system32\ntshrui.dll
(00000000769c0000 - 0000000076a73000: C:\WINDOWS\system32\USERENV.dll
(0000000076b20000 - 0000000076b31000: C:\WINDOWS\system32\ATL.DLL
(0000000076b40000 - 0000000076b6d000: C:\WINDOWS\system32\WINMM.dll
(0000000076bf0000 - 0000000076bfb000: C:\WINDOWS\system32\PSAPI.DLL
(0000000076c00000 - 0000000076c2e000: C:\WINDOWS\system32\credui.dll
(0000000076c30000 - 0000000076c5e000: C:\WINDOWS\system32\WINTRUST.dll
(0000000076c90000 - 0000000076cb8000: C:\WINDOWS\system32\IMAGEHLP.dll
(0000000076d60000 - 0000000076d79000: C:\WINDOWS\system32\iphlpapi.dll
(0000000076e10000 - 0000000076e35000: C:\WINDOWS\system32\adsldpc.dll
(0000000076e80000 - 0000000076e8e000: C:\WINDOWS\system32\rtutils.dll
(0000000076f20000 - 0000000076f47000: C:\WINDOWS\system32\DNSAPI.dll
(0000000076f50000 - 0000000076f58000: C:\WINDOWS\system32\WTSAPI32.dll
(0000000076f60000 - 0000000076f8c000: C:\WINDOWS\system32\WLDAP32.dll
(0000000076fd0000 - 000000007704f000: C:\WINDOWS\system32\CLBCATQ.DLL
(0000000077050000 - 0000000077115000: C:\WINDOWS\system32\COMRes.dll
(0000000077120000 - 00000000771ac000: C:\WINDOWS\system32\OLEAUT32.dll
(00000000771b0000 - 000000007727f000: C:\WINDOWS\system32\WININET.dll
(00000000773d0000 - 00000000774d3000: C:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.2600.2982_x-ww_ac3f9c03\comctl32.dll
(00000000774e0000 - 000000007761d000: C:\WINDOWS\system32\ole32.dll
(0000000077760000 - 00000000778d0000: C:\WINDOWS\system32\SHDOCVW.dll
(0000000077920000 - 0000000077a13000: C:\WINDOWS\system32\SETUPAPI.dll
(0000000077a20000 - 0000000077a74000: C:\WINDOWS\System32\cscui.dll
(0000000077a80000 - 0000000077b14000: C:\WINDOWS\system32\CRYPT32.dll
(0000000077b20000 - 0000000077b32000: C:\WINDOWS\system32\MSASN1.dll
(0000000077b40000 - 0000000077b62000: C:\WINDOWS\system32\appHelp.dll
(0000000077bd0000 - 0000000077bd7000: C:\WINDOWS\system32\midimap.dll
(0000000077be0000 - 0000000077bf5000: C:\WINDOWS\system32\MSACM32.dll
(0000000077c00000 - 0000000077c08000: C:\WINDOWS\system32\VERSION.dll
(0000000077c10000 - 0000000077c68000: C:\WINDOWS\system32\msvcrt.dll
(0000000077cc0000 - 0000000077cf2000: C:\WINDOWS\system32\ACTIVEDS.dll
(0000000077dd0000 - 0000000077e6b000: C:\WINDOWS\system32\ADVAPI32.dll
(0000000077e70000 - 0000000077f01000: C:\WINDOWS\system32\RPCRT4.dll
(0000000077f10000 - 0000000077f57000: C:\WINDOWS\system32\GDI32.dll
(0000000077f60000 - 0000000077fd6000: C:\WINDOWS\system32\SHLWAPI.dll
(0000000077fe0000 - 0000000077ff1000: C:\WINDOWS\system32\Secur32.dll
(0000000078130000 - 00000000781cb000: C:\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.42_x-ww_0de06acd\MSVCR80.dll
(000000007c340000 - 000000007c396000: C:\WINDOWS\system32\MSVCR71.dll
(000000007c420000 - 000000007c4a7000: C:\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.42_x-ww_0de06acd\MSVCP80.dll
(000000007c800000 - 000000007c8f4000: C:\WINDOWS\system32\kernel32.dll
(000000007c900000 - 000000007c9b0000: C:\WINDOWS\system32\ntdll.dll
(000000007c9c0000 - 000000007d1d5000: C:\WINDOWS\system32\SHELL32.dll
(000000007df70000 - 000000007df92000: C:\WINDOWS\system32\oledlg.dll
(000000007e410000 - 000000007e4a0000: C:\WINDOWS\system32\USER32.dll

*----> State Dump for Thread Id 0xd20 <----*

eax=0007f984 ebx=00000003 ecx=027a74d0 edx=00000000 esi=00109be0 edi=00000000
eip=7c90eb94 esp=0007fef0 ebp=0007ff08 iopl=0         nv up ei pl nz na pe nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000202

*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\ntdll.dll - 
function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\SHELL32.dll - 
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Module load completed but symbols could not be loaded for C:\WINDOWS\explorer.exe
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\kernel32.dll - 
ChildEBP RetAddr  Args to Child              
0007ff08 7ca0be9c 00000000 0007ff5c 01016e95 ntdll!KiFastSystemCallRet
0007ff14 01016e95 00109be0 7ffdf000 0007ffc0 SHELL32!Ordinal201+0x28
0007ff5c 0101e2b6 00000000 00000000 0002075a explorer+0x16e95
0007ffc0 7c816fd7 00000000 00000000 7ffdf000 explorer+0x1e2b6
0007fff0 00000000 0101e24e 00000000 78746341 kernel32!RegisterWaitForInputIdle+0x49

*----> Raw Stack Dump <----*
000000000007fef0  18 94 41 7e 02 3c a2 7c - 9c 92 80 7c e0 9b 10 00  ..A~.<.|...|....
000000000007ff00  e0 9b 10 00 14 ff 07 00 - 14 ff 07 00 9c be a0 7c  ...............|
000000000007ff10  00 00 00 00 5c ff 07 00 - 95 6e 01 01 e0 9b 10 00  ....\....n......
000000000007ff20  00 f0 fd 7f c0 ff 07 00 - 00 00 00 00 24 fd 07 00  ............$...
000000000007ff30  50 ff 07 00 e0 ff 07 00 - 27 e0 90 7c 65 ac 80 7c  P.......'..|e..|
000000000007ff40  ff ff ff ff 0c 00 00 00 - 00 00 00 00 ed b2 08 00  ................
000000000007ff50  c4 00 00 00 01 00 00 00 - e0 9b 10 00 c0 ff 07 00  ................
000000000007ff60  b6 e2 01 01 00 00 00 00 - 00 00 00 00 5a 07 02 00  ............Z...
000000000007ff70  05 00 00 00 00 00 00 00 - 00 00 00 00 44 00 00 00  ............D...
000000000007ff80  ac 07 02 00 8c 07 02 00 - 5c 07 02 00 00 00 00 00  ........\.......
000000000007ff90  00 00 00 00 00 00 00 00 - 00 00 00 00 2e 00 00 00  ................
000000000007ffa0  00 00 00 00 3a ef 06 00 - 01 00 00 00 05 00 00 00  ....:...........
000000000007ffb0  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000007ffc0  f0 ff 07 00 d7 6f 81 7c - 00 00 00 00 00 00 00 00  .....o.|........
000000000007ffd0  00 f0 fd 7f fa 02 55 80 - c8 ff 07 00 e0 92 e0 84  ......U.........
000000000007ffe0  ff ff ff ff a8 9a 83 7c - e0 6f 81 7c 00 00 00 00  .......|.o.|....
000000000007fff0  00 00 00 00 00 00 00 00 - 4e e2 01 01 00 00 00 00  ........N.......
0000000000080000  41 63 74 78 20 00 00 00 - 01 00 00 00 98 24 00 00  Actx ........$..
0000000000080010  c4 00 00 00 00 00 00 00 - 20 00 00 00 00 00 00 00  ........ .......
0000000000080020  14 00 00 00 01 00 00 00 - 06 00 00 00 34 00 00 00  ............4...

*----> State Dump for Thread Id 0xd18 <----*

eax=77df9981 ebx=00a9fed0 ecx=00000006 edx=00000000 esi=00000000 edi=7ffdf000
eip=7c90eb94 esp=00a9fea8 ebp=00a9ff44 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\ADVAPI32.dll - 
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
00a9ff44 77df9b26 00000002 00a9ff6c 00000000 ntdll!KiFastSystemCallRet
00a9ffb4 7c80b683 00000000 7c9140bb 00000000 ADVAPI32!RegDeleteKeyW+0x2a2
00a9ffec 00000000 77df9981 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000000a9fea8  ab e9 90 7c e2 94 80 7c - 02 00 00 00 d0 fe a9 00  ...|...|........
0000000000a9feb8  01 00 00 00 01 00 00 00 - 04 ff a9 00 e0 2e 96 00  ................
0000000000a9fec8  40 65 e4 77 00 10 00 00 - 6c 00 00 00 78 00 00 00  @e.w....l...x...
0000000000a9fed8  c0 fe a9 00 20 70 0f 85 - dc ff a9 00 a8 9a 83 7c  .... p.........|
0000000000a9fee8  b0 0a 81 7c 00 10 00 00 - 14 00 00 00 01 00 00 00  ...|............
0000000000a9fef8  18 c7 09 00 00 00 00 00 - 00 00 00 00 00 a2 2f 4d  ............../M
0000000000a9ff08  ff ff ff ff 00 10 00 00 - 00 f0 fd 7f 00 d0 fd 7f  ................
0000000000a9ff18  dc ff a9 00 04 ff a9 00 - d0 fe a9 00 06 00 00 00  ................
0000000000a9ff28  02 00 00 00 c4 fe a9 00 - 06 00 00 00 dc ff a9 00  ................
0000000000a9ff38  a8 9a 83 7c d8 95 80 7c - 00 00 00 00 b4 ff a9 00  ...|...|........
0000000000a9ff48  26 9b df 77 02 00 00 00 - 6c ff a9 00 00 00 00 00  &..w....l.......
0000000000a9ff58  e0 93 04 00 01 00 00 00 - bb 40 91 7c 00 00 00 00  .........@.|....
0000000000a9ff68  00 00 00 00 6c 00 00 00 - 78 00 00 00 00 10 00 00  ....l...x.......
0000000000a9ff78  e0 2e 96 00 00 00 00 00 - 00 10 00 00 e8 3e 96 00  .............>..
0000000000a9ff88  a0 66 e4 77 38 00 00 00 - 80 66 e4 77 00 10 00 00  .f.w8....f.w....
0000000000a9ff98  00 00 00 00 a0 66 e4 77 - e0 2e 96 00 80 66 e4 77  .....f.w.....f.w
0000000000a9ffa8  e5 03 00 00 00 10 00 00 - e8 3e 96 00 ec ff a9 00  .........>......
0000000000a9ffb8  83 b6 80 7c 00 00 00 00 - bb 40 91 7c 00 00 00 00  ...|.....@.|....
0000000000a9ffc8  00 00 00 00 00 d0 fd 7f - 00 c6 fb 86 c0 ff a9 00  ................
0000000000a9ffd8  c8 a6 1b 85 ff ff ff ff - a8 9a 83 7c 90 b6 80 7c  ...........|...|

*----> State Dump for Thread Id 0xd1c <----*

eax=0113ff54 ebx=00000000 ecx=000b96c0 edx=7c90eb94 esi=000b96c0 edi=00000100
eip=7c90eb94 esp=0113fe1c ebp=0113ff80 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\RPCRT4.dll - 
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
0113ff80 77e76c22 0113ffa8 77e76a3b 000b96c0 ntdll!KiFastSystemCallRet
0113ff88 77e76a3b 000b96c0 00000000 0007f88c RPCRT4!I_RpcBCacheFree+0x5ea
0113ffa8 77e76c0a 000b9578 0113ffec 7c80b683 RPCRT4!I_RpcBCacheFree+0x403
0113ffb4 7c80b683 000c89e8 00000000 0007f88c RPCRT4!I_RpcBCacheFree+0x5d2
0113ffec 00000000 77e76bf0 000c89e8 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
000000000113fe1c  99 e3 90 7c 03 67 e7 77 - dc 01 00 00 70 ff 13 01  ...|.g.w....p...
000000000113fe2c  00 00 00 00 50 48 7a 02 - 54 ff 13 01 d0 0b e0 81  ....PHz.T.......
000000000113fe3c  00 00 00 00 9c 36 50 c0 - 40 9e 12 85 6c 09 00 00  [email protected]...
000000000113fe4c  60 eb 21 ac f6 0f 4f 80 - 40 f5 df ff 02 ff 1f c0  `.!...O.@.......
000000000113fe5c  0e 82 4e 80 00 f0 fd 7f - 8c eb 21 ac 7c ff 1f c0  ..N.......!.|...
000000000113fe6c  6c eb 21 ac c3 a9 4e 80 - 00 e0 fd 7f 01 00 00 00  l.!...N.........
000000000113fe7c  00 00 00 00 78 ff 1f c0 - 00 00 00 00 fc 07 30 c0  ....x.........0.
000000000113fe8c  24 ec 21 ac 3a 11 4f 80 - 8c eb 21 ac 00 00 00 00  $.!.:.O...!.....
000000000113fe9c  00 00 00 00 43 fd 6f 80 - 28 ec 21 ac 27 f4 6f 80  ....C.o.(.!.'.o.
000000000113feac  00 0d db ba 00 00 00 00 - 27 f4 6f 80 fb 80 8c ae  ........'.o.....
000000000113febc  00 00 00 00 90 0e 56 80 - 82 02 00 00 00 94 8c ae  ......V.........
000000000113fecc  20 1d fc 86 1c 0d 00 00 - 00 00 00 00 82 02 00 00   ...............
000000000113fedc  20 a0 fc 85 00 00 00 00 - 00 00 00 00 00 00 00 00   ...............
000000000113feec  00 f0 df ff ff ff ff ff - 40 f5 96 f7 00 00 00 00  ........@.......
000000000113fefc  10 f4 6f 80 bc a1 fc 85 - 28 ec 21 ac 00 00 00 00  ..o.....(.!.....
000000000113ff0c  27 f4 6f 80 08 00 00 00 - 46 02 00 00 e8 1b 4e 80  '.o.....F.....N.
000000000113ff1c  90 a0 fc 85 20 a0 fc 85 - 1e 1c 4e 80 8c a1 fc 85  .... .....N.....
000000000113ff2c  20 a0 fc 85 80 ff 13 01 - 99 66 e7 77 4c ff 13 01   ........f.wL...
000000000113ff3c  a9 66 e7 77 ed 10 90 7c - 08 82 0c 00 e8 89 0c 00  .f.w...|........
000000000113ff4c  00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff  ../M.....]......

*----> State Dump for Thread Id 0xd24 <----*

eax=774fe429 ebx=00007530 ecx=00010000 edx=00000000 esi=00000000 edi=011aff50
eip=7c90eb94 esp=011aff20 ebp=011aff78 iopl=0         nv up ei pl nz na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000206

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\ole32.dll - 
ChildEBP RetAddr  Args to Child              
011aff78 7c802451 0000ea60 00000000 011affb4 ntdll!KiFastSystemCallRet
011aff88 774fe31d 0000ea60 000cb178 774fe3dc kernel32!Sleep+0xf
011affb4 7c80b683 000cb178 00090498 7ffdf000 ole32!StringFromGUID2+0x51b
011affec 00000000 774fe429 000cb178 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
00000000011aff20  5c d8 90 7c ed 23 80 7c - 00 00 00 00 50 ff 1a 01  \..|.#.|....P...
00000000011aff30  40 25 80 7c f8 6d 60 77 - 30 75 00 00 14 00 00 00  @%.|.m`w0u......
00000000011aff40  01 00 00 00 00 00 00 00 - 00 00 00 00 10 00 00 00  ................
00000000011aff50  00 ba 3c dc ff ff ff ff - 20 00 00 00 50 ff 1a 01  ..<..... ...P...
00000000011aff60  30 ff 1a 01 00 20 1a 01 - dc ff 1a 01 a8 9a 83 7c  0.... .........|
00000000011aff70  58 24 80 7c 00 00 00 00 - 88 ff 1a 01 51 24 80 7c  X$.|........Q$.|
00000000011aff80  60 ea 00 00 00 00 00 00 - b4 ff 1a 01 1d e3 4f 77  `.............Ow
00000000011aff90  60 ea 00 00 78 b1 0c 00 - dc e3 4f 77 00 00 00 00  `...x.....Ow....
00000000011affa0  98 04 09 00 78 b1 0c 00 - 00 00 4e 77 44 e4 4f 77  ....x.....NwD.Ow
00000000011affb0  00 f0 fd 7f ec ff 1a 01 - 83 b6 80 7c 78 b1 0c 00  ...........|x...
00000000011affc0  98 04 09 00 00 f0 fd 7f - 78 b1 0c 00 00 b0 fd 7f  ........x.......
00000000011affd0  00 e6 fb 86 c0 ff 1a 01 - a0 ea 67 86 ff ff ff ff  ..........g.....
00000000011affe0  a8 9a 83 7c 90 b6 80 7c - 00 00 00 00 00 00 00 00  ...|...|........
00000000011afff0  00 00 00 00 29 e4 4f 77 - 78 b1 0c 00 00 00 00 00  ....).Owx.......
00000000011b0000  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00000000011b0010  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00000000011b0020  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00000000011b0030  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00000000011b0040  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00000000011b0050  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................

*----> State Dump for Thread Id 0xd28 <----*

eax=00000002 ebx=7e41b8ba ecx=00000002 edx=7c90eb94 esi=010460d8 edi=00000000
eip=7c90eb94 esp=011eff14 ebp=011eff44 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\SHLWAPI.dll - 
ChildEBP RetAddr  Args to Child              
011eff44 01011e8b 00000000 011effb4 77f76f02 ntdll!KiFastSystemCallRet
011eff50 77f76f02 010460d8 0000005c 0007fc04 explorer+0x11e8b
011effb4 7c80b683 00000000 0000005c 0007fc04 SHLWAPI!Ordinal505+0x3e9
011effec 00000000 77f76e93 0007fdbc 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
00000000011eff14  18 94 41 7e 40 1a 00 01 - 00 00 00 00 d8 60 04 01  ..A~@........`..
00000000011eff24  00 00 00 00 a0 00 06 00 - 13 01 00 00 09 00 00 00  ................
00000000011eff34  00 00 00 00 3f 18 09 00 - bf 02 00 00 9f 01 00 00  ....?...........
00000000011eff44  50 ff 1e 01 8b 1e 01 01 - 00 00 00 00 b4 ff 1e 01  P...............
00000000011eff54  02 6f f7 77 d8 60 04 01 - 5c 00 00 00 04 fc 07 00  .o.w.`..\.......
00000000011eff64  bc fd 07 00 62 1e 01 01 - b1 79 01 01 fc 01 00 00  ....b....y......
00000000011eff74  d8 60 04 01 08 00 00 00 - 00 00 00 00 00 00 00 00  .`..............
00000000011eff84  00 00 00 00 00 00 00 00 - 00 00 00 00 80 0c 0a 86  ................
00000000011eff94  8c 9b 4f 80 00 00 00 00 - 00 00 00 00 00 00 00 00  ..O.............
00000000011effa4  94 9b 4f 80 00 00 00 00 - f2 fe 6f 80 dc e2 90 7c  ..O.......o....|
00000000011effb4  ec ff 1e 01 83 b6 80 7c - 00 00 00 00 5c 00 00 00  .......|....\...
00000000011effc4  04 fc 07 00 bc fd 07 00 - 00 a0 fd 7f 00 c6 fb 86  ................
00000000011effd4  c0 ff 1e 01 30 c7 ec 85 - ff ff ff ff a8 9a 83 7c  ....0..........|
00000000011effe4  90 b6 80 7c 00 00 00 00 - 00 00 00 00 00 00 00 00  ...|............
00000000011efff4  93 6e f7 77 bc fd 07 00 - 00 00 00 00 00 00 00 00  .n.w............
00000000011f0004  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00000000011f0014  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00000000011f0024  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00000000011f0034  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00000000011f0044  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................

*----> State Dump for Thread Id 0xdd4 <----*

eax=000000c0 ebx=00000000 ecx=77dd6a51 edx=77dd6a18 esi=ffffffff edi=7c90fb78
eip=7c90eb94 esp=0122ff9c ebp=0122ffb4 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
0122ffb4 7c80b683 00000000 7c90fb78 ffffffff ntdll!KiFastSystemCallRet
0122ffec 00000000 7c92798d 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
000000000122ff9c  5c d8 90 7c d4 79 92 7c - 01 00 00 00 ac ff 22 01  \..|.y.|......".
000000000122ffac  00 00 00 00 00 00 00 80 - ec ff 22 01 83 b6 80 7c  .........."....|
000000000122ffbc  00 00 00 00 78 fb 90 7c - ff ff ff ff 00 00 00 00  ....x..|........
000000000122ffcc  00 90 fd 7f 00 c6 fb 86 - c0 ff 22 01 a0 5f 15 86  ..........".._..
000000000122ffdc  ff ff ff ff a8 9a 83 7c - 90 b6 80 7c 00 00 00 00  .......|...|....
000000000122ffec  00 00 00 00 00 00 00 00 - 8d 79 92 7c 00 00 00 00  .........y.|....
000000000122fffc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000123000c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000123001c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000123002c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000123003c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000123004c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000123005c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000123006c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000123007c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000123008c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000123009c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00000000012300ac  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00000000012300bc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00000000012300cc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................

*----> State Dump for Thread Id 0xdcc <----*

eax=0000f7d0 ebx=00000000 ecx=0000990d edx=00000014 esi=7c97c380 edi=7c97c3a0
eip=7c90eb94 esp=0126ff70 ebp=0126ffb4 iopl=0         nv up ei ng nz na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000286

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
0126ffb4 7c80b683 00000000 011efce4 011efce8 ntdll!KiFastSystemCallRet
0126ffec 00000000 7c910760 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
000000000126ff70  1b e3 90 7c 9d 07 91 7c - 24 02 00 00 ac ff 26 01  ...|...|$.....&.
000000000126ff80  b0 ff 26 01 98 ff 26 01 - a0 ff 26 01 e4 fc 1e 01  ..&...&...&.....
000000000126ff90  e8 fc 1e 01 00 00 00 00 - 00 00 00 00 40 a1 78 02  [email protected].
000000000126ffa0  00 7c 28 e8 ff ff ff ff - a0 3c c3 ab 69 75 92 7c  .|(......<..iu.|
000000000126ffb0  b8 3a 78 02 ec ff 26 01 - 83 b6 80 7c 00 00 00 00  .:x...&....|....
000000000126ffc0  e4 fc 1e 01 e8 fc 1e 01 - 00 00 00 00 00 80 fd 7f  ................
000000000126ffd0  00 c6 fb 86 c0 ff 26 01 - a0 ea 67 86 ff ff ff ff  ......&...g.....
000000000126ffe0  a8 9a 83 7c 90 b6 80 7c - 00 00 00 00 00 00 00 00  ...|...|........
000000000126fff0  00 00 00 00 60 07 91 7c - 00 00 00 00 00 00 00 00  ....`..|........
0000000001270000  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001270010  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001270020  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001270030  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001270040  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001270050  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001270060  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001270070  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001270080  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001270090  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00000000012700a0  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................

*----> State Dump for Thread Id 0xd2c <----*

eax=000000c0 ebx=00000000 ecx=011efb00 edx=00000000 esi=00000000 edi=00000001
eip=7c90eb94 esp=012afcec ebp=012affb4 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
012affb4 7c80b683 00000000 00000020 011efce4 ntdll!KiFastSystemCallRet
012affec 00000000 7c929fae 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
00000000012afcec  ab e9 90 7c d5 a0 92 7c - 03 00 00 00 30 fd 2a 01  ...|...|....0.*.
00000000012afcfc  01 00 00 00 01 00 00 00 - 00 00 00 00 20 00 00 00  ............ ...
00000000012afd0c  e4 fc 1e 01 00 00 00 00 - 08 e5 97 7c 08 e5 97 7c  ...........|...|
00000000012afd1c  2c 02 00 00 2c 0d 00 00 - 03 00 00 00 03 00 00 00  ,...,...........
00000000012afd2c  02 00 00 00 28 02 00 00 - 10 02 00 00 2c 05 00 00  ....(.......,...
00000000012afd3c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00000000012afd4c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00000000012afd5c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00000000012afd6c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00000000012afd7c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00000000012afd8c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00000000012afd9c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00000000012afdac  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00000000012afdbc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00000000012afdcc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00000000012afddc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00000000012afdec  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00000000012afdfc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00000000012afe0c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00000000012afe1c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................

*----> State Dump for Thread Id 0xde0 <----*

eax=00001142 ebx=02832850 ecx=7c809512 edx=7ffe0300 esi=00000000 edi=7ffdf000
eip=7c90eb94 esp=012efd30 ebp=012efdcc iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\USER32.dll - 
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
012efdcc 7e4195f9 00000009 012efdf4 00000000 ntdll!KiFastSystemCallRet
012efe28 7c9f4e7f 00000008 012efe50 ffffffff USER32!GetLastInputInfo+0x105
012eff4c 7ca0a398 77f76f02 00000000 7c80995a SHELL32!Ordinal646+0x21da
012effb4 7c80b683 00000000 7c80995a 00090000 SHELL32!Ordinal753+0x133
012effec 00000000 77f76e93 011ef4d4 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
00000000012efd30  ab e9 90 7c e2 94 80 7c - 09 00 00 00 50 28 83 02  ...|...|....P(..
00000000012efd40  01 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00  ................
00000000012efd50  09 00 00 00 02 00 00 00 - e8 c4 57 00 14 00 00 00  ..........W.....
00000000012efd60  01 00 00 00 00 00 00 00 - 00 00 00 00 10 00 00 00  ................
00000000012efd70  00 00 00 00 30 00 00 00 - 14 00 00 00 01 00 00 00  ....0...........
00000000012efd80  80 7e 0d 00 00 00 00 00 - 00 00 00 00 ec fd 2e 01  .~..............
00000000012efd90  57 04 44 7e 30 88 41 7e - 00 f0 fd 7f 00 60 fd 7f  W.D~0.A~.....`..
00000000012efda0  00 60 fd 7f 00 00 00 00 - 50 28 83 02 30 01 07 00  .`......P(..0...
00000000012efdb0  09 00 00 00 4c fd 2e 01 - 00 00 00 00 dc ff 2e 01  ....L...........
00000000012efdc0  a8 9a 83 7c d8 95 80 7c - 00 00 00 00 28 fe 2e 01  ...|...|....(...
00000000012efdd0  f9 95 41 7e 09 00 00 00 - f4 fd 2e 01 00 00 00 00  ..A~............
00000000012efde0  ff ff ff ff 01 00 00 00 - a0 48 0d 00 08 00 00 00  .........H......
00000000012efdf0  00 00 00 00 08 08 00 00 - 58 05 00 00 4c 04 00 00  ........X...L...
00000000012efe00  04 03 00 00 18 03 00 00 - 74 02 00 00 88 02 00 00  ........t.......
00000000012efe10  58 02 00 00 4c 02 00 00 - 00 00 00 00 01 00 00 00  X...L...........
00000000012efe20  00 60 fd 7f 4c 02 00 00 - 4c ff 2e 01 7f 4e 9f 7c  .`..L...L....N.|
00000000012efe30  08 00 00 00 50 fe 2e 01 - ff ff ff ff ff 04 00 00  ....P...........
00000000012efe40  f4 fd 2e 01 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00000000012efe50  08 08 00 00 58 05 00 00 - 4c 04 00 00 04 03 00 00  ....X...L.......
00000000012efe60  18 03 00 00 74 02 00 00 - 88 02 00 00 58 02 00 00  ....t.......X...

*----> State Dump for Thread Id 0xe94 <----*

eax=00000000 ebx=0156edd0 ecx=00000000 edx=00000000 esi=028e4120 edi=00000000
eip=03e9a65b esp=0156ecfc ebp=02804ee0 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\Program Files\Common Files\Ahead\DSFilter\NeMP4Splitter.ax - 
function: NeMP4Splitter
        03e9a63e f7d8             neg     eax
        03e9a640 f7da             neg     edx
        03e9a642 83d800           sbb     eax,0x0
        03e9a645 8944241c         mov     [esp+0x1c],eax
        03e9a649 89542418         mov     [esp+0x18],edx
        03e9a64d 0bc0             or      eax,eax
        03e9a64f 7518             jnz     NeMP4Splitter+0x2a669 (03e9a669)
        03e9a651 8b4c2418         mov     ecx,[esp+0x18]
        03e9a655 8b442414         mov     eax,[esp+0x14]
        03e9a659 33d2             xor     edx,edx
FAULT ->03e9a65b f7f1             div     ecx
        03e9a65d 8bd8             mov     ebx,eax
        03e9a65f 8b442410         mov     eax,[esp+0x10]
        03e9a663 f7f1             div     ecx
        03e9a665 8bd3             mov     edx,ebx
        03e9a667 eb41             jmp     NeMP4Splitter+0x2a6aa (03e9a6aa)
        03e9a669 8bd8             mov     ebx,eax
        03e9a66b 8b4c2418         mov     ecx,[esp+0x18]
        03e9a66f 8b542414         mov     edx,[esp+0x14]
        03e9a673 8b442410         mov     eax,[esp+0x10]
        03e9a677 d1eb             shr     ebx,1

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
02804ee0 00000000 0000024c 000000f4 00000000 NeMP4Splitter+0x2a65b

*----> Raw Stack Dump <----*
000000000156ecfc  d0 ed 56 01 20 41 8e 02 - 38 4f 80 02 f5 46 e7 03  ..V. A..8O...F..
000000000156ed0c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000156ed1c  2c 3b 8e 02 ff ff ff ff - 50 3a 8e 02 80 77 8e 02  ,;......P:...w..
000000000156ed2c  00 00 00 00 20 41 8e 02 - 50 3a 8e 02 76 69 64 73  .... A..P:..vids
000000000156ed3c  00 00 10 00 80 00 00 aa - 00 38 9b 71 59 56 59 55  .........8.qYVYU
000000000156ed4c  00 00 10 00 80 00 00 aa - 00 38 9b 71 01 00 00 00  .........8.q....
000000000156ed5c  00 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000156ed6c  00 00 00 00 00 00 00 00 - 00 00 00 00 58 00 00 00  ............X...
000000000156ed7c  e0 4e 80 02 c8 f0 56 01 - 48 b0 e9 03 00 00 00 00  .N....V.H.......
000000000156ed8c  ed 5d e7 03 d0 ed 56 01 - 80 77 8e 02 2c 3b 8e 02  .]....V..w..,;..
000000000156ed9c  e4 96 03 00 20 3b 8e 02 - 00 00 00 00 00 00 00 00  .... ;..........
000000000156edac  7f 00 00 00 04 f0 56 01 - 80 77 8e 02 00 00 00 00  ......V..w......
000000000156edbc  00 00 00 00 68 5b 8e 02 - 08 00 00 00 00 00 00 00  ....h[..........
000000000156edcc  42 01 7e 01 80 5b 8e 02 - 01 00 00 00 07 00 00 00  B.~..[..........
000000000156eddc  01 00 00 00 44 58 35 30 - 00 00 00 00 98 41 8e 02  ....DX50.....A..
000000000156edec  75 6e 64 00 19 00 00 00 - 00 00 00 00 00 00 00 00  und.............
000000000156edfc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000156ee0c  00 00 00 00 01 00 00 00 - 4c 02 00 00 f4 00 00 00  ........L.......
000000000156ee1c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000156ee2c  00 00 00 00 00 60 46 38 - 00 00 00 00 28 ee 56 01  .....`F8....(.V.

*----> State Dump for Thread Id 0xf64 <----*

eax=005917e8 ebx=00004e20 ecx=0262fcec edx=7c90eb94 esi=0262fd68 edi=7e4191c6
eip=7c90eb94 esp=0262fcf8 ebp=0262fd14 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\stobject.dll - 
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
0262fd14 76281513 0262fd68 00000000 00000000 ntdll!KiFastSystemCallRet
0262fd8c 76283746 76280000 00000000 00160168 stobject+0x1513
0262ffb4 7c80b683 00000000 00000000 00000000 stobject!DllCanUnloadNow+0x1fa4
0262ffec 00000000 762836f7 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
000000000262fcf8  be 91 41 7e f1 91 41 7e - 68 fd 62 02 00 00 00 00  ..A~..A~h.b.....
000000000262fd08  00 00 00 00 00 00 00 00 - 00 00 00 00 8c fd 62 02  ..............b.
000000000262fd18  13 15 28 76 68 fd 62 02 - 00 00 00 00 00 00 00 00  ..(vh.b.........
000000000262fd28  00 00 00 00 00 00 00 00 - 00 00 28 76 00 00 00 00  ..........(v....
000000000262fd38  30 00 00 00 00 40 00 00 - 21 13 28 76 00 00 00 00  0....@..!.(v....
000000000262fd48  1e 00 00 00 00 00 28 76 - 41 02 1b 00 11 00 01 00  ......(vA.......
000000000262fd58  10 00 00 00 00 00 00 00 - f4 31 28 76 00 00 00 00  .........1(v....
000000000262fd68  68 01 16 00 13 01 00 00 - 07 00 00 00 00 00 00 00  h...............
000000000262fd78  7a 16 09 00 b7 02 00 00 - 2a 01 00 00 00 00 00 00  z.......*.......
000000000262fd88  00 00 00 00 b4 ff 62 02 - 46 37 28 76 00 00 28 76  ......b.F7(v..(v
000000000262fd98  00 00 00 00 68 01 16 00 - 01 00 00 00 00 00 00 00  ....h...........
000000000262fda8  43 00 3a 00 5c 00 57 00 - 49 00 4e 00 44 00 4f 00  C.:.\.W.I.N.D.O.
000000000262fdb8  57 00 53 00 5c 00 73 00 - 79 00 73 00 74 00 65 00  W.S.\.s.y.s.t.e.
000000000262fdc8  6d 00 33 00 32 00 5c 00 - 73 00 74 00 6f 00 62 00  m.3.2.\.s.t.o.b.
000000000262fdd8  6a 00 65 00 63 00 74 00 - 2e 00 64 00 6c 00 6c 00  j.e.c.t...d.l.l.
000000000262fde8  00 00 81 7c 1b 00 00 00 - 00 02 00 00 fc ff 62 02  ...|..........b.
000000000262fdf8  23 00 00 00 84 02 00 00 - 70 55 74 e1 c0 dc db e2  #.......pUt.....
000000000262fe08  70 de fa 86 84 02 00 00 - 00 00 00 00 08 15 09 e1  p...............
000000000262fe18  18 3b e1 ab dc ec 56 80 - c0 dc db e2 08 15 09 e1  .;....V.........
000000000262fe28  70 55 74 e1 01 00 1f 00 - 70 de fa 86 84 02 00 00  pUt.....p.......

*----> State Dump for Thread Id 0xfe8 <----*

eax=77e76bf0 ebx=00000000 ecx=0000000c edx=00000000 esi=000b96c0 edi=00000100
eip=7c90eb94 esp=028bfe1c ebp=028bff80 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
028bff80 77e76c22 028bffa8 77e76a3b 000b96c0 ntdll!KiFastSystemCallRet
028bff88 77e76a3b 000b96c0 003c0488 00000000 RPCRT4!I_RpcBCacheFree+0x5ea
028bffa8 77e76c0a 000b9578 028bffec 7c80b683 RPCRT4!I_RpcBCacheFree+0x403
028bffb4 7c80b683 00180ed8 003c0488 00000000 RPCRT4!I_RpcBCacheFree+0x5d2
028bffec 00000000 77e76bf0 00180ed8 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
00000000028bfe1c  99 e3 90 7c 03 67 e7 77 - dc 01 00 00 70 ff 8b 02  ...|.g.w....p...
00000000028bfe2c  00 00 00 00 f8 23 83 02 - 54 ff 8b 02 00 00 00 00  .....#..T.......
00000000028bfe3c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00000000028bfe4c  00 00 00 00 02 00 00 00 - 00 00 00 00 00 00 00 00  ................
00000000028bfe5c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00000000028bfe6c  01 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00000000028bfe7c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00000000028bfe8c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00000000028bfe9c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00000000028bfeac  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00000000028bfebc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00000000028bfecc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00000000028bfedc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00000000028bfeec  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00000000028bfefc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00000000028bff0c  00 00 00 00 00 00 00 00 - 00 00 00 00 38 f5 df ff  ............8...
00000000028bff1c  66 c7 4d 80 00 50 f4 85 - 2f c5 4d 80 8c 51 f4 85  f.M..P../.M..Q..
00000000028bff2c  20 50 f4 85 80 ff 8b 02 - 99 66 e7 77 4c ff 8b 02   P.......f.wL...
00000000028bff3c  a9 66 e7 77 ed 10 90 7c - 40 11 18 00 d8 0e 18 00  .f.w...|@.......
00000000028bff4c  00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff  ../M.....]......

*----> State Dump for Thread Id 0xfec <----*

eax=72d230e8 ebx=025dfef8 ecx=00000032 edx=0262f51c esi=00000000 edi=7ffdf000
eip=7c90eb94 esp=025dfed0 ebp=025dff6c iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\wdmaud.drv - 
ChildEBP RetAddr  Args to Child              
025dff6c 7c80a075 00000002 025dffa4 00000000 ntdll!KiFastSystemCallRet
025dff88 72d2312a 00000002 025dffa4 00000000 kernel32!WaitForMultipleObjects+0x18
025dffb4 7c80b683 00000000 00000000 7c9105c8 wdmaud!midMessage+0x348
025dffec 00000000 72d230e8 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
00000000025dfed0  ab e9 90 7c e2 94 80 7c - 02 00 00 00 f8 fe 5d 02  ...|...|......].
00000000025dfee0  01 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00000000025dfef0  00 00 00 00 00 00 00 00 - 18 05 00 00 b8 04 00 00  ................
00000000025dff00  46 02 00 00 4d c8 4d 80 - 28 9c 8f ab d8 62 0d 85  F...M.M.(....b..
00000000025dff10  20 f1 df ff 74 64 0d 85 - 14 00 00 00 01 00 00 00   ...td..........
00000000025dff20  20 1d 18 00 00 00 00 00 - 00 00 00 00 d8 62 0d 85   ............b..
00000000025dff30  0c 63 0d 85 00 a7 0f 86 - 00 f0 fd 7f 00 40 fd 7f  .c...........@..
00000000025dff40  d8 62 0d 85 00 00 00 00 - f8 fe 5d 02 ac 9b 4f 80  .b........]...O.
00000000025dff50  02 00 00 00 ec fe 5d 02 - 00 00 00 00 dc ff 5d 02  ......].......].
00000000025dff60  a8 9a 83 7c d8 95 80 7c - 00 00 00 00 88 ff 5d 02  ...|...|......].
00000000025dff70  75 a0 80 7c 02 00 00 00 - a4 ff 5d 02 00 00 00 00  u..|......].....
00000000025dff80  ff ff ff ff 00 00 00 00 - b4 ff 5d 02 2a 31 d2 72  ..........].*1.r
00000000025dff90  02 00 00 00 a4 ff 5d 02 - 00 00 00 00 ff ff ff ff  ......].........
00000000025dffa0  c8 05 91 7c 18 05 00 00 - b8 04 00 00 f2 fe 6f 80  ...|..........o.
00000000025dffb0  dc e2 90 7c ec ff 5d 02 - 83 b6 80 7c 00 00 00 00  ...|..]....|....
00000000025dffc0  00 00 00 00 c8 05 91 7c - 00 00 00 00 00 40 fd 7f  .......|.....@..
00000000025dffd0  00 e6 fb 86 c0 ff 5d 02 - b0 c0 b7 86 ff ff ff ff  ......].........
00000000025dffe0  a8 9a 83 7c 90 b6 80 7c - 00 00 00 00 00 00 00 00  ...|...|........
00000000025dfff0  00 00 00 00 e8 30 d2 72 - 00 00 00 00 00 00 00 00  .....0.r........
00000000025e0000  41 63 74 78 20 00 00 00 - 01 00 00 00 40 19 00 00  Actx .......@...

*----> State Dump for Thread Id 0x124 <----*

eax=02020e0a ebx=00000000 ecx=00210004 edx=00090072 esi=7c9d5eb8 edi=0297e834
eip=7c80aa95 esp=0297e500 ebp=0297e588 iopl=0         nv up ei pl nz na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000206

function: kernel32!lstrcmpW
        7c80aa73 e991f9ffff       jmp     kernel32!CompareStringW+0xab (7c80a409)
        7c80aa78 8b751c           mov     esi,[ebp+0x1c]
        7c80aa7b 668b16           mov     dx,[esi]
        7c80aa7e 33db             xor     ebx,ebx
        7c80aa80 663bd3           cmp     dx,bx
        7c80aa83 0f84205b0200   je kernel32!SetProcessWorkingSetSize+0x1d9 (7c8305a9)
        7c80aa89 8b4ddc           mov     ecx,[ebp-0x24]
        7c80aa8c 8b491c           mov     ecx,[ecx+0x1c]
        7c80aa8f 0fb7c0           movzx   eax,ax
        7c80aa92 8b0481           mov     eax,[ecx+eax*4]
        7c80aa95 2345ac           and     eax,[ebp-0x54]    ss:0023:0297e534=e7ffffff
        7c80aa98 0fb7d2           movzx   edx,dx
        7c80aa9b 8b0c91           mov     ecx,[ecx+edx*4]
        7c80aa9e 234dac           and     ecx,[ebp-0x54]
        7c80aaa1 8945f0           mov     [ebp-0x10],eax
        7c80aaa4 3bc1             cmp     eax,ecx
        7c80aaa6 894df4           mov     [ebp-0xc],ecx
        7c80aaa9 0f842a5b0200   je kernel32!SetProcessWorkingSetSize+0x209 (7c8305d9)
        7c80aaaf 663bc1           cmp     ax,cx
        7c80aab2 8a5df5           mov     bl,[ebp-0xb]
        7c80aab5 8a55f1           mov     dl,[ebp-0xf]

*----> Stack Back Trace <----*

What is the error that is causing this? How do I fix it?
 
Chris215 said:
What is the error that is causing this? How do I fix it?
Since you provided absolutely no information about your system, only a copy of the error log (which indicates you're running XP SP2)... it's impossible to say for sure. If you haven't already, scan your system for viruses... making sure you have the latest DAT files installed for your scanner. Run HijackThis, and post the resulting HJT log in this thread...

HijackThis 1.99.1
http://www.majorgeeks.com/download3155.html

... and here for a free online analysis:

HijackThis log file analysis
http://www.hijackthis.de/

Also scan your system using Spybot S&D...

SpyBot-Search & Destroy Tools 1.4
http://www.majorgeeks.com/SpyBot-Search_&_Destroy_Tools_d2471.html

You may also want to test your RAM using Memtest86+ v1.70...

http://www.memtest.org
 
well, i doubt the problem was caused by any component from my computer because I haven't touched it for months. I did what you said and no problems found.

The last thing I did before this was installed and uninstalled acronis true image. As of now when I searched through my storage HD and try to click on a movie or song it would freeze and crash to desktop.
 
Chris215 said:
well, i doubt the problem was caused by any component from my computer because I haven't touched it for months. I did what you said and no problems found.
You think that because you haven't touched your computer for months, that's reason to believe a hardware component in your system couldn't be at fault? Can I assume then that you didn't run Memtest to test your RAM, like I suggested?
 
I'll do the memtest, but what I'm saying is, that this problem occurred after I installed acronis true image and I've uninstalled it and the problem still there.
 
ran memtest and no errors.. Also the error log doesn't tell anything?

What I know so far is that this only happens in my storage drive when I'm just browsing through my files for about 10 sec it would freeze and crash to desktop
 
Last edited:
Hey guys!

I had the exactly same problem. Luckily, I found the solution by a quick Google search.

So try this and hopefully it'll work.

Code:
regsvr32 /u "c:\program files\Common Files\Ahead\DSFilter\nemp4splitter.ax"
Of course, you should replace the path of the file if it isn't that particular path.

Apparently, this problem occurs when the thumbnail preview is activated. Might be some problems with the filter/codecs from Nero or whatever that makes explorer.exe crasch.

Let me know if it works!
 
Last edited:
:welcome: **WELCOME TO THE FORUMS SHAHIN!**

Chris - I remember reading about the problem as shahin suggested. While I don't remember a specific fix, I would try his suggestion.

I think it was to do with .avi files and the thumbnail preview. Hopefully that fixes your issue.
 
Back