I don't know what caused this, but when I'm going through my harddrives moving things or opening a program it would crash and go back to my desktop.
What is the error that is causing this? How do I fix it?
Code:
Microsoft (R) DrWtsn32
Copyright (C) 1985-2001 Microsoft Corp. All rights reserved.
Application exception occurred:
App: C:\WINDOWS\explorer.exe (pid=3348)
When: 4/9/2007 @ 13:43:20.578
Exception number: c0000094 (divide by zero)
*----> System Information <----*
Computer Name: CHRIS
User Name: Chris
Terminal Session Id: 0
Number of Processors: 2
Processor Type: x86 Family 15 Model 3 Stepping 4
Windows Version: 5.1
Current Build: 2600
Service Pack: 2
Current Type: Multiprocessor Free
Registered Organization:
Registered Owner: Chris
*----> Task List <----*
0 System Process
4 System
740 smss.exe
804 csrss.exe
836 winlogon.exe
880 services.exe
892 lsass.exe
1064 Ati2evxx.exe
1084 svchost.exe
1148 svchost.exe
1260 svchost.exe
1328 svchost.exe
1460 svchost.exe
1576 Ati2evxx.exe
1660 spoolsv.exe
336 Error 0xD0000022
348 SOUNDMAN.EXE
400 ALCWZRD.EXE
416 jusched.exe
440 ctfmon.exe
600 Error 0xD0000022
616 DkService.exe
724 svchost.exe
2084 alg.exe
2640 svchost.exe
228 Error 0xD0000022
2412 winamp.exe
3348 explorer.exe
3536 drwtsn32.exe
*----> Module List <----*
(0000000000400000 - 0000000000409000: C:\WINDOWS\system32\Normaliz.dll
(0000000001000000 - 00000000010ff000: C:\WINDOWS\explorer.exe
(00000000015f0000 - 00000000018b6000: C:\WINDOWS\system32\msi.dll
(00000000018c0000 - 0000000001e8a000: C:\WINDOWS\system32\ieframe.dll
(00000000028d0000 - 00000000028dd000: C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
(0000000002900000 - 0000000002912000: C:\WINDOWS\system32\browselc.dll
(0000000002980000 - 0000000002ea7000: C:\Program Files\Siber Systems\AI RoboForm\roboform.dll
(0000000002fc0000 - 0000000003048000: C:\WINDOWS\system32\shdoclc.dll
(0000000003290000 - 00000000032ac000: C:\Program Files\Adobe\Acrobat 7.0\ActiveX\PDFShell.dll
(0000000003400000 - 000000000342d000: C:\Program Files\WinRAR\rarext.dll
(0000000003430000 - 000000000343c000: C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\ShellEx.dll
(0000000003c60000 - 0000000003d54000: C:\Program Files\K-Lite Codec Pack\filters\vsfilter.dll
(0000000003dd0000 - 0000000003e39000: C:\Program Files\K-Lite Codec Pack\filters\FLVSplitter.ax
(0000000003e70000 - 0000000003eac000: C:\Program Files\Common Files\Ahead\DSFilter\NeMP4Splitter.ax
(00000000085b0000 - 00000000085c5000: C:\WINDOWS\system32\wmpshell.dll
(0000000010000000 - 0000000010025000: C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\scrchpg.dll
(0000000020000000 - 00000000202c5000: C:\WINDOWS\system32\xpsp2res.dll
(000000004ec50000 - 000000004edf3000: C:\WINDOWS\WinSxS\x86_Microsoft.Windows.GdiPlus_6595b64144ccf1df_1.0.2600.2180_x-ww_522f9f82\gdiplus.dll
(000000005ad70000 - 000000005ada8000: C:\WINDOWS\system32\UxTheme.dll
(000000005b860000 - 000000005b8b4000: C:\WINDOWS\system32\NETAPI32.dll
(000000005ba60000 - 000000005bad1000: C:\WINDOWS\system32\themeui.dll
(000000005cad0000 - 000000005caf7000: C:\WINDOWS\system32\shmedia.dll
(000000005cb70000 - 000000005cb96000: C:\WINDOWS\system32\ShimEng.dll
(000000005d090000 - 000000005d12a000: C:\WINDOWS\system32\comctl32.dll
(000000005edd0000 - 000000005ede7000: C:\WINDOWS\system32\OLEPRO32.DLL
(0000000060ca0000 - 0000000060d2c000: C:\WINDOWS\system32\qedit.dll
(0000000061410000 - 0000000061534000: C:\WINDOWS\system32\urlmon.dll
(000000006c1b0000 - 000000006c1fd000: C:\WINDOWS\system32\DUSER.dll
(000000006c230000 - 000000006c24e000: C:\WINDOWS\system32\dsuiext.dll
(000000006c260000 - 000000006c29d000: C:\WINDOWS\system32\dsquery.dll
(000000006e850000 - 000000006e895000: C:\WINDOWS\system32\iertutil.dll
(000000006f880000 - 000000006fa4a000: C:\WINDOWS\AppPatch\AcGenral.DLL
(0000000071aa0000 - 0000000071aa8000: C:\WINDOWS\system32\WS2HELP.dll
(0000000071ab0000 - 0000000071ac7000: C:\WINDOWS\system32\WS2_32.dll
(0000000071b20000 - 0000000071b32000: C:\WINDOWS\system32\MPR.dll
(0000000071bf0000 - 0000000071c03000: C:\WINDOWS\System32\SAMLIB.dll
(0000000071c10000 - 0000000071c1e000: C:\WINDOWS\System32\ntlanman.dll
(0000000071c80000 - 0000000071c87000: C:\WINDOWS\System32\NETRAP.dll
(0000000071c90000 - 0000000071cd0000: C:\WINDOWS\System32\NETUI1.dll
(0000000071cd0000 - 0000000071ce7000: C:\WINDOWS\System32\NETUI0.dll
(0000000071d40000 - 0000000071d5c000: C:\WINDOWS\system32\actxprxy.dll
(0000000072d10000 - 0000000072d18000: C:\WINDOWS\system32\msacm32.drv
(0000000072d20000 - 0000000072d29000: C:\WINDOWS\system32\wdmaud.drv
(0000000073000000 - 0000000073026000: C:\WINDOWS\system32\WINSPOOL.DRV
(0000000073b30000 - 0000000073b45000: C:\WINDOWS\system32\mscms.dll
(0000000073b50000 - 0000000073b67000: C:\WINDOWS\system32\AVIFIL32.dll
(0000000073ba0000 - 0000000073bb3000: C:\WINDOWS\system32\sti.dll
(0000000074720000 - 000000007476b000: C:\WINDOWS\system32\MSCTF.dll
(0000000074810000 - 000000007497c000: C:\WINDOWS\system32\quartz.dll
(0000000074ad0000 - 0000000074ad8000: C:\WINDOWS\system32\POWRPROF.dll
(0000000074ae0000 - 0000000074ae7000: C:\WINDOWS\system32\CFGMGR32.dll
(0000000074af0000 - 0000000074afa000: C:\WINDOWS\system32\BatMeter.dll
(0000000074b30000 - 0000000074b6c000: C:\WINDOWS\system32\webcheck.dll
(00000000754d0000 - 0000000075550000: C:\WINDOWS\system32\CRYPTUI.dll
(00000000755c0000 - 00000000755ee000: C:\WINDOWS\system32\msctfime.ime
(0000000075a70000 - 0000000075a91000: C:\WINDOWS\system32\MSVFW32.dll
(0000000075cf0000 - 0000000075d81000: C:\WINDOWS\system32\MLANG.dll
(0000000075e90000 - 0000000075f40000: C:\WINDOWS\system32\SXS.DLL
(0000000075f40000 - 0000000075f51000: C:\WINDOWS\system32\devenum.dll
(0000000075f60000 - 0000000075f67000: C:\WINDOWS\System32\drprov.dll
(0000000075f70000 - 0000000075f79000: C:\WINDOWS\System32\davclnt.dll
(0000000075f80000 - 000000007607d000: C:\WINDOWS\system32\BROWSEUI.dll
(0000000076280000 - 00000000762a1000: C:\WINDOWS\system32\stobject.dll
(0000000076360000 - 0000000076370000: C:\WINDOWS\system32\WINSTA.dll
(0000000076380000 - 0000000076385000: C:\WINDOWS\system32\MSIMG32.dll
(0000000076390000 - 00000000763ad000: C:\WINDOWS\system32\IMM32.DLL
(00000000763b0000 - 00000000763f9000: C:\WINDOWS\system32\comdlg32.dll
(0000000076400000 - 00000000765a6000: C:\WINDOWS\system32\NETSHELL.dll
(0000000076600000 - 000000007661d000: C:\WINDOWS\System32\CSCDLL.dll
(00000000767a0000 - 00000000767b3000: C:\WINDOWS\system32\NTDSAPI.dll
(0000000076980000 - 0000000076988000: C:\WINDOWS\system32\LINKINFO.dll
(0000000076990000 - 00000000769b5000: C:\WINDOWS\system32\ntshrui.dll
(00000000769c0000 - 0000000076a73000: C:\WINDOWS\system32\USERENV.dll
(0000000076b20000 - 0000000076b31000: C:\WINDOWS\system32\ATL.DLL
(0000000076b40000 - 0000000076b6d000: C:\WINDOWS\system32\WINMM.dll
(0000000076bf0000 - 0000000076bfb000: C:\WINDOWS\system32\PSAPI.DLL
(0000000076c00000 - 0000000076c2e000: C:\WINDOWS\system32\credui.dll
(0000000076c30000 - 0000000076c5e000: C:\WINDOWS\system32\WINTRUST.dll
(0000000076c90000 - 0000000076cb8000: C:\WINDOWS\system32\IMAGEHLP.dll
(0000000076d60000 - 0000000076d79000: C:\WINDOWS\system32\iphlpapi.dll
(0000000076e10000 - 0000000076e35000: C:\WINDOWS\system32\adsldpc.dll
(0000000076e80000 - 0000000076e8e000: C:\WINDOWS\system32\rtutils.dll
(0000000076f20000 - 0000000076f47000: C:\WINDOWS\system32\DNSAPI.dll
(0000000076f50000 - 0000000076f58000: C:\WINDOWS\system32\WTSAPI32.dll
(0000000076f60000 - 0000000076f8c000: C:\WINDOWS\system32\WLDAP32.dll
(0000000076fd0000 - 000000007704f000: C:\WINDOWS\system32\CLBCATQ.DLL
(0000000077050000 - 0000000077115000: C:\WINDOWS\system32\COMRes.dll
(0000000077120000 - 00000000771ac000: C:\WINDOWS\system32\OLEAUT32.dll
(00000000771b0000 - 000000007727f000: C:\WINDOWS\system32\WININET.dll
(00000000773d0000 - 00000000774d3000: C:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.2600.2982_x-ww_ac3f9c03\comctl32.dll
(00000000774e0000 - 000000007761d000: C:\WINDOWS\system32\ole32.dll
(0000000077760000 - 00000000778d0000: C:\WINDOWS\system32\SHDOCVW.dll
(0000000077920000 - 0000000077a13000: C:\WINDOWS\system32\SETUPAPI.dll
(0000000077a20000 - 0000000077a74000: C:\WINDOWS\System32\cscui.dll
(0000000077a80000 - 0000000077b14000: C:\WINDOWS\system32\CRYPT32.dll
(0000000077b20000 - 0000000077b32000: C:\WINDOWS\system32\MSASN1.dll
(0000000077b40000 - 0000000077b62000: C:\WINDOWS\system32\appHelp.dll
(0000000077bd0000 - 0000000077bd7000: C:\WINDOWS\system32\midimap.dll
(0000000077be0000 - 0000000077bf5000: C:\WINDOWS\system32\MSACM32.dll
(0000000077c00000 - 0000000077c08000: C:\WINDOWS\system32\VERSION.dll
(0000000077c10000 - 0000000077c68000: C:\WINDOWS\system32\msvcrt.dll
(0000000077cc0000 - 0000000077cf2000: C:\WINDOWS\system32\ACTIVEDS.dll
(0000000077dd0000 - 0000000077e6b000: C:\WINDOWS\system32\ADVAPI32.dll
(0000000077e70000 - 0000000077f01000: C:\WINDOWS\system32\RPCRT4.dll
(0000000077f10000 - 0000000077f57000: C:\WINDOWS\system32\GDI32.dll
(0000000077f60000 - 0000000077fd6000: C:\WINDOWS\system32\SHLWAPI.dll
(0000000077fe0000 - 0000000077ff1000: C:\WINDOWS\system32\Secur32.dll
(0000000078130000 - 00000000781cb000: C:\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.42_x-ww_0de06acd\MSVCR80.dll
(000000007c340000 - 000000007c396000: C:\WINDOWS\system32\MSVCR71.dll
(000000007c420000 - 000000007c4a7000: C:\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.42_x-ww_0de06acd\MSVCP80.dll
(000000007c800000 - 000000007c8f4000: C:\WINDOWS\system32\kernel32.dll
(000000007c900000 - 000000007c9b0000: C:\WINDOWS\system32\ntdll.dll
(000000007c9c0000 - 000000007d1d5000: C:\WINDOWS\system32\SHELL32.dll
(000000007df70000 - 000000007df92000: C:\WINDOWS\system32\oledlg.dll
(000000007e410000 - 000000007e4a0000: C:\WINDOWS\system32\USER32.dll
*----> State Dump for Thread Id 0xd20 <----*
eax=0007f984 ebx=00000003 ecx=027a74d0 edx=00000000 esi=00109be0 edi=00000000
eip=7c90eb94 esp=0007fef0 ebp=0007ff08 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\ntdll.dll -
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\SHELL32.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Module load completed but symbols could not be loaded for C:\WINDOWS\explorer.exe
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\kernel32.dll -
ChildEBP RetAddr Args to Child
0007ff08 7ca0be9c 00000000 0007ff5c 01016e95 ntdll!KiFastSystemCallRet
0007ff14 01016e95 00109be0 7ffdf000 0007ffc0 SHELL32!Ordinal201+0x28
0007ff5c 0101e2b6 00000000 00000000 0002075a explorer+0x16e95
0007ffc0 7c816fd7 00000000 00000000 7ffdf000 explorer+0x1e2b6
0007fff0 00000000 0101e24e 00000000 78746341 kernel32!RegisterWaitForInputIdle+0x49
*----> Raw Stack Dump <----*
000000000007fef0 18 94 41 7e 02 3c a2 7c - 9c 92 80 7c e0 9b 10 00 ..A~.<.|...|....
000000000007ff00 e0 9b 10 00 14 ff 07 00 - 14 ff 07 00 9c be a0 7c ...............|
000000000007ff10 00 00 00 00 5c ff 07 00 - 95 6e 01 01 e0 9b 10 00 ....\....n......
000000000007ff20 00 f0 fd 7f c0 ff 07 00 - 00 00 00 00 24 fd 07 00 ............$...
000000000007ff30 50 ff 07 00 e0 ff 07 00 - 27 e0 90 7c 65 ac 80 7c P.......'..|e..|
000000000007ff40 ff ff ff ff 0c 00 00 00 - 00 00 00 00 ed b2 08 00 ................
000000000007ff50 c4 00 00 00 01 00 00 00 - e0 9b 10 00 c0 ff 07 00 ................
000000000007ff60 b6 e2 01 01 00 00 00 00 - 00 00 00 00 5a 07 02 00 ............Z...
000000000007ff70 05 00 00 00 00 00 00 00 - 00 00 00 00 44 00 00 00 ............D...
000000000007ff80 ac 07 02 00 8c 07 02 00 - 5c 07 02 00 00 00 00 00 ........\.......
000000000007ff90 00 00 00 00 00 00 00 00 - 00 00 00 00 2e 00 00 00 ................
000000000007ffa0 00 00 00 00 3a ef 06 00 - 01 00 00 00 05 00 00 00 ....:...........
000000000007ffb0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000007ffc0 f0 ff 07 00 d7 6f 81 7c - 00 00 00 00 00 00 00 00 .....o.|........
000000000007ffd0 00 f0 fd 7f fa 02 55 80 - c8 ff 07 00 e0 92 e0 84 ......U.........
000000000007ffe0 ff ff ff ff a8 9a 83 7c - e0 6f 81 7c 00 00 00 00 .......|.o.|....
000000000007fff0 00 00 00 00 00 00 00 00 - 4e e2 01 01 00 00 00 00 ........N.......
0000000000080000 41 63 74 78 20 00 00 00 - 01 00 00 00 98 24 00 00 Actx ........$..
0000000000080010 c4 00 00 00 00 00 00 00 - 20 00 00 00 00 00 00 00 ........ .......
0000000000080020 14 00 00 00 01 00 00 00 - 06 00 00 00 34 00 00 00 ............4...
*----> State Dump for Thread Id 0xd18 <----*
eax=77df9981 ebx=00a9fed0 ecx=00000006 edx=00000000 esi=00000000 edi=7ffdf000
eip=7c90eb94 esp=00a9fea8 ebp=00a9ff44 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\ADVAPI32.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
00a9ff44 77df9b26 00000002 00a9ff6c 00000000 ntdll!KiFastSystemCallRet
00a9ffb4 7c80b683 00000000 7c9140bb 00000000 ADVAPI32!RegDeleteKeyW+0x2a2
00a9ffec 00000000 77df9981 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
0000000000a9fea8 ab e9 90 7c e2 94 80 7c - 02 00 00 00 d0 fe a9 00 ...|...|........
0000000000a9feb8 01 00 00 00 01 00 00 00 - 04 ff a9 00 e0 2e 96 00 ................
0000000000a9fec8 40 65 e4 77 00 10 00 00 - 6c 00 00 00 78 00 00 00 @e.w....l...x...
0000000000a9fed8 c0 fe a9 00 20 70 0f 85 - dc ff a9 00 a8 9a 83 7c .... p.........|
0000000000a9fee8 b0 0a 81 7c 00 10 00 00 - 14 00 00 00 01 00 00 00 ...|............
0000000000a9fef8 18 c7 09 00 00 00 00 00 - 00 00 00 00 00 a2 2f 4d ............../M
0000000000a9ff08 ff ff ff ff 00 10 00 00 - 00 f0 fd 7f 00 d0 fd 7f ................
0000000000a9ff18 dc ff a9 00 04 ff a9 00 - d0 fe a9 00 06 00 00 00 ................
0000000000a9ff28 02 00 00 00 c4 fe a9 00 - 06 00 00 00 dc ff a9 00 ................
0000000000a9ff38 a8 9a 83 7c d8 95 80 7c - 00 00 00 00 b4 ff a9 00 ...|...|........
0000000000a9ff48 26 9b df 77 02 00 00 00 - 6c ff a9 00 00 00 00 00 &..w....l.......
0000000000a9ff58 e0 93 04 00 01 00 00 00 - bb 40 91 7c 00 00 00 00 .........@.|....
0000000000a9ff68 00 00 00 00 6c 00 00 00 - 78 00 00 00 00 10 00 00 ....l...x.......
0000000000a9ff78 e0 2e 96 00 00 00 00 00 - 00 10 00 00 e8 3e 96 00 .............>..
0000000000a9ff88 a0 66 e4 77 38 00 00 00 - 80 66 e4 77 00 10 00 00 .f.w8....f.w....
0000000000a9ff98 00 00 00 00 a0 66 e4 77 - e0 2e 96 00 80 66 e4 77 .....f.w.....f.w
0000000000a9ffa8 e5 03 00 00 00 10 00 00 - e8 3e 96 00 ec ff a9 00 .........>......
0000000000a9ffb8 83 b6 80 7c 00 00 00 00 - bb 40 91 7c 00 00 00 00 ...|.....@.|....
0000000000a9ffc8 00 00 00 00 00 d0 fd 7f - 00 c6 fb 86 c0 ff a9 00 ................
0000000000a9ffd8 c8 a6 1b 85 ff ff ff ff - a8 9a 83 7c 90 b6 80 7c ...........|...|
*----> State Dump for Thread Id 0xd1c <----*
eax=0113ff54 ebx=00000000 ecx=000b96c0 edx=7c90eb94 esi=000b96c0 edi=00000100
eip=7c90eb94 esp=0113fe1c ebp=0113ff80 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\RPCRT4.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
0113ff80 77e76c22 0113ffa8 77e76a3b 000b96c0 ntdll!KiFastSystemCallRet
0113ff88 77e76a3b 000b96c0 00000000 0007f88c RPCRT4!I_RpcBCacheFree+0x5ea
0113ffa8 77e76c0a 000b9578 0113ffec 7c80b683 RPCRT4!I_RpcBCacheFree+0x403
0113ffb4 7c80b683 000c89e8 00000000 0007f88c RPCRT4!I_RpcBCacheFree+0x5d2
0113ffec 00000000 77e76bf0 000c89e8 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
000000000113fe1c 99 e3 90 7c 03 67 e7 77 - dc 01 00 00 70 ff 13 01 ...|.g.w....p...
000000000113fe2c 00 00 00 00 50 48 7a 02 - 54 ff 13 01 d0 0b e0 81 ....PHz.T.......
000000000113fe3c 00 00 00 00 9c 36 50 c0 - 40 9e 12 85 6c 09 00 00 [email protected]...
000000000113fe4c 60 eb 21 ac f6 0f 4f 80 - 40 f5 df ff 02 ff 1f c0 `.!...O.@.......
000000000113fe5c 0e 82 4e 80 00 f0 fd 7f - 8c eb 21 ac 7c ff 1f c0 ..N.......!.|...
000000000113fe6c 6c eb 21 ac c3 a9 4e 80 - 00 e0 fd 7f 01 00 00 00 l.!...N.........
000000000113fe7c 00 00 00 00 78 ff 1f c0 - 00 00 00 00 fc 07 30 c0 ....x.........0.
000000000113fe8c 24 ec 21 ac 3a 11 4f 80 - 8c eb 21 ac 00 00 00 00 $.!.:.O...!.....
000000000113fe9c 00 00 00 00 43 fd 6f 80 - 28 ec 21 ac 27 f4 6f 80 ....C.o.(.!.'.o.
000000000113feac 00 0d db ba 00 00 00 00 - 27 f4 6f 80 fb 80 8c ae ........'.o.....
000000000113febc 00 00 00 00 90 0e 56 80 - 82 02 00 00 00 94 8c ae ......V.........
000000000113fecc 20 1d fc 86 1c 0d 00 00 - 00 00 00 00 82 02 00 00 ...............
000000000113fedc 20 a0 fc 85 00 00 00 00 - 00 00 00 00 00 00 00 00 ...............
000000000113feec 00 f0 df ff ff ff ff ff - 40 f5 96 f7 00 00 00 00 ........@.......
000000000113fefc 10 f4 6f 80 bc a1 fc 85 - 28 ec 21 ac 00 00 00 00 ..o.....(.!.....
000000000113ff0c 27 f4 6f 80 08 00 00 00 - 46 02 00 00 e8 1b 4e 80 '.o.....F.....N.
000000000113ff1c 90 a0 fc 85 20 a0 fc 85 - 1e 1c 4e 80 8c a1 fc 85 .... .....N.....
000000000113ff2c 20 a0 fc 85 80 ff 13 01 - 99 66 e7 77 4c ff 13 01 ........f.wL...
000000000113ff3c a9 66 e7 77 ed 10 90 7c - 08 82 0c 00 e8 89 0c 00 .f.w...|........
000000000113ff4c 00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff ../M.....]......
*----> State Dump for Thread Id 0xd24 <----*
eax=774fe429 ebx=00007530 ecx=00010000 edx=00000000 esi=00000000 edi=011aff50
eip=7c90eb94 esp=011aff20 ebp=011aff78 iopl=0 nv up ei pl nz na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000206
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\ole32.dll -
ChildEBP RetAddr Args to Child
011aff78 7c802451 0000ea60 00000000 011affb4 ntdll!KiFastSystemCallRet
011aff88 774fe31d 0000ea60 000cb178 774fe3dc kernel32!Sleep+0xf
011affb4 7c80b683 000cb178 00090498 7ffdf000 ole32!StringFromGUID2+0x51b
011affec 00000000 774fe429 000cb178 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
00000000011aff20 5c d8 90 7c ed 23 80 7c - 00 00 00 00 50 ff 1a 01 \..|.#.|....P...
00000000011aff30 40 25 80 7c f8 6d 60 77 - 30 75 00 00 14 00 00 00 @%.|.m`w0u......
00000000011aff40 01 00 00 00 00 00 00 00 - 00 00 00 00 10 00 00 00 ................
00000000011aff50 00 ba 3c dc ff ff ff ff - 20 00 00 00 50 ff 1a 01 ..<..... ...P...
00000000011aff60 30 ff 1a 01 00 20 1a 01 - dc ff 1a 01 a8 9a 83 7c 0.... .........|
00000000011aff70 58 24 80 7c 00 00 00 00 - 88 ff 1a 01 51 24 80 7c X$.|........Q$.|
00000000011aff80 60 ea 00 00 00 00 00 00 - b4 ff 1a 01 1d e3 4f 77 `.............Ow
00000000011aff90 60 ea 00 00 78 b1 0c 00 - dc e3 4f 77 00 00 00 00 `...x.....Ow....
00000000011affa0 98 04 09 00 78 b1 0c 00 - 00 00 4e 77 44 e4 4f 77 ....x.....NwD.Ow
00000000011affb0 00 f0 fd 7f ec ff 1a 01 - 83 b6 80 7c 78 b1 0c 00 ...........|x...
00000000011affc0 98 04 09 00 00 f0 fd 7f - 78 b1 0c 00 00 b0 fd 7f ........x.......
00000000011affd0 00 e6 fb 86 c0 ff 1a 01 - a0 ea 67 86 ff ff ff ff ..........g.....
00000000011affe0 a8 9a 83 7c 90 b6 80 7c - 00 00 00 00 00 00 00 00 ...|...|........
00000000011afff0 00 00 00 00 29 e4 4f 77 - 78 b1 0c 00 00 00 00 00 ....).Owx.......
00000000011b0000 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000011b0010 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000011b0020 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000011b0030 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000011b0040 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000011b0050 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
*----> State Dump for Thread Id 0xd28 <----*
eax=00000002 ebx=7e41b8ba ecx=00000002 edx=7c90eb94 esi=010460d8 edi=00000000
eip=7c90eb94 esp=011eff14 ebp=011eff44 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\SHLWAPI.dll -
ChildEBP RetAddr Args to Child
011eff44 01011e8b 00000000 011effb4 77f76f02 ntdll!KiFastSystemCallRet
011eff50 77f76f02 010460d8 0000005c 0007fc04 explorer+0x11e8b
011effb4 7c80b683 00000000 0000005c 0007fc04 SHLWAPI!Ordinal505+0x3e9
011effec 00000000 77f76e93 0007fdbc 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
00000000011eff14 18 94 41 7e 40 1a 00 01 - 00 00 00 00 d8 60 04 01 ..A~@........`..
00000000011eff24 00 00 00 00 a0 00 06 00 - 13 01 00 00 09 00 00 00 ................
00000000011eff34 00 00 00 00 3f 18 09 00 - bf 02 00 00 9f 01 00 00 ....?...........
00000000011eff44 50 ff 1e 01 8b 1e 01 01 - 00 00 00 00 b4 ff 1e 01 P...............
00000000011eff54 02 6f f7 77 d8 60 04 01 - 5c 00 00 00 04 fc 07 00 .o.w.`..\.......
00000000011eff64 bc fd 07 00 62 1e 01 01 - b1 79 01 01 fc 01 00 00 ....b....y......
00000000011eff74 d8 60 04 01 08 00 00 00 - 00 00 00 00 00 00 00 00 .`..............
00000000011eff84 00 00 00 00 00 00 00 00 - 00 00 00 00 80 0c 0a 86 ................
00000000011eff94 8c 9b 4f 80 00 00 00 00 - 00 00 00 00 00 00 00 00 ..O.............
00000000011effa4 94 9b 4f 80 00 00 00 00 - f2 fe 6f 80 dc e2 90 7c ..O.......o....|
00000000011effb4 ec ff 1e 01 83 b6 80 7c - 00 00 00 00 5c 00 00 00 .......|....\...
00000000011effc4 04 fc 07 00 bc fd 07 00 - 00 a0 fd 7f 00 c6 fb 86 ................
00000000011effd4 c0 ff 1e 01 30 c7 ec 85 - ff ff ff ff a8 9a 83 7c ....0..........|
00000000011effe4 90 b6 80 7c 00 00 00 00 - 00 00 00 00 00 00 00 00 ...|............
00000000011efff4 93 6e f7 77 bc fd 07 00 - 00 00 00 00 00 00 00 00 .n.w............
00000000011f0004 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000011f0014 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000011f0024 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000011f0034 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000011f0044 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
*----> State Dump for Thread Id 0xdd4 <----*
eax=000000c0 ebx=00000000 ecx=77dd6a51 edx=77dd6a18 esi=ffffffff edi=7c90fb78
eip=7c90eb94 esp=0122ff9c ebp=0122ffb4 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
0122ffb4 7c80b683 00000000 7c90fb78 ffffffff ntdll!KiFastSystemCallRet
0122ffec 00000000 7c92798d 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
000000000122ff9c 5c d8 90 7c d4 79 92 7c - 01 00 00 00 ac ff 22 01 \..|.y.|......".
000000000122ffac 00 00 00 00 00 00 00 80 - ec ff 22 01 83 b6 80 7c .........."....|
000000000122ffbc 00 00 00 00 78 fb 90 7c - ff ff ff ff 00 00 00 00 ....x..|........
000000000122ffcc 00 90 fd 7f 00 c6 fb 86 - c0 ff 22 01 a0 5f 15 86 ..........".._..
000000000122ffdc ff ff ff ff a8 9a 83 7c - 90 b6 80 7c 00 00 00 00 .......|...|....
000000000122ffec 00 00 00 00 00 00 00 00 - 8d 79 92 7c 00 00 00 00 .........y.|....
000000000122fffc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000123000c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000123001c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000123002c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000123003c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000123004c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000123005c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000123006c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000123007c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000123008c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000123009c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000012300ac 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000012300bc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000012300cc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
*----> State Dump for Thread Id 0xdcc <----*
eax=0000f7d0 ebx=00000000 ecx=0000990d edx=00000014 esi=7c97c380 edi=7c97c3a0
eip=7c90eb94 esp=0126ff70 ebp=0126ffb4 iopl=0 nv up ei ng nz na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000286
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
0126ffb4 7c80b683 00000000 011efce4 011efce8 ntdll!KiFastSystemCallRet
0126ffec 00000000 7c910760 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
000000000126ff70 1b e3 90 7c 9d 07 91 7c - 24 02 00 00 ac ff 26 01 ...|...|$.....&.
000000000126ff80 b0 ff 26 01 98 ff 26 01 - a0 ff 26 01 e4 fc 1e 01 ..&...&...&.....
000000000126ff90 e8 fc 1e 01 00 00 00 00 - 00 00 00 00 40 a1 78 02 [email protected].
000000000126ffa0 00 7c 28 e8 ff ff ff ff - a0 3c c3 ab 69 75 92 7c .|(......<..iu.|
000000000126ffb0 b8 3a 78 02 ec ff 26 01 - 83 b6 80 7c 00 00 00 00 .:x...&....|....
000000000126ffc0 e4 fc 1e 01 e8 fc 1e 01 - 00 00 00 00 00 80 fd 7f ................
000000000126ffd0 00 c6 fb 86 c0 ff 26 01 - a0 ea 67 86 ff ff ff ff ......&...g.....
000000000126ffe0 a8 9a 83 7c 90 b6 80 7c - 00 00 00 00 00 00 00 00 ...|...|........
000000000126fff0 00 00 00 00 60 07 91 7c - 00 00 00 00 00 00 00 00 ....`..|........
0000000001270000 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001270010 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001270020 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001270030 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001270040 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001270050 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001270060 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001270070 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001270080 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001270090 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000012700a0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
*----> State Dump for Thread Id 0xd2c <----*
eax=000000c0 ebx=00000000 ecx=011efb00 edx=00000000 esi=00000000 edi=00000001
eip=7c90eb94 esp=012afcec ebp=012affb4 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
012affb4 7c80b683 00000000 00000020 011efce4 ntdll!KiFastSystemCallRet
012affec 00000000 7c929fae 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
00000000012afcec ab e9 90 7c d5 a0 92 7c - 03 00 00 00 30 fd 2a 01 ...|...|....0.*.
00000000012afcfc 01 00 00 00 01 00 00 00 - 00 00 00 00 20 00 00 00 ............ ...
00000000012afd0c e4 fc 1e 01 00 00 00 00 - 08 e5 97 7c 08 e5 97 7c ...........|...|
00000000012afd1c 2c 02 00 00 2c 0d 00 00 - 03 00 00 00 03 00 00 00 ,...,...........
00000000012afd2c 02 00 00 00 28 02 00 00 - 10 02 00 00 2c 05 00 00 ....(.......,...
00000000012afd3c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000012afd4c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000012afd5c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000012afd6c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000012afd7c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000012afd8c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000012afd9c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000012afdac 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000012afdbc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000012afdcc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000012afddc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000012afdec 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000012afdfc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000012afe0c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000012afe1c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
*----> State Dump for Thread Id 0xde0 <----*
eax=00001142 ebx=02832850 ecx=7c809512 edx=7ffe0300 esi=00000000 edi=7ffdf000
eip=7c90eb94 esp=012efd30 ebp=012efdcc iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\USER32.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
012efdcc 7e4195f9 00000009 012efdf4 00000000 ntdll!KiFastSystemCallRet
012efe28 7c9f4e7f 00000008 012efe50 ffffffff USER32!GetLastInputInfo+0x105
012eff4c 7ca0a398 77f76f02 00000000 7c80995a SHELL32!Ordinal646+0x21da
012effb4 7c80b683 00000000 7c80995a 00090000 SHELL32!Ordinal753+0x133
012effec 00000000 77f76e93 011ef4d4 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
00000000012efd30 ab e9 90 7c e2 94 80 7c - 09 00 00 00 50 28 83 02 ...|...|....P(..
00000000012efd40 01 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000012efd50 09 00 00 00 02 00 00 00 - e8 c4 57 00 14 00 00 00 ..........W.....
00000000012efd60 01 00 00 00 00 00 00 00 - 00 00 00 00 10 00 00 00 ................
00000000012efd70 00 00 00 00 30 00 00 00 - 14 00 00 00 01 00 00 00 ....0...........
00000000012efd80 80 7e 0d 00 00 00 00 00 - 00 00 00 00 ec fd 2e 01 .~..............
00000000012efd90 57 04 44 7e 30 88 41 7e - 00 f0 fd 7f 00 60 fd 7f W.D~0.A~.....`..
00000000012efda0 00 60 fd 7f 00 00 00 00 - 50 28 83 02 30 01 07 00 .`......P(..0...
00000000012efdb0 09 00 00 00 4c fd 2e 01 - 00 00 00 00 dc ff 2e 01 ....L...........
00000000012efdc0 a8 9a 83 7c d8 95 80 7c - 00 00 00 00 28 fe 2e 01 ...|...|....(...
00000000012efdd0 f9 95 41 7e 09 00 00 00 - f4 fd 2e 01 00 00 00 00 ..A~............
00000000012efde0 ff ff ff ff 01 00 00 00 - a0 48 0d 00 08 00 00 00 .........H......
00000000012efdf0 00 00 00 00 08 08 00 00 - 58 05 00 00 4c 04 00 00 ........X...L...
00000000012efe00 04 03 00 00 18 03 00 00 - 74 02 00 00 88 02 00 00 ........t.......
00000000012efe10 58 02 00 00 4c 02 00 00 - 00 00 00 00 01 00 00 00 X...L...........
00000000012efe20 00 60 fd 7f 4c 02 00 00 - 4c ff 2e 01 7f 4e 9f 7c .`..L...L....N.|
00000000012efe30 08 00 00 00 50 fe 2e 01 - ff ff ff ff ff 04 00 00 ....P...........
00000000012efe40 f4 fd 2e 01 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000012efe50 08 08 00 00 58 05 00 00 - 4c 04 00 00 04 03 00 00 ....X...L.......
00000000012efe60 18 03 00 00 74 02 00 00 - 88 02 00 00 58 02 00 00 ....t.......X...
*----> State Dump for Thread Id 0xe94 <----*
eax=00000000 ebx=0156edd0 ecx=00000000 edx=00000000 esi=028e4120 edi=00000000
eip=03e9a65b esp=0156ecfc ebp=02804ee0 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\Program Files\Common Files\Ahead\DSFilter\NeMP4Splitter.ax -
function: NeMP4Splitter
03e9a63e f7d8 neg eax
03e9a640 f7da neg edx
03e9a642 83d800 sbb eax,0x0
03e9a645 8944241c mov [esp+0x1c],eax
03e9a649 89542418 mov [esp+0x18],edx
03e9a64d 0bc0 or eax,eax
03e9a64f 7518 jnz NeMP4Splitter+0x2a669 (03e9a669)
03e9a651 8b4c2418 mov ecx,[esp+0x18]
03e9a655 8b442414 mov eax,[esp+0x14]
03e9a659 33d2 xor edx,edx
FAULT ->03e9a65b f7f1 div ecx
03e9a65d 8bd8 mov ebx,eax
03e9a65f 8b442410 mov eax,[esp+0x10]
03e9a663 f7f1 div ecx
03e9a665 8bd3 mov edx,ebx
03e9a667 eb41 jmp NeMP4Splitter+0x2a6aa (03e9a6aa)
03e9a669 8bd8 mov ebx,eax
03e9a66b 8b4c2418 mov ecx,[esp+0x18]
03e9a66f 8b542414 mov edx,[esp+0x14]
03e9a673 8b442410 mov eax,[esp+0x10]
03e9a677 d1eb shr ebx,1
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
02804ee0 00000000 0000024c 000000f4 00000000 NeMP4Splitter+0x2a65b
*----> Raw Stack Dump <----*
000000000156ecfc d0 ed 56 01 20 41 8e 02 - 38 4f 80 02 f5 46 e7 03 ..V. A..8O...F..
000000000156ed0c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000156ed1c 2c 3b 8e 02 ff ff ff ff - 50 3a 8e 02 80 77 8e 02 ,;......P:...w..
000000000156ed2c 00 00 00 00 20 41 8e 02 - 50 3a 8e 02 76 69 64 73 .... A..P:..vids
000000000156ed3c 00 00 10 00 80 00 00 aa - 00 38 9b 71 59 56 59 55 .........8.qYVYU
000000000156ed4c 00 00 10 00 80 00 00 aa - 00 38 9b 71 01 00 00 00 .........8.q....
000000000156ed5c 00 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000156ed6c 00 00 00 00 00 00 00 00 - 00 00 00 00 58 00 00 00 ............X...
000000000156ed7c e0 4e 80 02 c8 f0 56 01 - 48 b0 e9 03 00 00 00 00 .N....V.H.......
000000000156ed8c ed 5d e7 03 d0 ed 56 01 - 80 77 8e 02 2c 3b 8e 02 .]....V..w..,;..
000000000156ed9c e4 96 03 00 20 3b 8e 02 - 00 00 00 00 00 00 00 00 .... ;..........
000000000156edac 7f 00 00 00 04 f0 56 01 - 80 77 8e 02 00 00 00 00 ......V..w......
000000000156edbc 00 00 00 00 68 5b 8e 02 - 08 00 00 00 00 00 00 00 ....h[..........
000000000156edcc 42 01 7e 01 80 5b 8e 02 - 01 00 00 00 07 00 00 00 B.~..[..........
000000000156eddc 01 00 00 00 44 58 35 30 - 00 00 00 00 98 41 8e 02 ....DX50.....A..
000000000156edec 75 6e 64 00 19 00 00 00 - 00 00 00 00 00 00 00 00 und.............
000000000156edfc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000156ee0c 00 00 00 00 01 00 00 00 - 4c 02 00 00 f4 00 00 00 ........L.......
000000000156ee1c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000156ee2c 00 00 00 00 00 60 46 38 - 00 00 00 00 28 ee 56 01 .....`F8....(.V.
*----> State Dump for Thread Id 0xf64 <----*
eax=005917e8 ebx=00004e20 ecx=0262fcec edx=7c90eb94 esi=0262fd68 edi=7e4191c6
eip=7c90eb94 esp=0262fcf8 ebp=0262fd14 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\stobject.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
0262fd14 76281513 0262fd68 00000000 00000000 ntdll!KiFastSystemCallRet
0262fd8c 76283746 76280000 00000000 00160168 stobject+0x1513
0262ffb4 7c80b683 00000000 00000000 00000000 stobject!DllCanUnloadNow+0x1fa4
0262ffec 00000000 762836f7 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
000000000262fcf8 be 91 41 7e f1 91 41 7e - 68 fd 62 02 00 00 00 00 ..A~..A~h.b.....
000000000262fd08 00 00 00 00 00 00 00 00 - 00 00 00 00 8c fd 62 02 ..............b.
000000000262fd18 13 15 28 76 68 fd 62 02 - 00 00 00 00 00 00 00 00 ..(vh.b.........
000000000262fd28 00 00 00 00 00 00 00 00 - 00 00 28 76 00 00 00 00 ..........(v....
000000000262fd38 30 00 00 00 00 40 00 00 - 21 13 28 76 00 00 00 00 0....@..!.(v....
000000000262fd48 1e 00 00 00 00 00 28 76 - 41 02 1b 00 11 00 01 00 ......(vA.......
000000000262fd58 10 00 00 00 00 00 00 00 - f4 31 28 76 00 00 00 00 .........1(v....
000000000262fd68 68 01 16 00 13 01 00 00 - 07 00 00 00 00 00 00 00 h...............
000000000262fd78 7a 16 09 00 b7 02 00 00 - 2a 01 00 00 00 00 00 00 z.......*.......
000000000262fd88 00 00 00 00 b4 ff 62 02 - 46 37 28 76 00 00 28 76 ......b.F7(v..(v
000000000262fd98 00 00 00 00 68 01 16 00 - 01 00 00 00 00 00 00 00 ....h...........
000000000262fda8 43 00 3a 00 5c 00 57 00 - 49 00 4e 00 44 00 4f 00 C.:.\.W.I.N.D.O.
000000000262fdb8 57 00 53 00 5c 00 73 00 - 79 00 73 00 74 00 65 00 W.S.\.s.y.s.t.e.
000000000262fdc8 6d 00 33 00 32 00 5c 00 - 73 00 74 00 6f 00 62 00 m.3.2.\.s.t.o.b.
000000000262fdd8 6a 00 65 00 63 00 74 00 - 2e 00 64 00 6c 00 6c 00 j.e.c.t...d.l.l.
000000000262fde8 00 00 81 7c 1b 00 00 00 - 00 02 00 00 fc ff 62 02 ...|..........b.
000000000262fdf8 23 00 00 00 84 02 00 00 - 70 55 74 e1 c0 dc db e2 #.......pUt.....
000000000262fe08 70 de fa 86 84 02 00 00 - 00 00 00 00 08 15 09 e1 p...............
000000000262fe18 18 3b e1 ab dc ec 56 80 - c0 dc db e2 08 15 09 e1 .;....V.........
000000000262fe28 70 55 74 e1 01 00 1f 00 - 70 de fa 86 84 02 00 00 pUt.....p.......
*----> State Dump for Thread Id 0xfe8 <----*
eax=77e76bf0 ebx=00000000 ecx=0000000c edx=00000000 esi=000b96c0 edi=00000100
eip=7c90eb94 esp=028bfe1c ebp=028bff80 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
028bff80 77e76c22 028bffa8 77e76a3b 000b96c0 ntdll!KiFastSystemCallRet
028bff88 77e76a3b 000b96c0 003c0488 00000000 RPCRT4!I_RpcBCacheFree+0x5ea
028bffa8 77e76c0a 000b9578 028bffec 7c80b683 RPCRT4!I_RpcBCacheFree+0x403
028bffb4 7c80b683 00180ed8 003c0488 00000000 RPCRT4!I_RpcBCacheFree+0x5d2
028bffec 00000000 77e76bf0 00180ed8 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
00000000028bfe1c 99 e3 90 7c 03 67 e7 77 - dc 01 00 00 70 ff 8b 02 ...|.g.w....p...
00000000028bfe2c 00 00 00 00 f8 23 83 02 - 54 ff 8b 02 00 00 00 00 .....#..T.......
00000000028bfe3c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000028bfe4c 00 00 00 00 02 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000028bfe5c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000028bfe6c 01 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000028bfe7c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000028bfe8c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000028bfe9c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000028bfeac 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000028bfebc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000028bfecc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000028bfedc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000028bfeec 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000028bfefc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000028bff0c 00 00 00 00 00 00 00 00 - 00 00 00 00 38 f5 df ff ............8...
00000000028bff1c 66 c7 4d 80 00 50 f4 85 - 2f c5 4d 80 8c 51 f4 85 f.M..P../.M..Q..
00000000028bff2c 20 50 f4 85 80 ff 8b 02 - 99 66 e7 77 4c ff 8b 02 P.......f.wL...
00000000028bff3c a9 66 e7 77 ed 10 90 7c - 40 11 18 00 d8 0e 18 00 .f.w...|@.......
00000000028bff4c 00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff ../M.....]......
*----> State Dump for Thread Id 0xfec <----*
eax=72d230e8 ebx=025dfef8 ecx=00000032 edx=0262f51c esi=00000000 edi=7ffdf000
eip=7c90eb94 esp=025dfed0 ebp=025dff6c iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\wdmaud.drv -
ChildEBP RetAddr Args to Child
025dff6c 7c80a075 00000002 025dffa4 00000000 ntdll!KiFastSystemCallRet
025dff88 72d2312a 00000002 025dffa4 00000000 kernel32!WaitForMultipleObjects+0x18
025dffb4 7c80b683 00000000 00000000 7c9105c8 wdmaud!midMessage+0x348
025dffec 00000000 72d230e8 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
00000000025dfed0 ab e9 90 7c e2 94 80 7c - 02 00 00 00 f8 fe 5d 02 ...|...|......].
00000000025dfee0 01 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000025dfef0 00 00 00 00 00 00 00 00 - 18 05 00 00 b8 04 00 00 ................
00000000025dff00 46 02 00 00 4d c8 4d 80 - 28 9c 8f ab d8 62 0d 85 F...M.M.(....b..
00000000025dff10 20 f1 df ff 74 64 0d 85 - 14 00 00 00 01 00 00 00 ...td..........
00000000025dff20 20 1d 18 00 00 00 00 00 - 00 00 00 00 d8 62 0d 85 ............b..
00000000025dff30 0c 63 0d 85 00 a7 0f 86 - 00 f0 fd 7f 00 40 fd 7f .c...........@..
00000000025dff40 d8 62 0d 85 00 00 00 00 - f8 fe 5d 02 ac 9b 4f 80 .b........]...O.
00000000025dff50 02 00 00 00 ec fe 5d 02 - 00 00 00 00 dc ff 5d 02 ......].......].
00000000025dff60 a8 9a 83 7c d8 95 80 7c - 00 00 00 00 88 ff 5d 02 ...|...|......].
00000000025dff70 75 a0 80 7c 02 00 00 00 - a4 ff 5d 02 00 00 00 00 u..|......].....
00000000025dff80 ff ff ff ff 00 00 00 00 - b4 ff 5d 02 2a 31 d2 72 ..........].*1.r
00000000025dff90 02 00 00 00 a4 ff 5d 02 - 00 00 00 00 ff ff ff ff ......].........
00000000025dffa0 c8 05 91 7c 18 05 00 00 - b8 04 00 00 f2 fe 6f 80 ...|..........o.
00000000025dffb0 dc e2 90 7c ec ff 5d 02 - 83 b6 80 7c 00 00 00 00 ...|..]....|....
00000000025dffc0 00 00 00 00 c8 05 91 7c - 00 00 00 00 00 40 fd 7f .......|.....@..
00000000025dffd0 00 e6 fb 86 c0 ff 5d 02 - b0 c0 b7 86 ff ff ff ff ......].........
00000000025dffe0 a8 9a 83 7c 90 b6 80 7c - 00 00 00 00 00 00 00 00 ...|...|........
00000000025dfff0 00 00 00 00 e8 30 d2 72 - 00 00 00 00 00 00 00 00 .....0.r........
00000000025e0000 41 63 74 78 20 00 00 00 - 01 00 00 00 40 19 00 00 Actx .......@...
*----> State Dump for Thread Id 0x124 <----*
eax=02020e0a ebx=00000000 ecx=00210004 edx=00090072 esi=7c9d5eb8 edi=0297e834
eip=7c80aa95 esp=0297e500 ebp=0297e588 iopl=0 nv up ei pl nz na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000206
function: kernel32!lstrcmpW
7c80aa73 e991f9ffff jmp kernel32!CompareStringW+0xab (7c80a409)
7c80aa78 8b751c mov esi,[ebp+0x1c]
7c80aa7b 668b16 mov dx,[esi]
7c80aa7e 33db xor ebx,ebx
7c80aa80 663bd3 cmp dx,bx
7c80aa83 0f84205b0200 je kernel32!SetProcessWorkingSetSize+0x1d9 (7c8305a9)
7c80aa89 8b4ddc mov ecx,[ebp-0x24]
7c80aa8c 8b491c mov ecx,[ecx+0x1c]
7c80aa8f 0fb7c0 movzx eax,ax
7c80aa92 8b0481 mov eax,[ecx+eax*4]
7c80aa95 2345ac and eax,[ebp-0x54] ss:0023:0297e534=e7ffffff
7c80aa98 0fb7d2 movzx edx,dx
7c80aa9b 8b0c91 mov ecx,[ecx+edx*4]
7c80aa9e 234dac and ecx,[ebp-0x54]
7c80aaa1 8945f0 mov [ebp-0x10],eax
7c80aaa4 3bc1 cmp eax,ecx
7c80aaa6 894df4 mov [ebp-0xc],ecx
7c80aaa9 0f842a5b0200 je kernel32!SetProcessWorkingSetSize+0x209 (7c8305d9)
7c80aaaf 663bc1 cmp ax,cx
7c80aab2 8a5df5 mov bl,[ebp-0xb]
7c80aab5 8a55f1 mov dl,[ebp-0xf]
*----> Stack Back Trace <----*
What is the error that is causing this? How do I fix it?