Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations biv343 on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

XP Pro client program dies.

Status
Not open for further replies.

bkas

IS-IT--Management
May 23, 2003
5
US
We have Windows 2000 Server running an application which uses 2 DVD-Rom drives for program data. The problem I am having is when the Windows XP Client Runs the application (client software installed on the XP Client) and the User has Administrative Rights everything goes perfectly. BUT when I Switch the user to User, Power Users rights and the application is run, The application runs you can get past the first two option screens then the application just quits, no errors, just terminates.

The Application is Mitchell On Demand 5 if that helps.

Any help would be greatly appreciated!
 
Hi

I'm not familiar the app but it could be that the users do not have permissions to access / change files that the program needs to. Try giving everyone full access to the folder that the program creates and see if that fixes it. If it does then you could leave it as it is or add only certain users to the list.

Hope this helps

[lightsaber] May The Force Be With You [trooper] [yoda]
 
Still no go. You can't install the application without Admin Privileges. So I Log on as Admin, install application. Log Off. Log on as a User with User and Power User Privileges. Run Application. App runs still gets to same point and just closes right to desktop.
No Error messages or anything of the sort.
 
This sounds like a rights issue, I agree with TSSTechie. If you tried giving User full access to this directory and that didn't work, there may be registry issues as far as access rights go.
 
Is there anything showing up in the Event Viewer under Application or System?

Also see if there is any information here.

Documents and Settings/ All Users/ Application Data/ Microsoft/ Dr Watson/ drwtsn32.log
 
try going to sysinternals.com and downloading the filemon program.. run it, then try and run your application as the user and see if theres any "not found" or "permission denied" messages in the list
 
Well, here's the Dr Watson Dump if anyone can make head or tails of it I would appreciate it. This is what is logged when the User has User or Power User Rights. Admin rights works perfectly.

Thanks in advance for all the help!


Application exception occurred:
App: C:\Mitchell1\OnDemand5\Od5.exe (pid=2496)
When: 6/13/2003 @ 08:54:04.394
Exception number: c0000005 (access violation)

*----> System Information <----*
Computer Name: SUPPORT1
User Name: XXX XXXXXX
Terminal Session Id: 0
Number of Processors: 1
Processor Type: x86 Family 6 Model 4 Stepping 2
Windows Version: 5.1
Current Build: 2600
Service Pack: 1
Current Type: Uniprocessor Free
Registered Organization: XXXXX XXXXXXXXXX
Registered Owner: XXX XXXXXXXX

*----> Task List <----*
0 System Process
4 Error 0xD0000022
508 Error 0xD0000022
564 Error 0xD0000022
600 Error 0xD0000022
644 Error 0xD0000022
656 Error 0xD0000022
824 Error 0xD0000022
872 Error 0xD0000022
1024 Error 0xD0000022
1064 Error 0xD0000022
1152 Error 0xD0000022
1180 Error 0xD0000022
1396 Error 0xD0000022
1432 Error 0xD0000022
1456 Error 0xD0000022
1476 Error 0xD0000022
1516 Error 0xD0000022
1548 Error 0xD0000022
1632 Error 0xD0000022
1656 Error 0xD0000022
1772 Error 0xD0000022
1788 Error 0xD0000022
1844 Error 0xD0000022
240 Error 0xD0000022
1080 Error 0xD0000022
2572 Error 0xD0000022
2596 Error 0xD0000022
2468 Error 0xD0000022
3612 Explorer.EXE
2428 NVATray.exe
2148 evntsvc.exe
2364 ccApp.exe
3996 ctfmon.exe
2820 AcroTray.exe
3380 Error 0xD0000022
3348 msmsgs.exe
2496 Od5.exe
2964 drwtsn32.exe

*----> Module List <----*
(0000000000400000 - 00000000004d8000: C:\Mitchell1\OnDemand5\Od5.exe
(00000000004e0000 - 0000000000610000: C:\Mitchell1\OnDemand5\GEAR32PD.dll
(0000000001020000 - 000000000103a000: C:\Program Files\Common Files\MRIC\DevcorEventReport.dll
(0000000005f10000 - 0000000005f98000: C:\WINDOWS\System32\shdoclc.dll
(0000000005ff0000 - 0000000006001000: C:\WINDOWS\IME\SPGRMR.DLL
(0000000006020000 - 000000000607b000: C:\Program Files\Common Files\Microsoft Shared\Ink\SKCHUI.DLL
(00000000060d0000 - 00000000060eb000: C:\Program Files\Common Files\Symantec Shared\Script Blocking\scrauth.dll
(0000000006100000 - 000000000611e000: C:\Program Files\Common Files\Symantec Shared\Script Blocking\ScrBlock.dll
(000000000f9c0000 - 000000000fa22000: C:\WINDOWS\System32\expsrv.dll
(000000000ffd0000 - 000000000fff3000: C:\WINDOWS\System32\rsaenh.dll
(0000000010000000 - 0000000010019000: C:\Mitchell1\OnDemand5\FigureFrame.dll
(000000001a400000 - 000000001a47a000: C:\WINDOWS\system32\urlmon.dll
(000000001b000000 - 000000001b16f000: C:\WINDOWS\System32\MSJET40.DLL
(000000001b5c0000 - 000000001b655000: C:\WINDOWS\System32\mswstr10.dll
(000000001b730000 - 000000001b7b7000: C:\Program Files\Common Files\Microsoft Shared\DAO\DAO360.DLL
(0000000028000000 - 00000000281b2000: C:\Mitchell1\OnDemand5\dten600.dll
(0000000030000000 - 000000003001c000: C:\Mitchell1\OnDemand5\DUNZIP32.dll
(0000000055900000 - 0000000055961000: C:\WINDOWS\System32\MSVCP60.dll
(000000005ad70000 - 000000005ada4000: C:\WINDOWS\System32\uxtheme.dll
(000000005b770000 - 000000005b785000: C:\WINDOWS\System32\TAPIUI.DLL
(000000005c2c0000 - 000000005c2fc000: C:\WINDOWS\ime\sptip.dll
(00000000605d0000 - 00000000605d8000: C:\WINDOWS\System32\mslbui.dll
(0000000063580000 - 000000006382e000: C:\WINDOWS\System32\mshtml.dll
(0000000066880000 - 000000006688a000: C:\WINDOWS\System32\imgutil.dll
(0000000066e50000 - 0000000066e8b000: C:\WINDOWS\System32\iepeers.dll
(000000006b700000 - 000000006b790000: c:\windows\system32\jscript.dll
(0000000070a70000 - 0000000070ad4000: C:\WINDOWS\system32\SHLWAPI.dll
(0000000071700000 - 0000000071849000: C:\WINDOWS\System32\shdocvw.dll
(0000000071950000 - 0000000071a34000: C:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.10.0_x-ww_f7fb5805\comctl32.dll
(0000000071b20000 - 0000000071b31000: C:\WINDOWS\system32\MPR.dll
(0000000071bf0000 - 0000000071c01000: C:\WINDOWS\System32\SAMLIB.dll
(0000000071c10000 - 0000000071c1d000: C:\WINDOWS\System32\ntlanman.dll
(0000000071c20000 - 0000000071c6e000: C:\WINDOWS\System32\netapi32.dll
(0000000071c80000 - 0000000071c86000: C:\WINDOWS\System32\NETRAP.dll
(0000000071c90000 - 0000000071ccc000: C:\WINDOWS\System32\NETUI1.dll
(0000000071cd0000 - 0000000071ce6000: C:\WINDOWS\System32\NETUI0.dll
(0000000072d10000 - 0000000072d18000: C:\WINDOWS\System32\msacm32.drv
(0000000072d20000 - 0000000072d29000: C:\WINDOWS\System32\wdmaud.drv
(0000000072e00000 - 0000000072f15000: C:\WINDOWS\system32\msxml3.dll
(0000000073000000 - 0000000073023000: C:\WINDOWS\System32\WINSPOOL.DRV
(0000000073d50000 - 0000000073d60000: C:\WINDOWS\System32\cryptnet.dll
(0000000073dd0000 - 0000000073ec2000: C:\WINDOWS\System32\MFC42.DLL
(00000000746c0000 - 00000000746e7000: C:\WINDOWS\System32\MSLS31.DLL
(00000000746f0000 - 0000000074716000: C:\WINDOWS\System32\msimtf.dll
(0000000074720000 - 0000000074764000: C:\WINDOWS\System32\MSCTF.dll
(0000000074770000 - 00000000747ff000: C:\WINDOWS\System32\MLANG.dll
(0000000074c80000 - 0000000074cac000: C:\WINDOWS\System32\OLEACC.dll
(0000000074cb0000 - 0000000074d1f000: C:\WINDOWS\System32\mshtmled.dll
(0000000075a70000 - 0000000075b15000: C:\WINDOWS\system32\userenv.dll
(0000000075e90000 - 0000000075f37000: C:\WINDOWS\System32\SXS.DLL
(0000000075f40000 - 0000000075f5f000: C:\WINDOWS\system32\appHelp.dll
(0000000075f60000 - 0000000075f66000: C:\WINDOWS\System32\drprov.dll
(0000000075f70000 - 0000000075f79000: C:\WINDOWS\System32\davclnt.dll
(0000000076200000 - 0000000076298000: C:\WINDOWS\system32\WININET.dll
(00000000762a0000 - 00000000762af000: C:\WINDOWS\system32\MSASN1.dll
(00000000762c0000 - 0000000076348000: C:\WINDOWS\system32\CRYPT32.dll
(00000000763b0000 - 00000000763f5000: C:\WINDOWS\system32\comdlg32.dll
(0000000076400000 - 0000000076601000: C:\WINDOWS\System32\msi.dll
(0000000076670000 - 0000000076757000: C:\WINDOWS\System32\SETUPAPI.dll
(0000000076b40000 - 0000000076b6c000: C:\WINDOWS\System32\WINMM.dll
(0000000076c30000 - 0000000076c5b000: C:\WINDOWS\System32\wintrust.dll
(0000000076c90000 - 0000000076cb2000: C:\WINDOWS\system32\IMAGEHLP.dll
(0000000076f60000 - 0000000076f8c000: C:\WINDOWS\system32\WLDAP32.dll
(0000000076f90000 - 0000000076fa0000: C:\WINDOWS\System32\Secur32.dll
(0000000076fd0000 - 0000000077048000: C:\WINDOWS\System32\CLBCATQ.DLL
(0000000077050000 - 0000000077115000: C:\WINDOWS\System32\COMRes.dll
(0000000077120000 - 00000000771ab000: C:\WINDOWS\system32\OLEAUT32.dll
(00000000771b0000 - 00000000772d1000: C:\WINDOWS\system32\ole32.dll
(0000000077340000 - 00000000773cb000: C:\WINDOWS\system32\COMCTL32.dll
(00000000773d0000 - 0000000077bc2000: C:\WINDOWS\system32\SHELL32.dll
(0000000077bd0000 - 0000000077bd7000: C:\WINDOWS\System32\midimap.dll
(0000000077be0000 - 0000000077bf4000: C:\WINDOWS\System32\MSACM32.dll
(0000000077c00000 - 0000000077c07000: C:\WINDOWS\system32\VERSION.dll
(0000000077c10000 - 0000000077c63000: C:\WINDOWS\system32\msvcrt.dll
(0000000077c70000 - 0000000077cb0000: C:\WINDOWS\system32\GDI32.dll
(0000000077d40000 - 0000000077dc6000: C:\WINDOWS\system32\USER32.dll
(0000000077dd0000 - 0000000077e5d000: C:\WINDOWS\system32\ADVAPI32.dll
(0000000077e60000 - 0000000077f46000: C:\WINDOWS\system32\kernel32.dll
(0000000077f50000 - 0000000077ff7000: C:\WINDOWS\System32\ntdll.dll
(0000000078000000 - 000000007807f000: C:\WINDOWS\system32\RPCRT4.dll

*----> State Dump for Thread Id 0x648 <----*

eax=00000020 ebx=77c3da4e ecx=7ffde000 edx=00000020 esi=00000000 edi=ffffffff
eip=77f5b2ab esp=00127b50 ebp=00127b88 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202

*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\System32\ntdll.dll -
function: ntdll!RtlEnterCriticalSection
77f5b299 cc int 3
77f5b29a cc int 3
77f5b29b cc int 3
77f5b29c cc int 3
77f5b29d cc int 3
77f5b29e cc int 3
77f5b29f cc int 3
ntdll!RtlEnterCriticalSection:
77f5b2a0 648b0d18000000 mov ecx,fs:[00000018]
77f5b2a7 8b542404 mov edx,[esp+0x4]
FAULT ->77f5b2ab 837a1400 cmp dword ptr [edx+0x14],0x0 ds:0023:00000034=????????
77f5b2af 754f jnz ntdll!RtlEnterCriticalSection+0x60 (77f5b300)
77f5b2b1 f0ff4204 lock inc dword ptr [edx+0x4]
77f5b2b5 7519 jnz ntdll!RtlEnterCriticalSection+0x30 (77f5b2d0)
77f5b2b7 8b4124 mov eax,[ecx+0x24]
77f5b2ba 89420c mov [edx+0xc],eax
77f5b2bd c7420801000000 mov dword ptr [edx+0x8],0x1
77f5b2c4 33c0 xor eax,eax
77f5b2c6 c20400 ret 0x4
77f5b2c9 8da42400000000 lea esp,[esp]
77f5b2d0 8b4124 mov eax,[ecx+0x24]

*----> Stack Back Trace <----*
*** WARNING: Unable to verify checksum for C:\Mitchell1\OnDemand5\Od5.exe
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\Mitchell1\OnDemand5\Od5.exe -
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
00127b88 0042e277 00a350f0 00000001 00000007 ntdll!RtlEnterCriticalSection+0xb
77c5ace0 00000fc0 00fa2008 00000009 00000003 Od5!CDirTreeCtrl__InsertTreeItem+0x9087

*----> Raw Stack Dump <----*
0000000000127b50 2d 94 c3 77 20 00 00 00 - 4c e5 c3 77 00 00 00 00 -..w ...L..w....
0000000000127b60 ff ff ff ff 00 00 00 00 - 4e da c3 77 f0 50 a3 00 ........N..w.P..
0000000000127b70 60 7b 12 00 78 77 12 00 - c0 7c 12 00 b0 3e c3 77 `{..xw...|...>.w
0000000000127b80 b0 46 c1 77 ff ff ff ff - e0 ac c5 77 77 e2 42 00 .F.w.......ww.B.
0000000000127b90 f0 50 a3 00 01 00 00 00 - 07 00 00 00 00 00 00 00 .P..............
0000000000127ba0 d0 86 f2 00 06 00 00 00 - 00 00 00 00 d8 7d 12 00 .............}..
0000000000127bb0 f0 50 a3 00 a0 50 a3 00 - 30 30 35 34 58 1c ea 73 .P...P..0054X..s
0000000000127bc0 3c 68 74 6d 6c 3e 0a 00 - e4 7b 12 00 f2 3e e6 73 <html>...{...>.s
0000000000127bd0 00 00 00 00 f0 7b 12 00 - 6a 18 dd 73 48 7c 12 00 .....{..j..sH|..
0000000000127be0 48 7c 12 00 00 7c 12 00 - c4 2d e6 73 09 18 dd 73 H|...|...-.s...s
0000000000127bf0 49 1b dd 73 88 00 ea 73 - 40 00 00 00 02 00 00 00 I..s...s@.......
0000000000127c00 94 7c 12 00 f4 4a a3 00 - 78 00 ea 73 f8 7b 12 00 .|...J..x..s.{..
0000000000127c10 94 7c 12 00 00 00 00 00 - 55 c0 c1 77 0c 3f dd 73 .|......U..w.?.s
0000000000127c20 40 51 a3 00 a4 7c 12 00 - 02 00 00 00 40 51 a3 00 @Q...|......@Q..
0000000000127c30 58 1c ea 73 00 00 00 00 - 02 00 00 00 94 7c 12 00 X..s.........|..
0000000000127c40 02 00 00 00 55 c0 c1 77 - 10 41 dd 73 5a 51 a3 00 ....U..w.A.sZQ..
0000000000127c50 a4 7c 12 00 02 00 00 00 - 09 18 dd 73 88 00 ea 73 .|.........s...s
0000000000127c60 d0 86 f2 00 87 89 f2 00 - 98 7c 12 00 59 19 dd 73 .........|..Y..s
0000000000127c70 36 19 dd 73 54 4f a3 00 - 5d 51 a3 00 0f e1 42 00 6..sTO..]Q....B.
0000000000127c80 d8 7d 12 00 06 00 00 00 - d0 86 f2 00 09 00 00 00 .}..............

*----> State Dump for Thread Id 0x70c <----*

eax=7801747a ebx=0016a670 ecx=77f57d70 edx=00000000 esi=00000100 edi=00000000
eip=7ffe0304 esp=00f1fe28 ebp=00f1ff90 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000202

function: <nosymbols>
7ffe02f2 0000 add [eax],al
7ffe02f4 0000 add [eax],al
7ffe02f6 0000 add [eax],al
*SharedUserSystemCall:
7ffe02f8 0000 add [eax],al
7ffe02fa 0000 add [eax],al
7ffe02fc 0000 add [eax],al
7ffe02fe 0000 add [eax],al
7ffe0300 8bd4 mov edx,esp
7ffe0302 0f34 sysenter
7ffe0304 c3 ret
7ffe0305 9c pushfd
7ffe0306 810c2400010000 or dword ptr [esp],0x100
7ffe030d 9d popfd
7ffe030e c3 ret
7ffe030f 8bd4 mov edx,esp
7ffe0311 0f05 syscall
7ffe0313 c3 ret
7ffe0314 9c pushfd
7ffe0315 810c2400010000 or dword ptr [esp],0x100
7ffe031c 9d popfd

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\RPCRT4.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\comdlg32.dll -
ChildEBP RetAddr Args to Child
00f1fe24 77f5c084 78016ab0 00000130 00f1ff80 *SharedUserSystemCall+0xc (FPO: [0,0,0])
00f1ff90 78016e77 780192f9 00159790 77fa88f0 ntdll!NtReplyWaitReceivePortEx+0xc
0015e9a0 ffffffff 00000140 00000144 00000000 RPCRT4!I_RpcBindingInqLocalClientPID+0x3a41
00000000 00000000 00000000 00000000 00000000 0xffffffff

*----> Raw Stack Dump <----*
0000000000f1fe28 84 c0 f5 77 b0 6a 01 78 - 30 01 00 00 80 ff f1 00 ...w.j.x0.......
0000000000f1fe38 00 00 00 00 70 a6 16 00 - 60 ff f1 00 96 70 5e 80 ....p...`....p^.
0000000000f1fe48 40 00 00 00 18 3e c3 81 - 70 e4 3a e2 47 03 00 00 @....>..p.:.G...
0000000000f1fe58 46 03 00 00 5c 74 3c 82 - 20 80 e3 81 02 00 00 00 F...\t<. .......
0000000000f1fe68 20 80 e3 81 00 00 00 00 - 00 00 00 00 05 00 00 00 ...............
0000000000f1fe78 00 da be 81 00 00 00 00 - 20 80 e3 81 20 80 e3 81 ........ ... ...
0000000000f1fe88 95 42 5e 80 05 00 00 00 - 05 00 00 00 98 b9 d2 e1 .B^.............
0000000000f1fe98 68 6b 03 e1 02 00 00 00 - fe ff f8 00 e0 2c 65 e2 hk...........,e.
0000000000f1fea8 98 b9 d2 e1 ae 9a 59 00 - 00 00 00 00 00 00 00 00 ......Y.........
0000000000f1feb8 5c 00 52 00 ff ff ff ff - 2c 6c 88 f0 c6 a2 59 80 \.R.....,l....Y.
0000000000f1fec8 49 03 00 00 34 00 00 c0 - 18 3e c3 81 78 f4 00 e1 I...4....>..x...
0000000000f1fed8 bc 3e c3 81 6c 6c 88 f0 - 78 f4 00 e1 08 80 c2 81 .>..ll..x.......
0000000000f1fee8 24 b6 52 80 08 6c 88 f0 - 04 00 00 00 00 00 00 00 $.R..l..........
0000000000f1fef8 08 80 c2 81 24 53 36 82 - 08 6c 88 f0 6d d1 4f 80 ....$S6..l..m.O.
0000000000f1ff08 6a 00 00 00 ff 00 00 00 - 00 00 00 00 2c 6c 88 f0 j...........,l..
0000000000f1ff18 ad b7 52 80 8c eb f6 81 - 46 02 00 00 0f 52 4f 80 ..R.....F....RO.
0000000000f1ff28 5c eb f6 81 f0 e9 f6 81 - 24 ea f6 81 69 6b 61 80 \.......$...ika.
0000000000f1ff38 88 da be 81 f0 e9 f6 81 - e3 69 01 78 60 ff f1 00 .........i.x`...
0000000000f1ff48 fe 69 01 78 c0 b2 15 00 - 18 e2 15 00 a0 e9 15 00 .i.x............
0000000000f1ff58 00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff ../M.....]......

*----> State Dump for Thread Id 0x178 <----*

eax=00000003 ebx=05b3ff7c ecx=1b11fdd0 edx=00000000 esi=00000150 edi=00000000
eip=7ffe0304 esp=05b3feb0 ebp=05b3ff14 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000202

function: <nosymbols>
7ffe02f2 0000 add [eax],al
7ffe02f4 0000 add [eax],al
7ffe02f6 0000 add [eax],al
*SharedUserSystemCall:
7ffe02f8 0000 add [eax],al
7ffe02fa 0000 add [eax],al
7ffe02fc 0000 add [eax],al
7ffe02fe 0000 add [eax],al
7ffe0300 8bd4 mov edx,esp
7ffe0302 0f34 sysenter
7ffe0304 c3 ret
7ffe0305 9c pushfd
7ffe0306 810c2400010000 or dword ptr [esp],0x100
7ffe030d 9d popfd
7ffe030e c3 ret
7ffe030f 8bd4 mov edx,esp
7ffe0311 0f05 syscall
7ffe0313 c3 ret
7ffe0314 9c pushfd
7ffe0315 810c2400010000 or dword ptr [esp],0x100
7ffe031c 9d popfd

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\kernel32.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
05b3feac 77f5c534 77e7a62d 00000150 00000000 *SharedUserSystemCall+0xc (FPO: [0,0,0])
05b3ff14 77e7ac21 00000150 ffffffff 00000000 ntdll!NtWaitForSingleObject+0xc
00000000 00000000 00000000 00000000 00000000 kernel32!WaitForSingleObject+0xf

*----> Raw Stack Dump <----*
0000000005b3feb0 34 c5 f5 77 2d a6 e7 77 - 50 01 00 00 00 00 00 00 4..w-..wP.......
0000000005b3fec0 00 00 00 00 ff ff ff ff - 90 07 64 01 7c ff b3 05 ..........d.|...
0000000005b3fed0 00 00 00 00 00 00 00 00 - 18 ff b3 05 04 ff b3 05 ................
0000000005b3fee0 00 f0 fd 7f 00 c0 fd 7f - 14 00 00 00 01 00 00 00 ................
0000000005b3fef0 00 00 00 00 00 00 00 00 - 10 00 00 00 c4 fe b3 05 ................
0000000005b3ff00 10 08 64 01 dc ff b3 05 - 09 48 e9 77 e0 3a e8 77 ..d......H.w.:.w
0000000005b3ff10 00 00 00 00 00 00 00 00 - 21 ac e7 77 50 01 00 00 ........!..wP...
0000000005b3ff20 ff ff ff ff 00 00 00 00 - 7b 99 00 1b 50 01 00 00 ........{...P...
0000000005b3ff30 ff ff ff ff 43 99 00 1b - ff ff ff ff 7c ff b3 05 ....C.......|...
0000000005b3ff40 33 b3 d1 fa 60 0d 64 01 - 00 00 00 00 d0 fd 11 1b 3...`.d.........
0000000005b3ff50 00 00 00 00 ff ff ff ff - 78 01 00 00 94 35 00 1b ........x....5..
0000000005b3ff60 7c ff b3 05 33 b3 d1 fa - 02 c9 12 ca ec ff b3 05 |...3...........
0000000005b3ff70 d0 fd 11 1b 60 0d 64 01 - 54 01 00 00 01 00 00 00 ....`.d.T.......
0000000005b3ff80 00 00 00 00 30 41 1e 00 - 01 02 00 00 00 00 00 00 ....0A..........
0000000005b3ff90 88 da be 81 78 ab 4f 80 - 00 00 00 00 00 00 00 00 ....x.O.........
0000000005b3ffa0 00 00 00 00 01 00 00 00 - a4 3c 12 f1 c4 28 6b 80 .........<...(k.
0000000005b3ffb0 f4 bf f5 77 1b ee f5 77 - 3b d3 e7 77 d0 fd 11 1b ...w...w;..w....
0000000005b3ffc0 33 b3 d1 fa 02 c9 12 ca - d0 fd 11 1b e0 3c 12 f1 3............<..
0000000005b3ffd0 00 c0 fd 7f c0 ff b3 05 - 07 00 00 00 ff ff ff ff ................
0000000005b3ffe0 09 48 e9 77 b8 3d e8 77 - 00 00 00 00 00 00 00 00 .H.w.=.w........

*----> State Dump for Thread Id 0x1e0 <----*

eax=1b0034a3 ebx=05c3ff7c ecx=a3c8388c edx=00000000 esi=00000150 edi=00000000
eip=7ffe0304 esp=05c3feb0 ebp=05c3ff14 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000202

function: <nosymbols>
7ffe02f2 0000 add [eax],al
7ffe02f4 0000 add [eax],al
7ffe02f6 0000 add [eax],al
*SharedUserSystemCall:
7ffe02f8 0000 add [eax],al
7ffe02fa 0000 add [eax],al
7ffe02fc 0000 add [eax],al
7ffe02fe 0000 add [eax],al
7ffe0300 8bd4 mov edx,esp
7ffe0302 0f34 sysenter
7ffe0304 c3 ret
7ffe0305 9c pushfd
7ffe0306 810c2400010000 or dword ptr [esp],0x100
7ffe030d 9d popfd
7ffe030e c3 ret
7ffe030f 8bd4 mov edx,esp
7ffe0311 0f05 syscall
7ffe0313 c3 ret
7ffe0314 9c pushfd
7ffe0315 810c2400010000 or dword ptr [esp],0x100
7ffe031c 9d popfd

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
05c3feac 77f5c534 77e7a62d 00000150 00000000 *SharedUserSystemCall+0xc (FPO: [0,0,0])
05c3ff14 77e7ac21 00000150 00001388 00000000 ntdll!NtWaitForSingleObject+0xc
00000000 00000000 00000000 00000000 00000000 kernel32!WaitForSingleObject+0xf

*----> Raw Stack Dump <----*
0000000005c3feb0 34 c5 f5 77 2d a6 e7 77 - 50 01 00 00 00 00 00 00 4..w-..wP.......
0000000005c3fec0 d8 fe c3 05 88 13 00 00 - 90 07 64 01 7c ff c3 05 ..........d.|...
0000000005c3fed0 04 ff c3 05 d8 fe c3 05 - 80 0f 05 fd ff ff ff ff ................
0000000005c3fee0 00 f0 fd 7f 00 b0 fd 7f - 14 00 00 00 01 00 00 00 ................
0000000005c3fef0 00 00 00 00 00 00 00 00 - 10 00 00 00 c4 fe c3 05 ................
0000000005c3ff00 10 08 64 01 dc ff c3 05 - 09 48 e9 77 e0 3a e8 77 ..d......H.w.:.w
0000000005c3ff10 00 00 00 00 00 00 00 00 - 21 ac e7 77 50 01 00 00 ........!..wP...
0000000005c3ff20 88 13 00 00 00 00 00 00 - 7b 99 00 1b 50 01 00 00 ........{...P...
0000000005c3ff30 88 13 00 00 43 99 00 1b - 88 13 00 00 7c ff c3 05 ....C.......|...
0000000005c3ff40 33 b3 d1 fa 60 4a 64 01 - 00 00 00 00 d0 fd 11 1b 3...`Jd.........
0000000005c3ff50 00 00 00 00 88 13 00 00 - e0 01 00 00 94 35 00 1b .............5..
0000000005c3ff60 7c ff c3 05 33 b3 d1 fa - 02 c9 12 ca ec ff c3 05 |...3...........
0000000005c3ff70 d0 fd 11 1b 60 4a 64 01 - 5c 01 00 00 01 00 00 00 ....`Jd.\.......
0000000005c3ff80 00 00 00 00 01 01 00 01 - 01 00 00 00 00 00 00 00 ................
0000000005c3ff90 88 da be 81 78 ab 4f 80 - 00 00 00 00 00 00 00 00 ....x.O.........
0000000005c3ffa0 00 00 00 00 01 00 00 00 - a4 6c d3 f0 c4 28 6b 80 .........l...(k.
0000000005c3ffb0 f4 bf f5 77 1b ee f5 77 - 3b d3 e7 77 d0 fd 11 1b ...w...w;..w....
0000000005c3ffc0 33 b3 d1 fa 02 c9 12 ca - d0 fd 11 1b 00 00 00 00 3...............
0000000005c3ffd0 00 b0 fd 7f c0 ff c3 05 - 07 00 00 00 ff ff ff ff ................
0000000005c3ffe0 09 48 e9 77 b8 3d e8 77 - 00 00 00 00 00 00 00 00 .H.w.=.w........

*----> State Dump for Thread Id 0xf4c <----*

eax=1b0034a3 ebx=05d3ff7c ecx=a3c8388c edx=00000000 esi=00000150 edi=00000000
eip=7ffe0304 esp=05d3feb0 ebp=05d3ff14 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000202

function: <nosymbols>
7ffe02f2 0000 add [eax],al
7ffe02f4 0000 add [eax],al
7ffe02f6 0000 add [eax],al
*SharedUserSystemCall:
7ffe02f8 0000 add [eax],al
7ffe02fa 0000 add [eax],al
7ffe02fc 0000 add [eax],al
7ffe02fe 0000 add [eax],al
7ffe0300 8bd4 mov edx,esp
7ffe0302 0f34 sysenter
7ffe0304 c3 ret
7ffe0305 9c pushfd
7ffe0306 810c2400010000 or dword ptr [esp],0x100
7ffe030d 9d popfd
7ffe030e c3 ret
7ffe030f 8bd4 mov edx,esp
7ffe0311 0f05 syscall
7ffe0313 c3 ret
7ffe0314 9c pushfd
7ffe0315 810c2400010000 or dword ptr [esp],0x100
7ffe031c 9d popfd

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
05d3feac 77f5c534 77e7a62d 00000150 00000000 *SharedUserSystemCall+0xc (FPO: [0,0,0])
05d3ff14 77e7ac21 00000150 ffffffff 00000000 ntdll!NtWaitForSingleObject+0xc
00000000 00000000 00000000 00000000 00000000 kernel32!WaitForSingleObject+0xf

*----> Raw Stack Dump <----*
0000000005d3feb0 34 c5 f5 77 2d a6 e7 77 - 50 01 00 00 00 00 00 00 4..w-..wP.......
0000000005d3fec0 00 00 00 00 ff ff ff ff - 90 07 64 01 7c ff d3 05 ..........d.|...
0000000005d3fed0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000005d3fee0 00 f0 fd 7f 00 a0 fd 7f - 14 00 00 00 01 00 00 00 ................
0000000005d3fef0 00 00 00 00 00 00 00 00 - 10 00 00 00 c4 fe d3 05 ................
0000000005d3ff00 46 02 00 00 dc ff d3 05 - 09 48 e9 77 e0 3a e8 77 F........H.w.:.w
0000000005d3ff10 00 00 00 00 00 00 00 00 - 21 ac e7 77 50 01 00 00 ........!..wP...
0000000005d3ff20 ff ff ff ff 00 00 00 00 - 7b 99 00 1b 50 01 00 00 ........{...P...
0000000005d3ff30 ff ff ff ff 43 99 00 1b - ff ff ff ff 7c ff d3 05 ....C.......|...
0000000005d3ff40 33 b3 d1 fa 02 c9 12 ca - 00 00 00 00 d0 fd 11 1b 3...............
0000000005d3ff50 00 00 00 00 ff ff ff ff - 4c 0f 00 00 94 35 00 1b ........L....5..
0000000005d3ff60 7c ff d3 05 33 b3 d1 fa - 02 c9 12 ca ec ff d3 05 |...3...........
0000000005d3ff70 d0 fd 11 1b 88 da be 81 - 64 01 00 00 01 00 00 00 ........d.......
0000000005d3ff80 00 00 00 00 00 00 00 00 - 01 00 00 00 00 00 00 00 ................
0000000005d3ff90 88 da be 81 78 ab 4f 80 - 00 00 00 00 00 00 00 00 ....x.O.........
0000000005d3ffa0 00 00 00 00 01 00 00 00 - a4 6c d7 f0 c4 28 6b 80 .........l...(k.
0000000005d3ffb0 f4 bf f5 77 1b ee f5 77 - 3b d3 e7 77 d0 fd 11 1b ...w...w;..w....
0000000005d3ffc0 33 b3 d1 fa 02 c9 12 ca - d0 fd 11 1b 00 00 00 00 3...............
0000000005d3ffd0 00 a0 fd 7f c0 ff d3 05 - 07 00 00 00 ff ff ff ff ................
0000000005d3ffe0 09 48 e9 77 b8 3d e8 77 - 00 00 00 00 00 00 00 00 .H.w.=.w........

*----> State Dump for Thread Id 0x21c <----*

eax=00000202 ebx=77f5b2a0 ecx=06fcd010 edx=00000000 esi=00000200 edi=00000000
eip=7ffe0304 esp=06a3ff18 ebp=06a3ff7c iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000202

function: <nosymbols>
7ffe02f2 0000 add [eax],al
7ffe02f4 0000 add [eax],al
7ffe02f6 0000 add [eax],al
*SharedUserSystemCall:
7ffe02f8 0000 add [eax],al
7ffe02fa 0000 add [eax],al
7ffe02fc 0000 add [eax],al
7ffe02fe 0000 add [eax],al
7ffe0300 8bd4 mov edx,esp
7ffe0302 0f34 sysenter
7ffe0304 c3 ret
7ffe0305 9c pushfd
7ffe0306 810c2400010000 or dword ptr [esp],0x100
7ffe030d 9d popfd
7ffe030e c3 ret
7ffe030f 8bd4 mov edx,esp
7ffe0311 0f05 syscall
7ffe0313 c3 ret
7ffe0314 9c pushfd
7ffe0315 810c2400010000 or dword ptr [esp],0x100
7ffe031c 9d popfd

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
06a3ff14 77f5c534 77e7a62d 00000200 00000000 *SharedUserSystemCall+0xc (FPO: [0,0,0])
06a3ff7c 77e7ac21 00000200 000927c0 00000000 ntdll!NtWaitForSingleObject+0xc
77f5b380 4affc033 89257508 fff00c42 037d044a kernel32!WaitForSingleObject+0xf
0424548b 00000000 00000000 00000000 00000000 0x4affc033

*----> Raw Stack Dump <----*
0000000006a3ff18 34 c5 f5 77 2d a6 e7 77 - 00 02 00 00 00 00 00 00 4..w-..w........
0000000006a3ff28 40 ff a3 06 00 00 00 00 - 40 2a 54 06 a0 b2 f5 77 @.......@*T....w
0000000006a3ff38 00 00 00 00 40 ff a3 06 - 00 44 5f 9a fe ff ff ff ....@....D_.....
0000000006a3ff48 00 f0 fd 7f 00 90 fd 7f - 14 00 00 00 01 00 00 00 ................
0000000006a3ff58 00 00 00 00 00 00 00 00 - 10 00 00 00 2c ff a3 06 ............,...
0000000006a3ff68 00 00 00 00 dc ff a3 06 - 09 48 e9 77 e0 3a e8 77 .........H.w.:.w
0000000006a3ff78 00 00 00 00 80 b3 f5 77 - 21 ac e7 77 00 02 00 00 .......w!..w....
0000000006a3ff88 c0 27 09 00 00 00 00 00 - 3c cb 67 63 00 02 00 00 .'......<.gc....
0000000006a3ff98 c0 27 09 00 e0 21 1c 00 - 40 2a 54 06 ec ff a3 06 .'...!..@*T.....
0000000006a3ffa8 40 2a 54 06 8e ca 67 63 - 00 f0 1c 00 68 ca 67 63 @*T...gc....h.gc
0000000006a3ffb8 3b d3 e7 77 40 2a 54 06 - e0 21 1c 00 00 f0 1c 00 ;..w@*T..!......
0000000006a3ffc8 40 2a 54 06 f8 8e b8 81 - 00 90 fd 7f c0 ff a3 06 @*T.............
0000000006a3ffd8 07 00 00 00 ff ff ff ff - 09 48 e9 77 b8 3d e8 77 .........H.w.=.w
0000000006a3ffe8 00 00 00 00 00 00 00 00 - 00 00 00 00 5f ca 67 63 ............_.gc
0000000006a3fff8 40 2a 54 06 00 00 00 00 - 00 00 00 00 00 00 00 00 @*T.............
0000000006a40008 ff ff ff ff c0 00 00 00 - 74 21 08 06 74 21 08 06 ........t!..t!..
0000000006a40018 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000006a40028 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000006a40038 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000006a40048 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

*----> State Dump for Thread Id 0x210 <----*

eax=762dc4fa ebx=06e3ff38 ecx=77f944a8 edx=00000000 esi=00000000 edi=7ffdf000
eip=7ffe0304 esp=06e3fef0 ebp=06e3ff8c iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000202

function: <nosymbols>
7ffe02f2 0000 add [eax],al
7ffe02f4 0000 add [eax],al
7ffe02f6 0000 add [eax],al
*SharedUserSystemCall:
7ffe02f8 0000 add [eax],al
7ffe02fa 0000 add [eax],al
7ffe02fc 0000 add [eax],al
7ffe02fe 0000 add [eax],al
7ffe0300 8bd4 mov edx,esp
7ffe0302 0f34 sysenter
7ffe0304 c3 ret
7ffe0305 9c pushfd
7ffe0306 810c2400010000 or dword ptr [esp],0x100
7ffe030d 9d popfd
7ffe030e c3 ret
7ffe030f 8bd4 mov edx,esp
7ffe0311 0f05 syscall
7ffe0313 c3 ret
7ffe0314 9c pushfd
7ffe0315 810c2400010000 or dword ptr [esp],0x100
7ffe031c 9d popfd

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\CRYPT32.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
06e3feec 77f5c524 77e75ee0 00000001 06e3ff38 *SharedUserSystemCall+0xc (FPO: [0,0,0])
06e3ff8c 762dc51f 00000001 001f1e38 00000000 ntdll!NtWaitForMultipleObjects+0xc
00000001 00000000 00000000 00000000 00000000 CRYPT32!CertEnumPhysicalStore+0x678

*----> Raw Stack Dump <----*
0000000006e3fef0 24 c5 f5 77 e0 5e e7 77 - 01 00 00 00 38 ff e3 06 $..w.^.w....8...
0000000006e3ff00 01 00 00 00 00 00 00 00 - 24 ff e3 06 38 1e 1f 00 ........$...8...
0000000006e3ff10 30 1e 1f 00 00 00 00 00 - 00 00 00 00 02 01 00 00 0...............
0000000006e3ff20 24 ff e3 06 80 2e 0f f7 - ff ff ff ff 01 00 00 00 $...............
0000000006e3ff30 00 f0 fd 7f 00 80 fd 7f - 40 02 00 00 c8 93 be 81 ........@.......
0000000006e3ff40 00 80 fd 7f 00 00 00 00 - 8c ec d3 f0 9c af 4f 80 ..............O.
0000000006e3ff50 13 d1 2e 76 1c 9f 33 76 - 38 ff e3 06 4a d1 2e 76 ...v..3v8...J..v
0000000006e3ff60 14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000006e3ff70 10 00 00 00 0c ff e3 06 - 00 00 00 00 dc ff e3 06 ................
0000000006e3ff80 09 48 e9 77 78 32 e8 77 - 00 00 00 00 01 00 00 00 .H.wx2.w........
0000000006e3ff90 1f c5 2d 76 01 00 00 00 - 38 1e 1f 00 00 00 00 00 ..-v....8.......
0000000006e3ffa0 98 3a 00 00 00 00 00 00 - 80 df 12 00 f0 88 fa 77 .:.............w
0000000006e3ffb0 ec ff e3 06 30 1e 1f 00 - 3b d3 e7 77 30 1e 1f 00 ....0...;..w0...
0000000006e3ffc0 80 df 12 00 f0 88 fa 77 - 30 1e 1f 00 00 00 00 00 .......w0.......
0000000006e3ffd0 00 80 fd 7f c0 ff e3 06 - 07 00 00 00 ff ff ff ff ................
0000000006e3ffe0 09 48 e9 77 b8 3d e8 77 - 00 00 00 00 00 00 00 00 .H.w.=.w........
0000000006e3fff0 00 00 00 00 fa c4 2d 76 - 30 1e 1f 00 00 00 00 00 ......-v0.......
0000000006e40000 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000006e40010 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000006e40020 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

*----> State Dump for Thread Id 0xcc <----*

eax=000000c0 ebx=00000000 ecx=00000000 edx=00000000 esi=00000000 edi=00000001
eip=7ffe0304 esp=06f3fcec ebp=06f3ffb4 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202

function: <nosymbols>
7ffe02f2 0000 add [eax],al
7ffe02f4 0000 add [eax],al
7ffe02f6 0000 add [eax],al
*SharedUserSystemCall:
7ffe02f8 0000 add [eax],al
7ffe02fa 0000 add [eax],al
7ffe02fc 0000 add [eax],al
7ffe02fe 0000 add [eax],al
7ffe0300 8bd4 mov edx,esp
7ffe0302 0f34 sysenter
7ffe0304 c3 ret
7ffe0305 9c pushfd
7ffe0306 810c2400010000 or dword ptr [esp],0x100
7ffe030d 9d popfd
7ffe030e c3 ret
7ffe030f 8bd4 mov edx,esp
7ffe0311 0f05 syscall
7ffe0313 c3 ret
7ffe0314 9c pushfd
7ffe0315 810c2400010000 or dword ptr [esp],0x100
7ffe031c 9d popfd

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
06f3fce8 77f5c524 77f91f83 00000014 06f3fd30 *SharedUserSystemCall+0xc (FPO: [0,0,0])
06f3ffb4 77e7d33b 00000000 00000000 00000000 ntdll!NtWaitForMultipleObjects+0xc
06f3ffec 00000000 77f91e38 00000000 00000000 kernel32!RegisterWaitForInputIdle+0x43

*----> Raw Stack Dump <----*
0000000006f3fcec 24 c5 f5 77 83 1f f9 77 - 14 00 00 00 30 fd f3 06 $..w...w....0...
0000000006f3fcfc 01 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000006f3fd0c 00 00 00 00 00 00 00 00 - 20 5a fc 77 20 5a fc 77 ........ Z.w Z.w
0000000006f3fd1c 50 02 00 00 cc 00 00 00 - 14 00 00 00 14 00 00 00 P...............
0000000006f3fd2c 13 00 00 00 4c 02 00 00 - 84 01 00 00 a0 02 00 00 ....L...........
0000000006f3fd3c a8 02 00 00 b0 02 00 00 - bc 02 00 00 d4 02 00 00 ................
0000000006f3fd4c dc 02 00 00 e8 02 00 00 - f8 02 00 00 04 03 00 00 ................
0000000006f3fd5c 0c 03 00 00 18 03 00 00 - 24 03 00 00 30 03 00 00 ........$...0...
0000000006f3fd6c 38 03 00 00 5c 03 00 00 - 68 03 00 00 74 03 00 00 8...\...h...t...
0000000006f3fd7c 80 03 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000006f3fd8c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000006f3fd9c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000006f3fdac 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000006f3fdbc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000006f3fdcc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000006f3fddc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000006f3fdec 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000006f3fdfc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000006f3fe0c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000006f3fe1c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

*----> State Dump for Thread Id 0xd74 <----*

eax=00000000 ebx=0713ff18 ecx=7ffd6000 edx=00000000 esi=00000000 edi=7ffdf000
eip=7ffe0304 esp=0713fed0 ebp=0713ff6c iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000202

function: <nosymbols>
7ffe02f2 0000 add [eax],al
7ffe02f4 0000 add [eax],al
7ffe02f6 0000 add [eax],al
*SharedUserSystemCall:
7ffe02f8 0000 add [eax],al
7ffe02fa 0000 add [eax],al
7ffe02fc 0000 add [eax],al
7ffe02fe 0000 add [eax],al
7ffe0300 8bd4 mov edx,esp
7ffe0302 0f34 sysenter
7ffe0304 c3 ret
7ffe0305 9c pushfd
7ffe0306 810c2400010000 or dword ptr [esp],0x100
7ffe030d 9d popfd
7ffe030e c3 ret
7ffe030f 8bd4 mov edx,esp
7ffe0311 0f05 syscall
7ffe0313 c3 ret
7ffe0314 9c pushfd
7ffe0315 810c2400010000 or dword ptr [esp],0x100
7ffe031c 9d popfd

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
0713fecc 77f5c524 77e75ee0 00000003 0713ff18 *SharedUserSystemCall+0xc (FPO: [0,0,0])
0713ff6c 77e75faa 00000003 75b03300 00000000 ntdll!NtWaitForMultipleObjects+0xc
00000000 00000000 00000000 00000000 00000000 kernel32!WaitForMultipleObjects+0x17

*----> Raw Stack Dump <----*
000000000713fed0 24 c5 f5 77 e0 5e e7 77 - 03 00 00 00 18 ff 13 07 $..w.^.w........
000000000713fee0 01 00 00 00 00 00 00 00 - 00 00 00 00 a4 33 b0 75 .............3.u
000000000713fef0 00 00 00 00 f0 a6 e7 77 - 00 00 00 00 00 00 00 00 .......w........
000000000713ff00 00 00 00 00 00 00 01 00 - 00 00 14 00 03 00 00 00 ................
000000000713ff10 00 f0 fd 7f 00 60 fd 7f - c0 02 00 00 c4 02 00 00 .....`..........
000000000713ff20 ec 02 00 00 37 90 f5 77 - 2e d9 e7 77 00 00 14 00 ....7..w...w....
000000000713ff30 00 00 00 00 3e d9 e7 77 - 18 ff 13 07 00 00 14 00 ....>..w........
000000000713ff40 14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000713ff50 10 00 00 00 ec fe 13 07 - 16 00 18 00 dc ff 13 07 ................
000000000713ff60 09 48 e9 77 78 32 e8 77 - 00 00 00 00 00 00 00 00 .H.wx2.w........
000000000713ff70 aa 5f e7 77 03 00 00 00 - 00 33 b0 75 00 00 00 00 ._.w.....3.u....
000000000713ff80 ff ff ff ff 00 00 00 00 - 45 5b a7 75 03 00 00 00 ........E[.u....
000000000713ff90 00 33 b0 75 00 00 00 00 - ff ff ff ff 00 00 14 00 .3.u............
000000000713ffa0 00 00 00 00 7c da 12 00 - ec ff 13 07 00 00 00 00 ....|...........
000000000713ffb0 03 00 00 00 00 00 a7 75 - 3b d3 e7 77 00 00 00 00 .......u;..w....
000000000713ffc0 7c da 12 00 00 00 14 00 - 00 00 00 00 00 00 00 00 |...............
000000000713ffd0 00 60 fd 7f c0 ff 13 07 - 07 00 00 00 ff ff ff ff .`..............
000000000713ffe0 09 48 e9 77 b8 3d e8 77 - 00 00 00 00 00 00 00 00 .H.w.=.w........
000000000713fff0 00 00 00 00 ea 5a a7 75 - 00 00 00 00 00 00 00 00 .....Z.u........
0000000007140000 c8 00 00 00 00 01 00 00 - ff ee ff ee 02 00 00 00 ................

*----> State Dump for Thread Id 0xbcc <----*

eax=77dd8601 ebx=0733fef0 ecx=07140000 edx=00000000 esi=00000000 edi=7ffdf000
eip=7ffe0304 esp=0733fea8 ebp=0733ff44 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000202

function: <nosymbols>
7ffe02f2 0000 add [eax],al
7ffe02f4 0000 add [eax],al
7ffe02f6 0000 add [eax],al
*SharedUserSystemCall:
7ffe02f8 0000 add [eax],al
7ffe02fa 0000 add [eax],al
7ffe02fc 0000 add [eax],al
7ffe02fe 0000 add [eax],al
7ffe0300 8bd4 mov edx,esp
7ffe0302 0f34 sysenter
7ffe0304 c3 ret
7ffe0305 9c pushfd
7ffe0306 810c2400010000 or dword ptr [esp],0x100
7ffe030d 9d popfd
7ffe030e c3 ret
7ffe030f 8bd4 mov edx,esp
7ffe0311 0f05 syscall
7ffe0313 c3 ret
7ffe0314 9c pushfd
7ffe0315 810c2400010000 or dword ptr [esp],0x100
7ffe031c 9d popfd

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\ADVAPI32.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
0733fea4 77f5c524 77e75ee0 00000002 0733fef0 *SharedUserSystemCall+0xc (FPO: [0,0,0])
0733ff44 77dd87a4 00000002 0733ff6c 00000000 ntdll!NtWaitForMultipleObjects+0xc
0733ffb4 77e7d33b 00000000 0012e4c0 00000000 ADVAPI32!WmiQueryAllDataW+0x2c6
0733ffec 00000000 77dd8601 00000000 00000000 kernel32!RegisterWaitForInputIdle+0x43

*----> Raw Stack Dump <----*
000000000733fea8 24 c5 f5 77 e0 5e e7 77 - 02 00 00 00 f0 fe 33 07 $..w.^.w......3.
000000000733feb8 01 00 00 00 01 00 00 00 - dc fe 33 07 b0 30 14 07 ..........3..0..
000000000733fec8 00 82 e3 77 00 10 00 00 - 00 00 00 00 03 01 00 00 ...w............
000000000733fed8 dc fe 33 07 00 a2 2f 4d - ff ff ff ff 02 00 00 00 ..3.../M........
000000000733fee8 00 f0 fd 7f 00 50 fd 7f - 94 03 00 00 a0 03 00 00 .....P..........
000000000733fef8 00 00 00 00 08 00 00 c0 - 00 10 00 00 de 39 f9 77 .............9.w
000000000733ff08 e3 39 f9 77 00 00 00 00 - f0 fe 33 07 00 10 00 00 .9.w......3.....
000000000733ff18 14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000733ff28 10 00 00 00 c4 fe 33 07 - 06 00 00 00 dc ff 33 07 ......3.......3.
000000000733ff38 09 48 e9 77 78 32 e8 77 - 00 00 00 00 b4 ff 33 07 .H.wx2.w......3.
000000000733ff48 a4 87 dd 77 02 00 00 00 - 6c ff 33 07 00 00 00 00 ...w....l.3.....
000000000733ff58 e0 93 04 00 01 00 00 00 - c0 e4 12 00 00 00 00 00 ................
000000000733ff68 00 00 00 00 94 03 00 00 - a0 03 00 00 00 10 00 00 ................
000000000733ff78 b0 30 14 07 00 00 00 00 - 00 10 00 00 b8 40 14 07 .0...........@..
000000000733ff88 c0 97 e3 77 20 00 00 00 - a0 97 e3 77 00 10 00 00 ...w ......w....
000000000733ff98 00 00 00 00 c0 97 e3 77 - b0 30 14 07 a0 97 e3 77 .......w.0.....w
000000000733ffa8 e5 03 00 00 00 10 00 00 - b8 40 14 07 ec ff 33 07 .........@....3.
000000000733ffb8 3b d3 e7 77 00 00 00 00 - c0 e4 12 00 00 00 00 00 ;..w............
000000000733ffc8 00 00 00 00 00 00 00 00 - 00 50 fd 7f c0 ff 33 07 .........P....3.
000000000733ffd8 07 00 00 00 ff ff ff ff - 09 48 e9 77 b8 3d e8 77 .........H.w.=.w

*----> State Dump for Thread Id 0x244 <----*

eax=00000001 ebx=77f5b2a0 ecx=06fd31e0 edx=00000000 esi=000003b4 edi=00000000
eip=7ffe0304 esp=0743ff18 ebp=0743ff7c iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000202

function: <nosymbols>
7ffe02f2 0000 add [eax],al
7ffe02f4 0000 add [eax],al
7ffe02f6 0000 add [eax],al
*SharedUserSystemCall:
7ffe02f8 0000 add [eax],al
7ffe02fa 0000 add [eax],al
7ffe02fc 0000 add [eax],al
7ffe02fe 0000 add [eax],al
7ffe0300 8bd4 mov edx,esp
7ffe0302 0f34 sysenter
7ffe0304 c3 ret
7ffe0305 9c pushfd
7ffe0306 810c2400010000 or dword ptr [esp],0x100
7ffe030d 9d popfd
7ffe030e c3 ret
7ffe030f 8bd4 mov edx,esp
7ffe0311 0f05 syscall
7ffe0313 c3 ret
7ffe0314 9c pushfd
7ffe0315 810c2400010000 or dword ptr [esp],0x100
7ffe031c 9d popfd

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
0743ff14 77f5c534 77e7a62d 000003b4 00000000 *SharedUserSystemCall+0xc (FPO: [0,0,0])
0743ff7c 77e7ac21 000003b4 000927c0 00000000 ntdll!NtWaitForSingleObject+0xc
77f5b380 4affc033 89257508 fff00c42 037d044a kernel32!WaitForSingleObject+0xf
0424548b 00000000 00000000 00000000 00000000 0x4affc033

*----> Raw Stack Dump <----*
000000000743ff18 34 c5 f5 77 2d a6 e7 77 - b4 03 00 00 00 00 00 00 4..w-..w........
000000000743ff28 40 ff 43 07 00 00 00 00 - 60 84 54 06 a0 b2 f5 77 @.C.....`.T....w
000000000743ff38 c8 9d 57 06 40 ff 43 07 - 00 44 5f 9a fe ff ff ff ..W.@.C..D_.....
000000000743ff48 00 f0 fd 7f 00 40 fd 7f - 14 00 00 00 01 00 00 00 .....@..........
000000000743ff58 00 00 00 00 00 00 00 00 - 10 00 00 00 2c ff 43 07 ............,.C.
000000000743ff68 88 9c 7e 63 dc ff 43 07 - 09 48 e9 77 e0 3a e8 77 ..~c..C..H.w.:.w
000000000743ff78 00 00 00 00 80 b3 f5 77 - 21 ac e7 77 b4 03 00 00 .......w!..w....
000000000743ff88 c0 27 09 00 00 00 00 00 - 3c cb 67 63 b4 03 00 00 .'......<.gc....
000000000743ff98 c0 27 09 00 00 00 01 00 - 60 84 54 06 ec ff 43 07 .'......`.T...C.
000000000743ffa8 60 84 54 06 8e ca 67 63 - 00 00 14 00 68 ca 67 63 `.T...gc....h.gc
000000000743ffb8 3b d3 e7 77 60 84 54 06 - 00 00 01 00 00 00 14 00 ;..w`.T.........
000000000743ffc8 60 84 54 06 00 00 00 00 - 00 40 fd 7f c0 ff 43 07 `.T......@....C.
000000000743ffd8 07 00 00 00 ff ff ff ff - 09 48 e9 77 b8 3d e8 77 .........H.w.=.w
000000000743ffe8 00 00 00 00 00 00 00 00 - 00 00 00 00 5f ca 67 63 ............_.gc
000000000743fff8 60 84 54 06 00 00 00 00 - 00 00 00 00 00 00 00 00 `.T.............
0000000007440008 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000007440018 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000007440028 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000007440038 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000007440048 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

*----> State Dump for Thread Id 0xfd8 <----*

eax=72d22ecc ebx=081aff1c ecx=000000fa edx=00000000 esi=00000000 edi=7ffdf000
eip=7ffe0304 esp=081afed4 ebp=081aff70 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000202

function: <nosymbols>
7ffe02f2 0000 add [eax],al
7ffe02f4 0000 add [eax],al
7ffe02f6 0000 add [eax],al
*SharedUserSystemCall:
7ffe02f8 0000 add [eax],al
7ffe02fa 0000 add [eax],al
7ffe02fc 0000 add [eax],al
7ffe02fe 0000 add [eax],al
7ffe0300 8bd4 mov edx,esp
7ffe0302 0f34 sysenter
7ffe0304 c3 ret
7ffe0305 9c pushfd
7ffe0306 810c2400010000 or dword ptr [esp],0x100
7ffe030d 9d popfd
7ffe030e c3 ret
7ffe030f 8bd4 mov edx,esp
7ffe0311 0f05 syscall
7ffe0313 c3 ret
7ffe0314 9c pushfd
7ffe0315 810c2400010000 or dword ptr [esp],0x100
7ffe031c 9d popfd

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
081afed0 77f5c524 77e75ee0 00000002 081aff1c *SharedUserSystemCall+0xc (FPO: [0,0,0])
081aff70 77e75faa 00000002 081affa4 00000000 ntdll!NtWaitForMultipleObjects+0xc
081affb4 77e7d33b 00000000 00000021 41f59037 kernel32!WaitForMultipleObjects+0x17
081affec 00000000 72d22ecc 00000000 00000000 kernel32!RegisterWaitForInputIdle+0x43

*----> Raw Stack Dump <----*
00000000081afed4 24 c5 f5 77 e0 5e e7 77 - 02 00 00 00 1c ff 1a 08 $..w.^.w........
00000000081afee4 01 00 00 00 00 00 00 00 - 00 00 00 00 21 00 00 00 ............!...
00000000081afef4 00 00 00 00 00 00 00 00 - 5d 80 41 f7 dc d4 41 f7 ........].A...A.
00000000081aff04 00 00 00 00 d8 71 0e 82 - d8 71 0e 82 02 00 00 00 .....q...q......
00000000081aff14 00 f0 fd 7f 00 f0 fa 7f - d0 03 00 00 e4 03 00 00 ................
00000000081aff24 0f 52 4f 80 9c 1c c4 81 - 30 1b c4 81 64 1b c4 81 .RO.....0...d...
00000000081aff34 69 6b 61 80 88 da be 81 - 1c ff 1a 08 00 f0 fa 7f ika.............
00000000081aff44 14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000081aff54 10 00 00 00 f0 fe 1a 08 - 00 00 00 00 dc ff 1a 08 ................
00000000081aff64 09 48 e9 77 78 32 e8 77 - 00 00 00 00 b4 ff 1a 08 .H.wx2.w........
00000000081aff74 aa 5f e7 77 02 00 00 00 - a4 ff 1a 08 00 00 00 00 ._.w............
00000000081aff84 ff ff ff ff 00 00 00 00 - 0c 2f d2 72 02 00 00 00 ........./.r....
00000000081aff94 a4 ff 1a 08 00 00 00 00 - ff ff ff ff 37 90 f5 41 ............7..A
00000000081affa4 d0 03 00 00 e4 03 00 00 - c4 28 6b 80 f4 bf f5 77 .........(k....w
00000000081affb4 ec ff 1a 08 3b d3 e7 77 - 00 00 00 00 21 00 00 00 ....;..w....!...
00000000081affc4 37 90 f5 41 00 00 00 00 - e0 ac d5 f0 00 f0 fa 7f 7..A............
00000000081affd4 c0 ff 1a 08 07 00 00 00 - ff ff ff ff 09 48 e9 77 .............H.w
00000000081affe4 b8 3d e8 77 00 00 00 00 - 00 00 00 00 00 00 00 00 .=.w............
00000000081afff4 cc 2e d2 72 00 00 00 00 - 00 00 00 00 00 00 00 00 ...r............
00000000081b0004 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

*----> State Dump for Thread Id 0x8c8 <----*

eax=76b41c14 ebx=00000478 ecx=0012c210 edx=00000000 esi=082aff98 edi=77d45aaf
eip=7ffe0304 esp=082aff54 ebp=082aff78 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000202

function: <nosymbols>
7ffe02f2 0000 add [eax],al
7ffe02f4 0000 add [eax],al
7ffe02f6 0000 add [eax],al
*SharedUserSystemCall:
7ffe02f8 0000 add [eax],al
7ffe02fa 0000 add [eax],al
7ffe02fc 0000 add [eax],al
7ffe02fe 0000 add [eax],al
7ffe0300 8bd4 mov edx,esp
7ffe0302 0f34 sysenter
7ffe0304 c3 ret
7ffe0305 9c pushfd
7ffe0306 810c2400010000 or dword ptr [esp],0x100
7ffe030d 9d popfd
7ffe030e c3 ret
7ffe030f 8bd4 mov edx,esp
7ffe0311 0f05 syscall
7ffe0313 c3 ret
7ffe0314 9c pushfd
7ffe0315 810c2400010000 or dword ptr [esp],0x100
7ffe031c 9d popfd

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\USER32.dll -
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\System32\WINMM.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
082aff50 77d8a2a8 77d45b3a 082aff98 00000000 *SharedUserSystemCall+0xc (FPO: [0,0,0])
082aff78 76b41c79 082aff98 00000000 00000000 USER32!GetMenuItemRect+0x1c
082affb4 77e7d33b 00000478 00010003 00140000 WINMM!timeGetTime+0x1a1
082affec 00000000 76b41c14 00000478 00000000 kernel32!RegisterWaitForInputIdle+0x43

*----> Raw Stack Dump <----*
00000000082aff54 a8 a2 d8 77 3a 5b d4 77 - 98 ff 2a 08 00 00 00 00 ...w:[.w..*.....
00000000082aff64 00 00 00 00 00 00 00 00 - 78 04 00 00 af 5a d4 77 ........x....Z.w
00000000082aff74 00 00 00 00 b4 ff 2a 08 - 79 1c b4 76 98 ff 2a 08 ......*.y..v..*.
00000000082aff84 00 00 00 00 00 00 00 00 - 00 00 00 00 03 00 01 00 ................
00000000082aff94 00 00 14 00 48 02 45 00 - bc 03 00 00 78 85 f4 06 ....H.E.....x...
00000000082affa4 00 00 00 00 88 17 6f 05 - 56 00 00 00 95 01 00 00 ......o.V.......
00000000082affb4 ec ff 2a 08 3b d3 e7 77 - 78 04 00 00 03 00 01 00 ..*.;..wx.......
00000000082affc4 00 00 14 00 78 04 00 00 - 00 00 00 00 00 e0 fa 7f ....x...........
00000000082affd4 c0 ff 2a 08 07 00 00 00 - ff ff ff ff 09 48 e9 77 ..*..........H.w
00000000082affe4 b8 3d e8 77 00 00 00 00 - 00 00 00 00 00 00 00 00 .=.w............
00000000082afff4 14 1c b4 76 78 04 00 00 - 00 00 00 00 01 00 00 00 ...vx...........
00000000082b0004 00 00 00 00 40 03 7c 07 - 00 20 2b 08 00 e0 65 07 ....@.|.. +...e.
00000000082b0014 00 00 00 00 e0 1f 00 00 - 00 00 00 00 c0 66 7c 07 .............f|.
00000000082b0024 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000082b0034 00 00 00 00 00 00 00 00 - 00 00 00 00 f8 9b e0 72 ...............r
00000000082b0044 0d 00 00 00 00 10 01 00 - 40 d2 7b 07 c0 fd 65 07 ........@.{...e.
00000000082b0054 90 46 8a 07 a0 00 2b 08 - 80 00 2b 08 f8 9b e0 72 .F....+...+....r
00000000082b0064 0d 00 00 00 00 00 11 0f - 40 d2 7b 07 40 00 2b 08 ........@.{.@.+.
00000000082b0074 50 43 8a 07 80 00 2b 08 - b1 91 8d 07 f8 9b e0 72 PC....+........r
00000000082b0084 0d 00 00 00 00 00 11 0f - 40 d2 7b 07 40 00 2b 08 ........@.{.@.+.
 
Well here is the fault causing the problem but don't ask me what it means.

FAULT ->77f5b2ab 837a1400 cmp dword ptr [edx+0x14],0x0 ds:0023:00000034=????????

You might have some luck deciphering it via a Developer's or Programming site.

If you search Google (and groups) with &quot;cmp dword ptr [edx+0x14],0x0&quot; there are lots of hits but whether they are relevant or not I can't help you.
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top