IE Error reporting tool

R

Renee

IE6 keeps shutting down via the IE Error Reporting Tool
and if someone could tell me how to edit the registry to
make this stop happening, that would be great. I thought
that I had uninstalled the spyware that is causing this
but I guess not.

Thanks,
Renee

Application exception occurred:
App: explorer.exe (pid=1580)
When: 5/28/2004 @ 11:49:54.585
Exception number: c0000005 (access violation)

*----> System Information <----*
Computer Name: COMPAQ
User Name: Administrator
Number of Processors: 1
Processor Type: x86 Family 6 Model 7 Stepping 3
Windows 2000 Version: 5.0
Current Build: 2195
Service Pack: 4
Current Type: Uniprocessor Free
Registered Organization:
Registered Owner: ~

*----> Task List <----*
0 Idle.exe
8 System.exe
152 SMSS.exe
180 CSRSS.exe
200 WINLOGON.exe
228 SERVICES.exe
240 LSASS.exe
436 svchost.exe
460 spoolsv.exe
492 svchost.exe
512 AppServices.exe
540 nvsvc32.exe
568 PavPrSrv.exe
576 PAVSRV50.exe
596 PPPoEService.ex.exe
628 regsvc.exe
640 mstask.exe
692 WinMgmt.exe
728 svchost.exe
1696 rsvp.exe
1368 svchost.exe
1912 AVENGINE.exe
1580 explorer.exe
1380 CFD.exe
1748 tgcmd.exe
1972 ybrwicon.exe
1824 IPClient.exe
760 ipmon32.exe
1236 Autolaunch.exe
2168 CMESys.exe
1284 APVXDWIN.exe
1888 realsched.exe
1736 Wast.exe
912 ycommon.exe
952 Gator.exe
2140 CManager.exe
1780 WEBPROXY.exe
1524 GMT.exe
2264 CCD.exe
1644 EnterNet.exe
1244 IPClient.exe
1048 IEXPLORE.exe
1560 DLLHOST.exe
532 msdtc.exe
2596 regedit.exe
940 wjview.exe
2348 websearch.exe
1664 DRWTSN32.exe
0 _Total.exe

(00400000 - 0043E000)
(77F80000 - 77FFD000)
(7C2D0000 - 7C332000)
(7C570000 - 7C628000)
(77D30000 - 77DA1000)
(77F40000 - 77F7E000)
(77E10000 - 77E75000)
(70A70000 - 70AD5000)
(78000000 - 78045000)
(71710000 - 71794000)
(732E0000 - 73305000)
(23000000 - 23056000)
(782F0000 - 78538000)
(77A50000 - 77B3F000)
(775A0000 - 77630000)
(779B0000 - 77A4B000)
(00DF0000 - 00F39000)
(71500000 - 715FD000)
(7C0F0000 - 7C151000)
(76DF0000 - 76E01000)
(76FA0000 - 76FAF000)
(773E0000 - 773F5000)
(75170000 - 751BF000)
(7C340000 - 7C34F000)
(751C0000 - 751C6000)
(75150000 - 7515F000)
(75030000 - 75044000)
(75020000 - 75028000)
(77950000 - 7797A000)
(77980000 - 779A4000)
(75050000 - 75058000)
(76620000 - 76630000)
(75160000 - 7516C000)
(75210000 - 75225000)
(751D0000 - 75208000)
(76F20000 - 76F97000)
(01170000 - 01374000)
(70340000 - 70381000)
(766D0000 - 766E8000)
(76740000 - 76748000)
(77880000 - 7790E000)
(766F0000 - 766F7000)
(77570000 - 775A0000)
(77840000 - 7787E000)
(770C0000 - 770E3000)
(77560000 - 77568000)
(77400000 - 77408000)
(77410000 - 77423000)
(40600000 - 40614000)
(58000000 - 5801F000)
(673E0000 - 673ED000)
(63000000 - 63096000)
(7C740000 - 7C7C7000)
(77430000 - 77440000)
(718C0000 - 71944000)
(76710000 - 76719000)
(770B0000 - 770B7000)
(71F00000 - 71F4D000)
(6A8F0000 - 6A910000)
(74870000 - 74886000)
(70020000 - 70025000)
(717F0000 - 7181A000)
(76B30000 - 76B6E000)
(717C0000 - 717DE000)
(77BF0000 - 77C01000)
(773B0000 - 773DF000)
(77380000 - 773A3000)
(77800000 - 7781E000)
(71960000 - 71972000)
(1A400000 - 1A47A000)
(77820000 - 77827000)
(759B0000 - 759B6000)
(70440000 - 704CF000)
(63580000 - 63830000)
(6B700000 - 6B790000)
(75AC0000 - 75AE8000)
(75E60000 - 75E7A000)
(1F9C0000 - 1FA36000)
(07230000 - 07236000)
(1FA50000 - 1FA60000)
(785D0000 - 78733000)
(70510000 - 7051A000)
(75D40000 - 75D46000)
(66650000 - 666A4000)
(16200000 - 16206000)
(10000000 - 1001D000)
(07A00000 - 07A20000)
(719B0000 - 719B8000)
(76930000 - 7695B000)
(77920000 - 77943000)
(07C50000 - 07C6D000)
(65050000 - 6506B000)
(08690000 - 086B9000)
(086D0000 - 086E3000)
(76700000 - 76709000)
(76FB0000 - 770AB000)
(780C0000 - 7814D000)
(76720000 - 7672D000)
(68000000 - 6804D000)
(325C0000 - 325D2000)
(658F0000 - 65A04000)
(70F30000 - 70F9E000)
(69B10000 - 69C25000)
(49090000 - 491E5000)
(49970000 - 49985000)
(76B70000 - 76B84000)
(492E0000 - 492EC000)
(64000000 - 6402D000)
(0D700000 - 0D71A000)
(0E690000 - 0E6FF000)
(0F0B0000 - 0F0C8000)
(74EE0000 - 74EF5000)
(66D20000 - 66D51000)
(16250000 - 16267000)
(16300000 - 16310000)

State Dump for Thread Id 0x458

eax=00079058 ebx=00000001 ecx=00000114 edx=00000000
esi=0008f350 edi=00000000
eip=77e117e8 esp=0006ff00 ebp=0006ff1c iopl=0 nv
up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b
gs=0000 efl=00000246


function: WaitMessage
77e117dd b836120000 mov eax,0x1236
77e117e2 8d542404 lea edx,
[esp+0x4] ss:00c79de7=????????
77e117e6 cd2e int 2e
77e117e8 c3 ret

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4
Function Name
0006FF1C 7831ADBB 00000000 004084C4 0008F350 00000000
user32!WaitMessage
0006FF60 00408201 0000005C 00000000 000205FE 00000001
shell32!Ordinal201
0006FFC0 7C581AF6 00000000 00000000 7FFDF000 00000000
explorer!<nosymbols>
0006FFF0 00000000 00408188 00000000 000000C8 00000100
kernel32!OpenEventA

*----> Raw Stack Dump <----*
0006ff00 41 ae 31 78 7b 3a 57 7c - 50 f3 08 00 01 00 00
00 A.1x{:W|P.......
0006ff10 50 f3 08 00 50 f3 08 00 - 60 ff 06 00 60 ff 06
00 P...P...`...`...
0006ff20 bb ad 31 78 00 00 00 00 - c4 84 40 00 50 f3 08
00 [email protected]...
0006ff30 00 00 00 00 fe 05 02 00 - 00 f0 fd 7f 60 cc 0b
a3 ............`...
0006ff40 12 63 57 7c ff ff ff ff - 0c 00 00 00 fe 05 02
00 .cW|............
0006ff50 4d 63 57 7c 02 00 00 00 - 73 e1 fb 03 e0 ff 06
00 McW|....s.......
0006ff60 c0 ff 06 00 01 82 40 00 - 5c 00 00 00 00 00 00
00 ......@.\.......
0006ff70 fe 05 02 00 01 00 00 00 - 00 00 00 00 44 00 00
00 ............D...
0006ff80 b0 61 07 00 e8 43 07 00 - d0 61 07 00 00 00 00
00 .a...C...a......
0006ff90 00 00 00 00 00 00 00 00 - 00 00 00 00 98 e9 06
00 ................
0006ffa0 90 9a 07 00 90 e9 06 00 - 01 00 00 00 01 00 00
00 ................
0006ffb0 00 00 00 00 ff ff ff ff - ff ff ff ff ff ff ff
ff ................
0006ffc0 f0 ff 06 00 f6 1a 58 7c - 00 00 00 00 00 00 00
00 ......X|........
0006ffd0 00 f0 fd 7f 00 00 00 00 - c8 ff 06 00 00 00 00
00 ................
0006ffe0 ff ff ff ff 97 e5 57 7c - 00 1b 58 7c 00 00 00
00 ......W|..X|....
0006fff0 00 00 00 00 00 00 00 00 - 88 81 40 00 00 00 00
00 ..........@.....
00070000 c8 00 00 00 00 01 00 00 - ff ee ff ee 02 00 00
00 ................
00070010 00 00 00 00 00 fe 00 00 - 00 00 40 00 00 20 00
00 ..........@.. ..
00070020 00 02 00 00 00 20 00 00 - 4b 2b 01 00 ff ef fd
7f ..... ..K+......
00070030 01 00 08 06 00 00 00 00 - 00 00 00 00 00 00 00
00 ................

State Dump for Thread Id 0x5ac

eax=00dafe50 ebx=00000000 ecx=0010e008 edx=00000000
esi=000849b8 edi=00000100
eip=77f83310 esp=00dafe28 ebp=00daff74 iopl=0 nv
up ei pl nz na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038
gs=0000 efl=00000206


function: ZwReplyWaitReceivePortEx
77f83305 b8ac000000 mov eax,0xac
77f8330a 8d542404 lea edx,
[esp+0x4] ss:019b9d0f=745f7061
77f8330e cd2e int 2e
77f83310 c21400 ret 0x14

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4
Function Name
00DAFF74 77D37B4C 77D359C3 000849B8 77D33E01 00070000
ntdll!ZwReplyWaitReceivePortEx
00DAFFA8 77D358D6 000782C0 00DAFFEC 7C57438B 00084AA0
rpcrt4!NdrCorrelationInitialize
00DAFFB4 7C57438B 00084AA0 77D33E01 00070000 00084AA0
rpcrt4!RpcBindingFree
00DAFFEC 00000000 00000000 00000000 00000000 00000000
kernel32!TlsSetValue

State Dump for Thread Id 0x2fc

eax=00000001 ebx=00000000 ecx=01010101 edx=00000000
esi=00000000 edi=00000000
eip=77e117e8 esp=00f7ff2c ebp=00f7ff4c iopl=0 nv
up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b
gs=0000 efl=00000246


function: WaitMessage
77e117dd b836120000 mov eax,0x1236
77e117e2 8d542404 lea edx,
[esp+0x4] ss:01b89e13=adf00d0b
77e117e6 cd2e int 2e
77e117e8 c3 ret

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4
Function Name
00F7FF4C 0040A389 70AAC487 00400000 0031002D 0035002D
user32!WaitMessage
00F7FFB4 7C57438B 00000000 0031002D 0035002D 0006FEE0
explorer!<nosymbols>
00F7FFEC 00000000 00000000 00000000 00000000 00000000
kernel32!TlsSetValue

State Dump for Thread Id 0x3f0

eax=7ffd2001 ebx=00000009 ecx=0000004c edx=00000000
esi=77f82873 edi=00000009
eip=77f8287e esp=00fcfd98 ebp=00fcfde4 iopl=0 nv
up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038
gs=0000 efl=00000246


function: NtWaitForMultipleObjects
77f82873 b8e9000000 mov eax,0xe9
77f82878 8d542404 lea edx,
[esp+0x4] ss:01bd9c7f=adf00d0b
77f8287c cd2e int 2e
77f8287e c21400 ret 0x14

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4
Function Name
00FCFDE4 77E119E6 00126828 00000001 00000000 00000000
ntdll!NtWaitForMultipleObjects
00FCFE40 77E11ACE 00FCFE0C 00FCFEB8 FFFFFFFF 000000FF
user32!MsgWaitForMultipleObjectsEx
00FCFE5C 78319390 00000008 00FCFEB8 00000000 FFFFFFFF
user32!MsgWaitForMultipleObjects
784102B8 FFFFFFFF 00000000 00000000 000001AC 00000000
shell32!Ordinal200
77FD0CA0 784102B8 77FD0CC8 77FD0C88 000002F6 000002F6
<nosymbols>
00000000 00000000 00000000 00000000 00000000 00000000
shell32!<nosymbols>

State Dump for Thread Id 0x8b8

eax=000000c0 ebx=00f7fccc ecx=7c57a187 edx=00000000
esi=ffffffff edi=00000557
eip=77f82831 esp=0144ffa0 ebp=0144ffb4 iopl=0 nv
up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b
gs=0000 efl=00000246


function: NtDelayExecution
77f82826 b832000000 mov eax,0x32
77f8282b 8d542404 lea edx,
[esp+0x4] ss:02059e87=????????
77f8282f cd2e int 2e
77f82831 c20800 ret 0x8
77f82834 53 push ebx
77f82835 51 push ecx
77f82836 6a00 push 0x0
77f82838 c70701000000 mov dword ptr
[edi],0x1 ds:00000557=????????
77f8283e ff750c push dword ptr
[ebp+0xc] ss:02059e9a=????????
77f82841 50 push eax
77f82842 e879fdffff call
RtlMultiByteToUnicodeN (77f825c0)
77f82847 e928fcffff jmp
RtlConsoleMultiByteToUnicodeN+0x333 (77f82474)

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4
Function Name
0144FFB4 7C57438B 00F7FCCC 00000557 FFFFFFFF 00F7FCCC
ntdll!NtDelayExecution
0144FFEC 00000000 00000000 00000000 00000000 00000000
kernel32!TlsSetValue

State Dump for Thread Id 0x698

eax=00000001 ebx=00000000 ecx=00000219 edx=00000000
esi=0148fed8 edi=00000000
eip=77e11555 esp=0148fe98 ebp=0148feb0 iopl=0 nv
up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038
gs=0000 efl=00000246


function: ScrollDC
77e11533 8d542404 lea edx,
[esp+0x4] ss:02099d7f=????????
77e11537 cd2e int 2e
77e11539 c21c00 ret 0x1c
77e1153c b838110000 mov eax,0x1138
77e11541 8d542404 lea edx,
[esp+0x4] ss:02099d7f=????????
77e11545 cd2e int 2e
77e11547 c20400 ret 0x4
77e1154a b89a110000 mov eax,0x119a
77e1154f 8d542404 lea edx,
[esp+0x4] ss:02099d7f=????????
77e11553 cd2e int 2e
77e11555 c21000 ret 0x10
77e11558 6a01 push 0x1
77e1155a 58 pop eax
77e1155b c20800 ret 0x8
77e1155e b839110000 mov eax,0x1139
77e11563 8d542404 lea edx,
[esp+0x4] ss:02099d7f=????????
77e11567 cd2e int 2e
77e11569 c20800 ret 0x8

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4
Function Name
0148FEB0 76F21E36 0148FED8 00000000 00000000 00000000
user32!ScrollDC
00000001 00000000 00000000 00000000 00000000 00000000
netshell!DllGetClassObject

State Dump for Thread Id 0x660

eax=0000000a ebx=77e18f28 ecx=00000000 edx=00000000
esi=014cfd70 edi=77e115b0
eip=77e11555 esp=014cfd04 ebp=014cfd1c iopl=0 nv
up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b
gs=0000 efl=00000246


function: ScrollDC
77e11533 8d542404 lea edx,
[esp+0x4] ss:020d9beb=????????
77e11537 cd2e int 2e
77e11539 c21c00 ret 0x1c
77e1153c b838110000 mov eax,0x1138
77e11541 8d542404 lea edx,
[esp+0x4] ss:020d9beb=????????
77e11545 cd2e int 2e
77e11547 c20400 ret 0x4
77e1154a b89a110000 mov eax,0x119a
77e1154f 8d542404 lea edx,
[esp+0x4] ss:020d9beb=????????
77e11553 cd2e int 2e
77e11555 c21000 ret 0x10
77e11558 6a01 push 0x1
77e1155a 58 pop eax
77e1155b c20800 ret 0x8
77e1155e b839110000 mov eax,0x1139
77e11563 8d542404 lea edx,
[esp+0x4] ss:020d9beb=????????
77e11567 cd2e int 2e
77e11569 c20800 ret 0x8

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4
Function Name
014CFD1C 766D1AD2 014CFD70 00000000 00000000 00000000
user32!ScrollDC
014CFD90 766D198E 0004006C 00000000 766D2848 00000001
stobject!DllGetClassObject
014CFFB4 7C57438B 00000000 77F81F55 77F82A40 00000000
stobject!DllGetClassObject
014CFFEC 00000000 00000000 00000000 00000000 00000000
kernel32!TlsSetValue

State Dump for Thread Id 0x604

eax=00000000 ebx=00000002 ecx=7ffae000 edx=00000000
esi=77f82873 edi=00000002
eip=77f8287e esp=015aff24 ebp=015aff70 iopl=0 nv
up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038
gs=0000 efl=00000246


function: NtWaitForMultipleObjects
77f82873 b8e9000000 mov eax,0xe9
77f82878 8d542404 lea edx,
[esp+0x4] ss:021b9e0b=????????
77f8287c cd2e int 2e
77f8287e c21400 ret 0x14

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4
Function Name
015AFF70 7C578F0D 015AFF48 00000001 00000000 00000000
ntdll!NtWaitForMultipleObjects
015AFFB4 7C57438B 00000000 00000009 014CF520 00000000
kernel32!WaitForMultipleObjects
015AFFEC 00000000 77562BDA 00000000 00000000 000000C8
kernel32!TlsSetValue

*----> Raw Stack Dump <----*
015aff24 23 3c 57 7c 02 00 00 00 - 48 ff 5a 01 01 00 00
00 #<W|....H.Z.....
015aff34 00 00 00 00 00 00 00 00 - 09 00 00 00 00 00 00
00 ................
015aff44 00 00 00 00 98 03 00 00 - a8 03 00 00 48 3f 0b
00 ............H?..
015aff54 00 00 00 00 01 01 01 00 - 01 01 01 00 7c bd 57
7c ............|.W|
015aff64 50 3b 57 7c 4c 03 00 00 - f8 3e 57 7c b4 ff 5a
01 P;W|L....>W|..Z.
015aff74 0d 8f 57 7c 48 ff 5a 01 - 01 00 00 00 00 00 00
00 ..W|H.Z.........
015aff84 00 00 00 00 00 00 00 00 - 1a 2c 56 77 02 00 00
00 .........,Vw....
015aff94 a4 ff 5a 01 00 00 00 00 - ff ff ff ff 20 f5 4c
01 ..Z......... .L.
015affa4 98 03 00 00 a8 03 00 00 - 01 00 00 00 02 00 00
00 ................
015affb4 ec ff 5a 01 8b 43 57 7c - 00 00 00 00 09 00 00
00 ..Z..CW|........
015affc4 20 f5 4c 01 00 00 00 00 - 00 e0 fa 7f 00 00 00
00 .L.............
015affd4 c0 ff 5a 01 00 00 00 00 - ff ff ff ff 97 e5 57
7c ..Z...........W|
015affe4 a8 a0 57 7c 00 00 00 00 - 00 00 00 00 00 00 00
00 ..W|............
015afff4 da 2b 56 77 00 00 00 00 - 00 00 00 00 c8 00 00
00 .+Vw............
015b0004 00 01 00 00 ff ee ff ee - 02 00 00 00 00 00 00
00 ................
015b0014 00 fe 00 00 00 00 10 00 - 00 20 00 00 00 02 00
00 ......... ......
015b0024 00 20 00 00 b2 01 00 00 - ff ef fd 7f 0a 00 08
06 . ..............
015b0034 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00
00 ................
015b0044 98 05 5b 01 0f 00 00 00 - f8 ff ff ff 50 00 5b
01 ..[.........P.[.
015b0054 50 00 5b 01 40 06 5b 01 - 00 00 00 00 00 00 00
00 P.[.@.[.........

State Dump for Thread Id 0x634

eax=00000102 ebx=000493e0 ecx=00000102 edx=00000000
esi=00083b30 edi=000493e0
eip=77f8289c esp=016efebc ebp=016efee4 iopl=0 nv
up ei ng nz ac po cy
cs=001b ss=0023 ds=0023 es=0023 fs=0038
gs=0000 efl=00000297


function: ZwRemoveIoCompletion
77f82891 b8a8000000 mov eax,0xa8
77f82896 8d542404 lea edx,
[esp+0x4] ss:022f9da3=????????
77f8289a cd2e int 2e
77f8289c c21400 ret 0x14

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4
Function Name
016EFEE4 77D31394 00000120 016EFF1C 016EFF0C 016EFF14
ntdll!ZwRemoveIoCompletion
016EFF20 77D3E93F 000493E0 016EFF60 016EFF5C 016EFF70
rpcrt4!<nosymbols>
016EFF74 77D3E8C2 77D35924 00083B30 014CF3CA 77F83413
rpcrt4!RpcRevertToSelf
016EFFA8 77D358D6 000A2D18 016EFFEC 7C57438B 000AF948
rpcrt4!RpcRevertToSelf
016EFFB4 7C57438B 000AF948 014CF3CA 77F83413 000AF948
rpcrt4!RpcBindingFree
016EFFEC 00000000 77D358BE 000AF948 00000000 000000C1
kernel32!TlsSetValue

*----> Raw Stack Dump <----*
016efebc 73 3c 57 7c 20 01 00 00 - 0c ff 6e 01 fc fe 6e
01 s<W| .....n...n.
016efecc dc fe 6e 01 d4 fe 6e 01 - 00 a2 2f 4d ff ff ff
ff ..n...n.../M....
016efedc 04 e1 0a 00 d8 e0 0a 00 - 20 ff 6e 01 94 13 d3
77 ........ .n....w
016efeec 20 01 00 00 1c ff 6e 01 - 0c ff 6e 01 14 ff 6e
01 .....n...n...n.
016efefc e0 93 04 00 e0 93 04 00 - 30 3b 08 00 e2 37 57
7c ........0;...7W|
016eff0c 01 00 00 00 20 01 00 00 - 00 00 00 00 00 00 00
00 .... ...........
016eff1c 00 00 00 00 74 ff 6e 01 - 3f e9 d3 77 e0 93 04
00 ....t.n.?..w....
016eff2c 60 ff 6e 01 5c ff 6e 01 - 70 ff 6e 01 58 ff 6e
01 `.n.\.n.p.n.X.n.
016eff3c 64 ff 6e 01 6c ff 6e 01 - 48 82 07 00 18 2d 0a
00 d.n.l.n.H....-..
016eff4c 48 f9 0a 00 20 01 00 00 - 4f 00 00 00 78 00 00
00 H... ...O...x...
016eff5c 00 00 00 00 00 00 00 00 - 00 00 00 00 01 00 00
00 ................
016eff6c 00 00 00 00 20 01 00 00 - a8 ff 6e 01 c2 e8 d3
77 .... .....n....w
016eff7c 24 59 d3 77 30 3b 08 00 - ca f3 4c 01 13 34 f8
77 $Y.w0;....L..4.w
016eff8c 48 f9 0a 00 fb 12 43 80 - 80 f3 3f 83 20 50 bb
fe H.....C...?. P..
016eff9c ff ff ff ff 7b 14 43 80 - 48 f9 0a 00 b4 ff 6e
01 ....{.C.H.....n.
016effac d6 58 d3 77 18 2d 0a 00 - ec ff 6e 01 8b 43 57
7c .X.w.-....n..CW|
016effbc 48 f9 0a 00 ca f3 4c 01 - 13 34 f8 77 48 f9 0a
00 H.....L..4.wH...
016effcc 00 d0 fa 7f 5e 7c f8 77 - c0 ff 6e 01 5e 7c f8
77 ....^|.w..n.^|.w
016effdc ff ff ff ff 97 e5 57 7c - a8 a0 57 7c 00 00 00
00 ......W|..W|....
016effec 00 00 00 00 00 00 00 00 - be 58 d3 77 48 f9 0a
00 .........X.wH...

State Dump for Thread Id 0x6f0

eax=0174fb10 ebx=00000002 ecx=0174facc edx=00000000
esi=77f82873 edi=00000002
eip=77f8287e esp=0174f5d8 ebp=0174f624 iopl=0 nv
up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b
gs=0000 efl=00000246


function: NtWaitForMultipleObjects
77f82873 b8e9000000 mov eax,0xe9
77f82878 8d542404 lea edx,
[esp+0x4] ss:023594bf=????????
77f8287c cd2e int 2e
77f8287e c21400 ret 0x14

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4
Function Name
0174F624 77E119E6 0174F5FC 00000001 00000000 0174F61C
ntdll!NtWaitForMultipleObjects
0174F680 77AA99F4 0174F64C 0174F6C8 000003E8 000041FF
user32!MsgWaitForMultipleObjectsEx
0174F6A8 77AB3BCB 0174F6C8 000003E8 0174F6D8 00000100
ole32!CoGetPSClsid
0174F6D0 77AB3C0F FFFFFFFF 000C34F8 77B259E0 000C34F8
ole32!CoFreeAllLibraries
0174F6F8 77B22AB6 0174F734 000BDA74 0174F770 77A5AB48
ole32!CoFreeAllLibraries
0174F738 77AA985F 000BDA74 0174FA04 0174F830 000BDA74
ole32!StgGetIFillLockBytesOnFile
0174F7B0 77AB74C3 000BDA74 0174FA04 0174F830 0174FAEC
ole32!CoGetPSClsid
0174F808 77D94C1A 000BDA74 0174FA04 0174F830 00000006
ole32!CoFreeAllLibraries
0174F824 77D9487D 0012B7FC 0174FA50 0174F834 0174F834
rpcrt4!NdrProxySendReceive
0174FBFC 77D95136 77A5AB48 77A5DBD2 0174FC30 0174FCFC
rpcrt4!NdrClientCall2
0174FC18 77D46E75 0000001C 00000003 0174FC6C 77AB21FC
rpcrt4!CStdStubBuffer_AddRef
0174FC28 77AB21FC 0012B7FC 0174FC54 00000005 00000001
rpcrt4!NdrFullPointerFree
0174FC6C 77AB2149 00000001 0174FCFC 0174FCAC 0174FCE0
ole32!CoFreeAllLibraries
0174FC80 77AB20B8 00000001 0174FCFC 0174FCAC 02E5A57C
ole32!CoFreeAllLibraries
0174FCE0 77A76897 00000001 0174FCFC 0174FCF4 00000000
ole32!CoFreeAllLibraries
0174FD2C 77A767AF 0174FCF4 0174FCFC 00000001 0174FDB4
ole32!OleSetClipboard
0174FD50 77D9619A 02E5A618 4060C068 0174FD80 40602049
ole32!OleSetClipboard
0174FD90 40603E88 02EA1EA4 40610008 00000102 00000000
rpcrt4!IUnknown_QueryInterface_Proxy
0174FDD0 40603953 0006FA68 77F887BD 00000000 000007D0 !
<nosymbols>
0174FFB4 7C57438B 00000000 0006FA68 77F887BD 00000000 !
DllGetClassObject
0174FFEC 00000000 40603733 00000000 00000000 6F485241
kernel32!TlsSetValue

*----> Raw Stack Dump <----*
0174f5d8 23 3c 57 7c 02 00 00 00 - fc f5 74 01 01 00 00
00 #<W|......t.....
0174f5e8 00 00 00 00 1c f6 74 01 - 00 00 00 00 00 00 00
00 ......t.........
0174f5f8 02 00 00 00 b0 04 00 00 - b0 02 00 00 74 f6 74
01 ............t.t.
0174f608 7e f6 74 01 94 f7 74 01 - b4 f7 74 01 00 00 00
00 ~.t...t...t.....
0174f618 74 f6 74 01 80 69 67 ff - ff ff ff ff 80 f6 74
01 t.t..ig.......t.
0174f628 e6 19 e1 77 fc f5 74 01 - 01 00 00 00 00 00 00
00 ...w..t.........
0174f638 1c f6 74 01 00 00 00 00 - 02 01 00 00 70 f7 74
01 ..t.........p.t.
0174f648 01 00 00 00 b0 04 00 00 - b0 02 00 00 01 00 00
00 ................
0174f658 b0 04 00 00 90 f6 74 01 - 09 00 00 00 8c 2a f8
77 ......t......*.w
0174f668 00 00 07 00 38 08 07 00 - 00 00 00 00 cc c6 fa
7f ....8...........
0174f678 00 00 00 00 b0 02 00 00 - a8 f6 74 01 f4 99 aa
77 ..........t....w
0174f688 4c f6 74 01 c8 f6 74 01 - e8 03 00 00 ff 41 00
00 L.t...t......A..
0174f698 00 00 00 00 70 f7 74 01 - 30 38 11 00 00 00 00
00 ....p.t.08......
0174f6a8 d0 f6 74 01 cb 3b ab 77 - c8 f6 74 01 e8 03 00
00 ..t..;.w..t.....
0174f6b8 d8 f6 74 01 00 01 00 00 - 34 f7 74 01 30 38 11
00 ..t.....4.t.08..
0174f6c8 b0 04 00 00 01 00 00 00 - f8 f6 74 01 0f 3c ab
77 ..........t..<.w
0174f6d8 ff ff ff ff f8 34 0c 00 - e0 59 b2 77 f8 34 0c
00 .....4...Y.w.4..
0174f6e8 34 f7 74 01 74 da 0b 00 - 00 00 00 00 48 ab a5
77 4.t.t.......H..w
0174f6f8 38 f7 74 01 b6 2a b2 77 - 34 f7 74 01 74 da 0b
00 8.t..*.w4.t.t...
0174f708 70 f7 74 01 48 ab a5 77 - 80 fa e3 02 78 00 00
00 p.t.H..w....x...

State Dump for Thread Id 0x984

eax=00000000 ebx=00000000 ecx=0010e008 edx=00000000
esi=000849b8 edi=00000100
eip=77f83310 esp=01e0fe28 ebp=01e0ff74 iopl=0 nv
up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038
gs=0000 efl=00000202


function: ZwReplyWaitReceivePortEx
77f83305 b8ac000000 mov eax,0xac
77f8330a 8d542404 lea edx,
[esp+0x4] ss:02a19d0f=????????
77f8330e cd2e int 2e
77f83310 c21400 ret 0x14

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4
Function Name
01E0FF74 77D37B4C 77D35924 000849B8 77F82A8C 00070000
ntdll!ZwReplyWaitReceivePortEx
01E0FFA8 77D358D6 000B0928 01E0FFEC 7C57438B 000CC990
rpcrt4!NdrCorrelationInitialize
01E0FFB4 7C57438B 000CC990 77F82A8C 00070000 000CC990
rpcrt4!RpcBindingFree
01E0FFEC 00000000 00000000 00000000 00000000 00000000
kernel32!TlsSetValue

State Dump for Thread Id 0x71c

eax=01e40001 ebx=00000000 ecx=000849b8 edx=00000000
esi=000849b8 edi=00000100
eip=77f83310 esp=01e4fe28 ebp=01e4ff74 iopl=0 nv
up ei pl nz na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038
gs=0000 efl=00000206


function: ZwReplyWaitReceivePortEx
77f83305 b8ac000000 mov eax,0xac
77f8330a 8d542404 lea edx,
[esp+0x4] ss:02a59d0f=????????
77f8330e cd2e int 2e
77f83310 c21400 ret 0x14

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4
Function Name
01E4FF74 77D37B4C 77D35924 000849B8 00000000 00000000
ntdll!ZwReplyWaitReceivePortEx
01E4FFA8 77D358D6 000C07E0 01E4FFEC 7C57438B 000CCA00
rpcrt4!NdrCorrelationInitialize
01E4FFB4 7C57438B 000CCA00 00000000 00000000 000CCA00
rpcrt4!RpcBindingFree
01E4FFEC 00000000 00000000 00000000 00000000 00000000
kernel32!TlsSetValue

State Dump for Thread Id 0x454

eax=00000102 ebx=000493e0 ecx=00000101 edx=00000000
esi=00083b30 edi=000493e0
eip=77f8289c esp=0207febc ebp=0207fee4 iopl=0 nv
up ei ng nz ac po cy
cs=001b ss=0023 ds=0023 es=0023 fs=0038
gs=0000 efl=00000297


function: ZwRemoveIoCompletion
77f82891 b8a8000000 mov eax,0xa8
77f82896 8d542404 lea edx,
[esp+0x4] ss:02c89da3=????????
77f8289a cd2e int 2e
77f8289c c21400 ret 0x14

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4
Function Name
0207FEE4 77D31394 00000128 0207FF1C 0207FF0C 0207FF14
ntdll!ZwRemoveIoCompletion
0207FF20 77D3E93F 000493E0 0207FF60 0207FF5C 0207FF70
rpcrt4!<nosymbols>
0207FF74 77D3E8C2 77D35924 00083B30 00070000 000B9818
rpcrt4!RpcRevertToSelf
0207FFA8 77D358D6 000CE668 0207FFEC 7C57438B 000D17E0
rpcrt4!RpcRevertToSelf
0207FFB4 7C57438B 000D17E0 00070000 000B9818 000D17E0
rpcrt4!RpcBindingFree
0207FFEC 00000000 00000000 00000000 00000000 00000000
kernel32!TlsSetValue

State Dump for Thread Id 0x570

eax=000c7bc8 ebx=80100002 ecx=5f790003 edx=00000000
esi=000849b8 edi=00000100
eip=77f83310 esp=020ffe28 ebp=020fff74 iopl=0 nv
up ei pl nz na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038
gs=0000 efl=00000206


function: ZwReplyWaitReceivePortEx
77f83305 b8ac000000 mov eax,0xac
77f8330a 8d542404 lea edx,
[esp+0x4] ss:02d09d0f=????????
77f8330e cd2e int 2e
77f83310 c21400 ret 0x14

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4
Function Name
020FFF74 77D37B4C 77D35924 000849B8 00000000 00000000
ntdll!ZwReplyWaitReceivePortEx
020FFFA8 77D358D6 000D34B8 020FFFEC 7C57438B 000AD318
rpcrt4!NdrCorrelationInitialize
020FFFB4 7C57438B 000AD318 00000000 00000000 000AD318
rpcrt4!RpcBindingFree
020FFFEC 00000000 77D358BE 000AD318 00000000 000000C8
kernel32!TlsSetValue

*----> Raw Stack Dump <----*
020ffe28 a7 7b d3 77 24 01 00 00 - 54 ff 0f 02 00 00 00
00 .{.w$...T.......
020ffe38 d8 d2 0f 00 58 ff 0f 02 - 48 82 07 00 b8 34 0d
00 ....X...H....4..
020ffe48 18 d3 0a 00 00 00 00 00 - 00 00 00 00 00 00 00
00 ................
020ffe58 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00
00 ................
020ffe68 02 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00
00 ................
020ffe78 00 00 00 00 00 00 00 00 - 00 00 00 00 11 00 00
00 ................
020ffe88 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00
00 ................
020ffe98 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00
00 ................
020ffea8 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00
00 ................
020ffeb8 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00
00 ................
020ffec8 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00
00 ................
020ffed8 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00
00 ................
020ffee8 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00
00 ................
020ffef8 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00
00 ................
020fff08 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00
00 ................
020fff18 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00
00 ................
020fff28 ff ff ff ff 80 f3 3f 83 - a0 55 cf 82 00 00 00
00 ......?..U......
020fff38 0c 56 cf 82 a0 55 cf 82 - 30 57 cf 82 5c df 42
80 .V...U..0W..\.B.
020fff48 10 2f 06 80 00 57 cf 82 - a0 55 cf 82 02 00 10
80 ./...W...U......
020fff58 00 a2 2f 4d ff ff ff ff - 50 fe 0f 02 02 00 10
80 ../M....P.......

State Dump for Thread Id 0x638

eax=00000000 ebx=00000102 ecx=77b2d8d8 edx=00000000
esi=77f82826 edi=026eff74
eip=77f82831 esp=026eff60 ebp=026eff7c iopl=0 nv
up ei pl nz na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038
gs=0000 efl=00000206


function: NtDelayExecution
77f82826 b832000000 mov eax,0x32
77f8282b 8d542404 lea edx,
[esp+0x4] ss:032f9e47=ff7fff7f
77f8282f cd2e int 2e
77f82831 c20800 ret 0x8
77f82834 53 push ebx
77f82835 51 push ecx
77f82836 6a00 push 0x0
77f82838 c70701000000 mov dword ptr
[edi],0x1 ds:026eff74=dc3cba00
77f8283e ff750c push dword ptr
[ebp+0xc] ss:032f9e62=7fff7fff
77f82841 50 push eax
77f82842 e879fdffff call
RtlMultiByteToUnicodeN (77f825c0)
77f82847 e928fcffff jmp
RtlConsoleMultiByteToUnicodeN+0x333 (77f82474)

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4
Function Name
026EFF7C 7C573A22 0000EA60 00000000 77AB8FFB 0000EA60
ntdll!NtDelayExecution
00007530 00000000 00000000 00000000 00000000 00000000
kernel32!Sleep

State Dump for Thread Id 0x998

eax=00000002 ebx=00001650 ecx=00000000 edx=00000000
esi=0763ff98 edi=77e15f6c
eip=77e11555 esp=0763ff58 ebp=0763ff78 iopl=0 nv
up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038
gs=0000 efl=00000246


function: ScrollDC
77e11533 8d542404 lea edx,
[esp+0x4] ss:08249e3f=????????
77e11537 cd2e int 2e
77e11539 c21c00 ret 0x1c
77e1153c b838110000 mov eax,0x1138
77e11541 8d542404 lea edx,
[esp+0x4] ss:08249e3f=????????
77e11545 cd2e int 2e
77e11547 c20400 ret 0x4
77e1154a b89a110000 mov eax,0x119a
77e1154f 8d542404 lea edx,
[esp+0x4] ss:08249e3f=????????
77e11553 cd2e int 2e
77e11555 c21000 ret 0x10
77e11558 6a01 push 0x1
77e1155a 58 pop eax
77e1155b c20800 ret 0x8
77e1155e b839110000 mov eax,0x1139
77e11563 8d542404 lea edx,
[esp+0x4] ss:08249e3f=????????
77e11567 cd2e int 2e
77e11569 c20800 ret 0x8

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4
Function Name
0763FF78 77575C36 0763FF98 00000000 00000000 00000000
user32!ScrollDC
0763FFB4 7C57438B 00001650 77595428 026AB504 00001650
winmm!midiOutGetNumDevs
0763FFEC 00000000 00000000 00000000 00000000 00000000
kernel32!TlsSetValue

State Dump for Thread Id 0x854

eax=000f9333 ebx=027fffd0 ecx=01c45a35 edx=00000000
esi=08c2ff58 edi=77e15f6c
eip=77e11555 esp=08c2ff18 ebp=08c2ff38 iopl=0 nv
up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038
gs=0000 efl=00000246


function: ScrollDC
77e11533 8d542404 lea edx,
[esp+0x4] ss:09839dff=????????
77e11537 cd2e int 2e
77e11539 c21c00 ret 0x1c
77e1153c b838110000 mov eax,0x1138
77e11541 8d542404 lea edx,
[esp+0x4] ss:09839dff=????????
77e11545 cd2e int 2e
77e11547 c20400 ret 0x4
77e1154a b89a110000 mov eax,0x119a
77e1154f 8d542404 lea edx,
[esp+0x4] ss:09839dff=????????
77e11553 cd2e int 2e
77e11555 c21000 ret 0x10
77e11558 6a01 push 0x1
77e1155a 58 pop eax
77e1155b c20800 ret 0x8
77e1155e b839110000 mov eax,0x1139
77e11563 8d542404 lea edx,
[esp+0x4] ss:09839dff=????????
77e11567 cd2e int 2e
77e11569 c20800 ret 0x8

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4
Function Name
08C2FF38 6800A213 08C2FF58 00000000 00000000 00000000
user32!ScrollDC
08C2FF7C 780085BC 00000000 00000000 08BAE014 027FFFD0 !
<nosymbols>
08C2FFB4 7C57438B 027FFFD0 00000000 08BAE014 027FFFD0 !
endthreadex
08C2FFEC 00000000 00000000 00000000 00000000 00000000
kernel32!TlsSetValue

State Dump for Thread Id 0x94c

eax=03c20000 ebx=00000000 ecx=00001000 edx=00000000
esi=00002dd8 edi=0d27f4f0
eip=77f82870 esp=0d27f370 ebp=0d27f67c iopl=0 nv
up ei pl nz na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b
gs=0000 efl=00000206


function: NtWaitForSingleObject
77f82865 b8ea000000 mov eax,0xea
77f8286a 8d542404 lea edx,
[esp+0x4] ss:0de89257=????????
77f8286e cd2e int 2e
77f82870 c20c00 ret 0xc

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4
Function Name
0D27F67C 7153B572 0D27F6A4 7800BDB5 0D27F6AC 00000000
ntdll!NtWaitForSingleObject
0D27FFB4 7C57438B 02E3D1E8 0035002D 00300030 02E3D1E8 !
Ordinal134
0D27FFEC 00000000 00000000 00000000 00000000 00000000
kernel32!TlsSetValue

*----> Raw Stack Dump <----*
0d27f370 8c ac 58 7c d8 2d 00 00 - 01 00 00 00 00 00 00
00 ..X|.-..........
0d27f380 90 ff 27 0d c0 f7 27 0d - a4 ff 27 0d 00 00 00
00 ..'...'...'.....
0d27f390 f9 ff ff ff 4e 00 00 00 - 64 72 77 74 73 6e 33
32 ....N...drwtsn32
0d27f3a0 20 2d 70 20 31 35 38 30 - 20 2d 65 20 31 31 37
33 -p 1580 -e 1173
0d27f3b0 36 20 2d 67 00 00 00 00 - 28 f4 27 0d 00 00 00
00 6 -g....(.'.....
0d27f3c0 01 00 00 00 54 f4 27 0d - 3f 60 71 71 ae 01 3a
00 ....T.'.?`qq..:.
0d27f3d0 4e 00 00 00 01 00 00 00 - 28 f4 27 0d 00 00 00
00 N.......(.'.....
0d27f3e0 20 69 f7 0d 07 00 00 00 - 08 f4 27 0d e5 39 e1
77 i........'..9.w
0d27f3f0 74 f5 27 0d 3f 34 e1 77 - 0a 02 3c 00 05 00 00
00 t.'.?4.w..<.....
0d27f400 00 00 00 00 fc 03 52 02 - 01 00 00 00 05 00 00
00 ......R.........
0d27f410 a2 39 e1 77 08 00 00 00 - 54 f4 27 0d 6b 23 e1
77 .9.w....T.'.k#.w
0d27f420 00 00 00 00 a0 7a 0f 00 - 0a 02 3c 00 01 00 00
00 .....z....<.....
0d27f430 f9 ff ff ff 00 00 00 00 - 00 00 00 00 00 00 00
00 ................
0d27f440 2c 06 00 00 30 f4 27 0d - ae 01 3a 00 01 00 00
00 ,...0.'...:.....
0d27f450 00 00 00 00 cc f5 27 0d - f4 5f 72 71 20 69 f7
0d ......'.._rq i..
0d27f460 f9 ff ff ff 00 00 00 00 - 20 69 f7 0d 5f 62 71
71 ........ i.._bqq
0d27f470 20 69 f7 0d ae 01 3a 00 - 00 00 00 00 a0 7a 0f
00 i....:......z..
0d27f480 24 7c 0f 00 00 00 00 00 - 00 00 00 00 00 00 00
00 $|..............
0d27f490 e0 f4 27 0d 00 00 04 00 - 33 63 e1 77 0c 00 00
00 ..'.....3c.w....
0d27f4a0 00 00 00 00 01 00 00 00 - 34 04 00 00 44 00 00
00 ........4...D...

State Dump for Thread Id 0x7a4

eax=03c20010 ebx=00000002 ecx=00000000 edx=00000000
esi=77f82873 edi=00000002
eip=77f8287e esp=0038fe5c ebp=0038fea8 iopl=0 nv
up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038
gs=0000 efl=00000246


function: NtWaitForMultipleObjects
77f82873 b8e9000000 mov eax,0xe9
77f82878 8d542404 lea edx,
[esp+0x4] ss:00f99d43=????????
77f8287c cd2e int 2e
77f8287e c21400 ret 0x14

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4
Function Name
0038FEA8 77E119E6 0038FE80 00000001 00000000 0038FEA0
ntdll!NtWaitForMultipleObjects
0038FF04 77E11ACE 0038FED0 70ACBB38 0000EA60 00000041
user32!MsgWaitForMultipleObjectsEx
0038FF20 70ABA7B6 00000001 70ACBB38 00000000 0000EA60
user32!MsgWaitForMultipleObjects
0038FF74 70ABAB3E 0038FFA0 0038FFA4 0038FFA8 0038FF9C !
Ordinal265
0038FFAC 70ABAD02 0D27ECF0 7C57438B 00000000 FFFFFFFF !
Ordinal293
0038FFEC 00000000 00000000 00000000 00000000 00000000 !
Ordinal293

State Dump for Thread Id 0x3f4

eax=00000000 ebx=0348ff74 ecx=00000000 edx=00000000
esi=77f82865 edi=0000051c
eip=77f82870 esp=0348ff58 ebp=0348ff7c iopl=0 nv
up ei ng nz ac pe cy
cs=001b ss=0023 ds=0023 es=0023 fs=0038
gs=0000 efl=00000293


function: NtWaitForSingleObject
77f82865 b8ea000000 mov eax,0xea
77f8286a 8d542404 lea edx,
[esp+0x4] ss:04099e3f=????????
77f8286e cd2e int 2e
77f82870 c20c00 ret 0xc

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4
Function Name
0348FF7C 7C573B50 0000051C 000927C0 00000000 63697A53
ntdll!NtWaitForSingleObject
77F82091 4AFFC033 21850F08 89000008 FF900C42 8D0F044A
kernel32!WaitForSingleObject
0424548B 00000000 00000000 00000000 00000000 00000000
<nosymbols>

State Dump for Thread Id 0x978

eax=16250000 ebx=16250000 ecx=16250000 edx=000a40c0
esi=00001000 edi=16250000
eip=7c574754 esp=03aafd7c ebp=03aafdac iopl=0 nv
up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038
gs=0000 efl=00010246


function: IsBadReadPtr
7c574732 8b4d0c mov ecx,
[ebp+0xc] ss:046b9c92=????????
7c574735 85c9 test ecx,ecx
7c574737 7438 jz OpenMutexA+0xd6e
(7c57d271)
7c574739 8b4508 mov eax,
[ebp+0x8] ss:046b9c92=????????
7c57473c 85c0 test eax,eax
7c57473e 0f84b4b00100 je
RemoveDirectoryA+0x2be (7c58f7f8)
7c574744 8d4c01ff lea ecx,
[ecx+eax+0xff] ds:16e59ee7=????????
7c574748 3bc8 cmp ecx,eax
7c57474a 0f82a8b00100 jb
RemoveDirectoryA+0x2be (7c58f7f8)
7c574750 8365fc00 and dword ptr
[ebp+0xfc],0x0 ss:046b9c92=????????
FAULT ->7c574754 8a10 mov dl,
[eax] ds:16250000=??
7c574756 8d56ff lea edx,
[esi+0xff] ds:00c0aee6=????????
7c574759 f7d2 not edx
7c57475b 23c2 and eax,edx
7c57475d 8945e0 mov
[ebp+0xe0],eax ss:046b9c92=????????
7c574760 23ca and ecx,edx
7c574762 894de4 mov
[ebp+0xe4],ecx ss:046b9c92=????????
7c574765 3bc1 cmp eax,ecx
7c574767 0f85be010000 jne
GetSystemDefaultLCID+0x6 (7c57492b)
7c57476d 834dfcff or dword ptr
[ebp+0xfc],0xff ss:046b9c92=????????
7c574771 33c0 xor eax,eax
7c574773 8b4df0 mov ecx,
[ebp+0xf0] ss:046b9c92=????????

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4
Function Name
03AAFDAC 58001A20 16250000 00000001 00000000 00000001
kernel32!IsBadReadPtr
03AAFEC0 58001984 16250000 00000000 16250000 03AAFFA4 !
<nosymbols>
00000000 00000000 00000000 00000000 00000000 00000000 !
<nosymbols>

State Dump for Thread Id 0x994

eax=70abacd2 ebx=00000002 ecx=0000001c edx=00000000
esi=77f82873 edi=00000002
eip=77f8287e esp=03befe5c ebp=03befea8 iopl=0 nv
up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038
gs=0000 efl=00000246


function: NtWaitForMultipleObjects
77f82873 b8e9000000 mov eax,0xe9
77f82878 8d542404 lea edx,
[esp+0x4] ss:047f9d43=????????
77f8287c cd2e int 2e
77f8287e c21400 ret 0x14

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4
Function Name
03BEFEA8 77E119E6 03BEFE80 00000001 00000000 03BEFEA0
ntdll!NtWaitForMultipleObjects
03BEFF04 77E11ACE 03BEFED0 70ACBB38 0000EA60 00000041
user32!MsgWaitForMultipleObjectsEx
03BEFF20 70ABA7B6 00000001 70ACBB38 00000000 0000EA60
user32!MsgWaitForMultipleObjects
03BEFF74 70ABAB3E 03BEFFA0 03BEFFA4 03BEFFA8 03BEFF9C !
Ordinal265
03BEFFAC 70ABAD02 00DFE9D8 7C57438B 00000000 02E886E0 !
Ordinal293
03BEFFEC 00000000 00000000 00000000 00000000 00000000 !
Ordinal293
 
J

Jan Il

Hi Renee :)

Renee said:
IE6 keeps shutting down via the IE Error Reporting Tool
and if someone could tell me how to edit the registry to
make this stop happening, that would be great. I thought
that I had uninstalled the spyware that is causing this
but I guess not.

Run the ones below you have no done yet and see if they help:

It is possible you may have parasites, spyware, adware or
malware on your system causing the problem. Download,
install, update the programs to be sure they have the latest
definitions, then run the programs below. They are free and
very effective.Be sure to run both SpyBot and Adaware, as
what one does not detect the other may. It is important that
you follow all directions carefully:

SpyBot Search & Destroy: Free
http://download.com.com/3000-8022-10289035.html?tag=lst-0-2
or
http://majorgeeks.com/download2471.html

AdAware: Free
http://www.lavasoftusa.com/support/download/
or
http://www.majorgeeks.com/downloads31.html

You might also want to download and run the following:

CWShredder: Free
http://tinyurl.com/2l9kl
or
http://www.majorgeeks.com/download4086.html

McAfee Avert Stinger - Free
http://tinyurl.com/2esu7
or
http://vil.nai.com/vil/stinger/

Symantec Trojan Removal Tools: Free
http://www.symantec.com/avcenter/tools.list.ht

HTH

Jan :)
 
R

Robert Aldwinckle

....
IE6 keeps shutting down via the IE Error Reporting Tool

The Error Reporting Tool provides a terse crash summary
if you click on the <click here> link and capture the resulting
Error Signature text. (drag over it and press Ctrl-c)

In this case it won't show you anything useful because the
crash will be due to the caller of the crashing routine.


You included extracts from a drwtsn32.log

....
Application exception occurred:
App: explorer.exe (pid=1580)

This dump is saying the crash is in Windows.

However, this dump could support Jan II's idea that third-party programs
are interfering on your system if we could identify the caller.

Extracts from dump:
FAULT ->7c574754 8a10 mov dl, ....
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4
Function Name
03AAFDAC 58001A20 16250000 00000001 00000000 00000001
kernel32!IsBadReadPtr

So here is the "caller".
(58000000 - 5801F000)

Unfortunately your OS doesn't include enough information to identify the
loaded modules. To do that if you have a mini-dump for the same event
you could use the dumpchk tool on it. Or you might get more information
about it by enabling drwtsn32 Symbol Table dump (not with any expectation
of seeing symbols but with the hope that the module names at least will be
included somewhere in the dump.)

Also, you truncated the dump without including the Raw Stack Dump.
Sometimes, especially when third-party programs are involved, there
is readable information in the interpreted portion of it.


HTH

Robert Aldwinckle
---
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top