SP2 crashes explorer.exe and iexplorer.exe

G

Guest

Installed SP2 on my spyware/virus/divx-free laptop and I'm still getting
problems! Windows Explorer crashes if I try to access it in any way
(directly, double-clicking My Computer, double-clicking a folder on the
desktop, Control Panel...pretty much anything that nees explorer). Dr.
Watson pops up with this error message:

EventType: BEX P1:drwtsn32.exe P2:5.1.2600.0 P3:3b7d84a2
P4: dbghelp.dll P5: 5.1.2600.2180 P6: 4110969a P7: 0001295d
P8: c0000409 P9: 00000000

Eventually, it restarts explorer.exe, but the problem persists and repeats
itself if I try to click on My Computer again. Internet Explorer pops up in
the Task Manager, then disappears a second later. No Dr Watson there, but no
IE either.

Windows Explorer works fine in Safe mode, but not in any other mode. Even
tried starting up in Diagnostic mode and still encountered the same error.

Here's the error log. Can anyone please help? This is driving me crazy.

Thanks.

=================

Dr Watson Error Log:

Application exception occurred:
App: C:\WINDOWS\Explorer.EXE (pid=1232)
When: 10/13/2004 @ 01:32:47.529
Exception number: 80000007
()


*----> Task List <----*
0 System Process
4 System
1168 smss.exe
1228 csrss.exe
1252 winlogon.exe
1296 services.exe
1308 lsass.exe
1452 svchost.exe
1544 svchost.exe
1584 svchost.exe
1668 svchost.exe
1796 svchost.exe
184 spoolsv.exe
304 runservice.exe
676 svchost.exe
708 wdfmgr.exe
960 alg.exe
1232 Explorer.EXE
1496 WG511WLU.exe
576 mshta.exe
1984 drwtsn32.exe

*----> Module List <----*
(0000000000ba0000 - 0000000000bb2000: C:\WINDOWS\system32\browselc.dll
(0000000001000000 - 00000000010ff000: C:\WINDOWS\Explorer.EXE
(0000000001190000 - 00000000011ad000: C:\WINDOWS\System32\msibkd.dll
(0000000010000000 - 000000001000b000: C:\Program Files\Adobe\Acrobat
6.0\Acrobat\ActiveX\AcroIEHelper.dll
(0000000020000000 - 00000000202c5000: C:\WINDOWS\system32\xpsp2res.dll
(000000005ad70000 - 000000005ada8000: C:\WINDOWS\system32\UxTheme.dll
(000000005b860000 - 000000005b8b4000: C:\WINDOWS\system32\NETAPI32.dll
(000000005ba60000 - 000000005bad1000: C:\WINDOWS\System32\themeui.dll
(000000005cb70000 - 000000005cb96000: C:\WINDOWS\system32\ShimEng.dll
(000000005d090000 - 000000005d127000: C:\WINDOWS\system32\comctl32.dll
(000000006f880000 - 000000006fa4a000: C:\WINDOWS\AppPatch\AcGenral.DLL
(0000000071aa0000 - 0000000071aa8000: C:\WINDOWS\system32\WS2HELP.dll
(0000000071ab0000 - 0000000071ac7000: C:\WINDOWS\system32\WS2_32.dll
(0000000071ad0000 - 0000000071ad9000: C:\WINDOWS\System32\WSOCK32.dll
(0000000071b20000 - 0000000071b32000: C:\WINDOWS\system32\MPR.dll
(0000000071bf0000 - 0000000071c03000: C:\WINDOWS\system32\SAMLIB.dll
(0000000071c10000 - 0000000071c1e000: C:\WINDOWS\System32\ntlanman.dll
(0000000071c80000 - 0000000071c87000: C:\WINDOWS\System32\NETRAP.dll
(0000000071c90000 - 0000000071cd0000: C:\WINDOWS\System32\NETUI1.dll
(0000000071cd0000 - 0000000071ce7000: C:\WINDOWS\System32\NETUI0.dll
(0000000071d40000 - 0000000071d5c000: C:\WINDOWS\System32\actxprxy.dll
(0000000073030000 - 0000000073040000: C:\WINDOWS\system32\WZCSAPI.DLL
(0000000074ad0000 - 0000000074ad8000: C:\WINDOWS\System32\POWRPROF.dll
(0000000074af0000 - 0000000074afa000: C:\WINDOWS\System32\BatMeter.dll
(0000000074b30000 - 0000000074b76000: C:\WINDOWS\System32\webcheck.dll
(00000000754d0000 - 0000000075550000: C:\WINDOWS\system32\CRYPTUI.dll
(0000000075f60000 - 0000000075f67000: C:\WINDOWS\System32\drprov.dll
(0000000075f70000 - 0000000075f79000: C:\WINDOWS\System32\davclnt.dll
(0000000075f80000 - 000000007607c000: C:\WINDOWS\system32\BROWSEUI.dll
(0000000076280000 - 00000000762a1000: C:\WINDOWS\System32\stobject.dll
(0000000076360000 - 0000000076370000: C:\WINDOWS\system32\WINSTA.dll
(0000000076380000 - 0000000076385000: C:\WINDOWS\System32\MSIMG32.dll
(0000000076400000 - 00000000765a6000: C:\WINDOWS\system32\NETSHELL.dll
(0000000076600000 - 000000007661d000: C:\WINDOWS\System32\CSCDLL.dll
(0000000076980000 - 0000000076988000: C:\WINDOWS\system32\LINKINFO.dll
(0000000076990000 - 00000000769b5000: C:\WINDOWS\system32\ntshrui.dll
(00000000769c0000 - 0000000076a73000: C:\WINDOWS\system32\USERENV.dll
(0000000076b20000 - 0000000076b31000: C:\WINDOWS\system32\ATL.DLL
(0000000076b40000 - 0000000076b6d000: C:\WINDOWS\system32\WINMM.dll
(0000000076c00000 - 0000000076c2e000: C:\WINDOWS\system32\credui.dll
(0000000076c30000 - 0000000076c5e000: C:\WINDOWS\system32\WINTRUST.dll
(0000000076c90000 - 0000000076cb8000: C:\WINDOWS\system32\IMAGEHLP.dll
(0000000076d60000 - 0000000076d79000: C:\WINDOWS\system32\iphlpapi.dll
(0000000076e80000 - 0000000076e8e000: C:\WINDOWS\system32\rtutils.dll
(0000000076f50000 - 0000000076f58000: C:\WINDOWS\System32\WTSAPI32.dll
(0000000076f60000 - 0000000076f8c000: C:\WINDOWS\system32\WLDAP32.dll
(0000000076fd0000 - 000000007704f000: C:\WINDOWS\system32\CLBCATQ.DLL
(0000000077050000 - 0000000077115000: C:\WINDOWS\system32\COMRes.dll
(0000000077120000 - 00000000771ac000: C:\WINDOWS\system32\OLEAUT32.dll
(00000000771b0000 - 0000000077256000: C:\WINDOWS\system32\WININET.dll
(0000000077260000 - 00000000772fc000: C:\WINDOWS\system32\urlmon.dll
(00000000773d0000 - 00000000774d2000:
C:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.2600.2180_x-ww_a84f1ff9\comctl32.dll
(00000000774e0000 - 000000007761c000: C:\WINDOWS\system32\ole32.dll
(0000000077760000 - 00000000778cc000: C:\WINDOWS\system32\SHDOCVW.dll
(0000000077920000 - 0000000077a13000: C:\WINDOWS\system32\SETUPAPI.dll
(0000000077a20000 - 0000000077a74000: C:\WINDOWS\System32\cscui.dll
(0000000077a80000 - 0000000077b14000: C:\WINDOWS\system32\CRYPT32.dll
(0000000077b20000 - 0000000077b32000: C:\WINDOWS\system32\MSASN1.dll
(0000000077b40000 - 0000000077b62000: C:\WINDOWS\system32\appHelp.dll
(0000000077be0000 - 0000000077bf5000: C:\WINDOWS\system32\MSACM32.dll
(0000000077c00000 - 0000000077c08000: C:\WINDOWS\system32\VERSION.dll
(0000000077c10000 - 0000000077c68000: C:\WINDOWS\system32\msvcrt.dll
(0000000077d40000 - 0000000077dd0000: C:\WINDOWS\system32\USER32.dll
(0000000077dd0000 - 0000000077e6b000: C:\WINDOWS\system32\ADVAPI32.dll
(0000000077e70000 - 0000000077f01000: C:\WINDOWS\system32\RPCRT4.dll
(0000000077f10000 - 0000000077f56000: C:\WINDOWS\system32\GDI32.dll
(0000000077f60000 - 0000000077fd6000: C:\WINDOWS\system32\SHLWAPI.dll
(0000000077fe0000 - 0000000077ff1000: C:\WINDOWS\System32\Secur32.dll
(000000007c800000 - 000000007c8f4000: C:\WINDOWS\system32\kernel32.dll
(000000007c900000 - 000000007c9b0000: C:\WINDOWS\system32\ntdll.dll
(000000007c9c0000 - 000000007d1d4000: C:\WINDOWS\system32\SHELL32.dll
(000000007d1e0000 - 000000007d492000: C:\WINDOWS\system32\msi.dll

*----> State Dump for Thread Id 0x74c <----*

eax=000d77b4 ebx=00000003 ecx=7777a638 edx=77762030 esi=000d56d0 edi=00000000
eip=7c90eb94 esp=0007fef0 ebp=0007ff08 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202

*** ERROR: Symbol file could not be found. Defaulted to export symbols for
C:\WINDOWS\system32\ntdll.dll -
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
FAULT ->ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for
C:\WINDOWS\system32\SHELL32.dll -
WARNING: Stack unwind information not available. Following frames may be
wrong.
*** ERROR: Module load completed but symbols could not be loaded for
C:\WINDOWS\Explorer.EXE
*** ERROR: Symbol file could not be found. Defaulted to export symbols for
C:\WINDOWS\system32\kernel32.dll -
ChildEBP RetAddr Args to Child
0007ff08 7ca32c57 00000000 0007ff5c 01016e95 ntdll!KiFastSystemCallRet
0007ff14 01016e95 000d56d0 7ffdc000 0007ffc0 SHELL32!Ordinal201+0x28
0007ff5c 0101e2b6 00000000 00000000 0002064a Explorer+0x16e95
0007ffc0 7c816d4f 00000002 5d093c48 7ffdc000 Explorer+0x1e2b6
0007fff0 00000000 0101e24e 00000000 78746341
kernel32!RegisterWaitForInputIdle+0x49

*----> Raw Stack Dump <----*
000000000007fef0 f5 93 d4 77 ee 95 a3 7c - ac 92 80 7c d0 56 0d 00
....w...|...|.V..
000000000007ff00 d0 56 0d 00 14 ff 07 00 - 14 ff 07 00 57 2c a3 7c
..V..........W,.|
000000000007ff10 00 00 00 00 5c ff 07 00 - 95 6e 01 01 d0 56 0d 00
.....\....n...V..
000000000007ff20 00 c0 fd 7f c0 ff 07 00 - 00 00 00 00 24 fd 07 00
.............$...
000000000007ff30 50 ff 07 00 e0 ff 07 00 - 27 e0 90 7c ed aa 80 7c
P.......'..|...|
000000000007ff40 ff ff ff ff 0c 00 00 00 - 00 00 00 00 29 47 10 00
.............)G..
000000000007ff50 a8 00 00 00 01 00 00 00 - d0 56 0d 00 c0 ff 07 00
..........V......
000000000007ff60 b6 e2 01 01 00 00 00 00 - 00 00 00 00 4a 06 02 00
.............J...
000000000007ff70 01 00 00 00 02 00 00 00 - 48 3c 09 5d 44 00 00 00
.........H<.]D...
000000000007ff80 9c 06 02 00 7c 06 02 00 - 4c 06 02 00 00 00 00 00
.....|...L.......
000000000007ff90 00 00 00 00 00 00 00 00 - 00 00 00 00 48 22 19 00
.............H"..
000000000007ffa0 00 00 00 00 1d 69 91 7c - 01 00 00 00 01 00 00 00
......i.|........
000000000007ffb0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
000000000007ffc0 f0 ff 07 00 4f 6d 81 7c - 02 00 00 00 48 3c 09 5d
.....Om.|....H<.]
000000000007ffd0 00 c0 fd 7f 38 b0 54 80 - c8 ff 07 00 48 0b 29 ff
.....8.T.....H.).
000000000007ffe0 ff ff ff ff f3 99 83 7c - 58 6d 81 7c 00 00 00 00
........|Xm.|....
000000000007fff0 00 00 00 00 00 00 00 00 - 4e e2 01 01 00 00 00 00
.........N.......
0000000000080000 41 63 74 78 20 00 00 00 - 01 00 00 00 98 24 00 00 Actx
.........$..
0000000000080010 c4 00 00 00 00 00 00 00 - 20 00 00 00 00 00 00 00
......... .......
0000000000080020 14 00 00 00 01 00 00 00 - 06 00 00 00 34 00 00 00
.............4...

*----> State Dump for Thread Id 0x308 <----*

eax=00b2ff54 ebx=00000000 ecx=000930e8 edx=7c90eb94 esi=000930e8 edi=0009318c
eip=7c90eb94 esp=00b2fe1c ebp=00b2ff80 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for
C:\WINDOWS\system32\RPCRT4.dll -
WARNING: Stack unwind information not available. Following frames may be
wrong.
ChildEBP RetAddr Args to Child
00b2ff80 77e76c22 00b2ffa8 77e76a3b 000930e8 ntdll!KiFastSystemCallRet
00b2ff88 77e76a3b 000930e8 00000000 0007f88c RPCRT4!I_RpcBCacheFree+0x5ea
00b2ffa8 77e76c0a 000a6e30 00b2ffec 7c80b50b RPCRT4!I_RpcBCacheFree+0x403
00b2ffb4 7c80b50b 000b1b20 00000000 0007f88c RPCRT4!I_RpcBCacheFree+0x5d2
00b2ffec 00000000 77e76bf0 000b1b20 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000000b2fe1c 99 e3 90 7c 03 67 e7 77 - 90 01 00 00 70 ff b2 00
....|.g.w....p...
0000000000b2fe2c 00 00 00 00 b0 a0 16 00 - 4c ff b2 00 d4 d4 00 00
.........L.......
0000000000b2fe3c e0 f3 d3 81 00 00 00 00 - 9c 36 50 c0 20 3d b4 ff
..........6P. =..
0000000000b2fe4c 82 00 00 00 02 fb 71 f3 - 00 00 4e 80 82 00 00 00
.......q...N.....
0000000000b2fe5c 20 3d b4 ff 00 30 fa 7f - fc 07 30 c0 8c fe 1f c0
=...0....0.....
0000000000b2fe6c 82 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000b2fe7c 00 00 00 00 b8 fb 71 f3 - 28 fc 71 f3 0e c1 4e 80
.......q.(.q...N.
0000000000b2fe8c fc 07 30 c0 28 fc 71 f3 - 86 bf 4e 80 00 30 fa 7f
...0.(.q...N..0..
0000000000b2fe9c 00 00 00 00 00 00 00 00 - e8 32 e8 81 28 3b b4 ff
..........2..(;..
0000000000b2feac 01 3b b4 ff 00 00 00 00 - 8c fe 1f c0 00 00 00 00
..;..............
0000000000b2febc ac 07 00 00 ff ff b4 01 - 00 00 04 00 4f 1b 00 00
.............O...
0000000000b2fecc f4 3b b4 ff 28 3b b4 ff - 00 00 00 00 00 00 00 00
..;..(;..........
0000000000b2fedc 00 00 b5 01 3c fb 71 f3 - 34 37 50 c0 ff ff ff ff
.....<.q.47P.....
0000000000b2feec f1 2a 4e 80 00 30 fa 7f - ff ff ff ff 46 02 00 00
..*N..0......F...
0000000000b2fefc e0 bd 4d 80 20 fc 71 f3 - 80 77 43 ff 20 f1 df ff ..M.
..q..wC. ...
0000000000b2ff0c 46 02 00 00 bc c6 4d 80 - f0 77 43 ff 80 77 43 ff
F.....M..wC..wC.
0000000000b2ff1c f2 c6 4d 80 ec 78 43 ff - 80 77 43 ff b4 77 43 ff
...M..xC..wC..wC.
0000000000b2ff2c 38 b0 54 80 80 ff b2 00 - 99 66 e7 77 4c ff b2 00
8.T......f.wL...
0000000000b2ff3c a9 66 e7 77 ed 10 90 7c - b8 12 0b 00 20 1b 0b 00
..f.w...|.... ...
0000000000b2ff4c 00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff
.../M.....]......

*----> State Dump for Thread Id 0x358 <----*

eax=774f319a ebx=00007530 ecx=7ffdc000 edx=00000000 esi=00000000 edi=00c6ff50
eip=7c90eb94 esp=00c6ff20 ebp=00c6ff78 iopl=0 nv up ei pl nz na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000206

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be
wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for
C:\WINDOWS\system32\ole32.dll -
ChildEBP RetAddr Args to Child
00c6ff78 7c802451 0000ea60 00000000 00c6ffb4 ntdll!KiFastSystemCallRet
00c6ff88 774f2fcb 0000ea60 000b41f8 774f314d kernel32!Sleep+0xf
00c6ffb4 7c80b50b 000b41f8 7c910945 7c91094e ole32!StringFromGUID2+0x2d1
00c6ffec 00000000 774f319a 000b41f8 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000000c6ff20 5c d8 90 7c ed 23 80 7c - 00 00 00 00 50 ff c6 00
\..|.#.|....P...
0000000000c6ff30 50 25 80 7c f0 56 60 77 - 30 75 00 00 14 00 00 00
P%.|.V`w0u......
0000000000c6ff40 01 00 00 00 00 00 00 00 - 00 00 00 00 10 00 00 00
.................
0000000000c6ff50 00 ba 3c dc ff ff ff ff - e4 fe c6 00 50 ff c6 00
...<.........P...
0000000000c6ff60 30 ff c6 00 e4 fe c6 00 - dc ff c6 00 f3 99 83 7c
0..............|
0000000000c6ff70 58 24 80 7c 00 00 00 00 - 88 ff c6 00 51 24 80 7c
X$.|........Q$.|
0000000000c6ff80 60 ea 00 00 00 00 00 00 - b4 ff c6 00 cb 2f 4f 77
`............/Ow
0000000000c6ff90 60 ea 00 00 f8 41 0b 00 - 4d 31 4f 77 00 00 00 00
`....A..M1Ow....
0000000000c6ffa0 45 09 91 7c f8 41 0b 00 - 00 00 4e 77 b5 31 4f 77
E..|.A....Nw.1Ow
0000000000c6ffb0 4e 09 91 7c ec ff c6 00 - 0b b5 80 7c f8 41 0b 00
N..|.......|.A..
0000000000c6ffc0 45 09 91 7c 4e 09 91 7c - f8 41 0b 00 00 d0 fd 7f
E..|N..|.A......
0000000000c6ffd0 00 46 f4 81 c0 ff c6 00 - 68 38 87 ff ff ff ff ff
..F......h8......
0000000000c6ffe0 f3 99 83 7c 18 b5 80 7c - 00 00 00 00 00 00 00 00
....|...|........
0000000000c6fff0 00 00 00 00 9a 31 4f 77 - f8 41 0b 00 00 00 00 00
......1Ow.A......
0000000000c70000 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000c70010 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000c70020 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000c70030 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000c70040 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000c70050 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................

*----> State Dump for Thread Id 0x298 <----*

eax=f35c1654 ebx=00000000 ecx=000000d6 edx=000000b2 esi=7c97c0d8 edi=00000000
eip=7c90eb94 esp=00cae064 ebp=00cae0ec iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=00bc es=0002 fs=003b gs=ecd1 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
 
D

Don Taylor

=?Utf-8?B?amVycnk=?= said:
Installed SP2 on my spyware/virus/divx-free laptop and I'm still getting
problems! Windows Explorer crashes if I try to access it in any way
(directly, double-clicking My Computer, double-clicking a folder on the
desktop, Control Panel...pretty much anything that nees explorer). Dr.
Watson pops up with this error message:
EventType: BEX P1:drwtsn32.exe P2:5.1.2600.0 P3:3b7d84a2
P4: dbghelp.dll P5: 5.1.2600.2180 P6: 4110969a P7: 0001295d
P8: c0000409 P9: 00000000
Eventually, it restarts explorer.exe, but the problem persists and repeats
itself if I try to click on My Computer again. Internet Explorer pops up in
the Task Manager, then disappears a second later. No Dr Watson there, but no
IE either.
Windows Explorer works fine in Safe mode, but not in any other mode. Even
tried starting up in Diagnostic mode and still encountered the same error.
Here's the error log. Can anyone please help? This is driving me crazy.
<snip>

There have been a string of folks reporting very similar problems
to what you are reporting. Some find that anything which uses
Windows Explorer (Recycle bin, folder shortcuts, control panel,
etc) all have a similar problem. Some find that right clicks are
their major problem. Some find any click. Some find it crashes
on open. Some find it refuses any clicks. There are some claims
but I've been scanning the thousands of postings on SP2 and I don't
think you will find any with "the fix" for this, at least yet.

But, some find it will work when you boot in safe mode.

And, some find it will work when you create a new user and switch
to that user to try it.

One of those might be a temporary work-around till you get an answer.

Some claim it is all spyware and viruses but I haven't seen any
posting that confirmed this for the Windows Explorer problem.
I carefully and repeatedly checked, no viruses or spyware and my
windows explorer locks up every time. <<<Late breaking news, after
hundreds of people reporting this problem, ONE person did let me
know that trendmicro actually found a WORM_SDDROP.A virus/worm,
he removed that and it appeared to solve his problem, so that's
10,000 times people chanting "it's all viruses and spyware" and
one correct diagnosis>>>

Some claim it is Divx or Spy Sweeper installed that is responsible
for this, a few people have confirmed this but others have it and
have no problem, most reporting the problem don't have it and still
have the problem. I don't have either and it locks up every time.

Some claim it is "ShellExtensions", little accessory gadgets that
sort of script extra cute features. The advice for that is to
install free ShellExView and to try (carefully) disabling these
features one at a time, if turning one off doesn't do anything then
turn it back on and try again. I did that with all 75 at once and
it made no difference at all. One person sent me mail saying that
disabling one extension he had did appear to fix his problem.

You can escalate to Microsoft, go to
support.microsoft.com/windowsxpsp2
and give them all the details and clues and patterns you can find.
There is no guarantee that their analysis or directions will be
correct or even not make it worse. They told me I must "have some
corrupted files, repair windows back to install state and then
reinstall SP2 twice while in Safe mode." Before I did that someone
posted the "switch user" workaround that let me get by temporarily.
I sent email saying that if it worked for one user then it seemed
less likely it was "some corrupted files" and asked if they still
wanted me to blow windows away. They have not reponded to that in
a number of days now. But I can imagine what it is like inside now.

I hope this helps. If someone tells you to try something and it
doesn't help then please make a posting so we can start accumulating
what suggestions don't do any good. And if someone tells you something
that does work then please report it.
 
G

Guest

I am having the same problem. I have found that if I kill the drwtsn32
process the computer works normally.

jerry said:
Installed SP2 on my spyware/virus/divx-free laptop and I'm still getting
problems! Windows Explorer crashes if I try to access it in any way
(directly, double-clicking My Computer, double-clicking a folder on the
desktop, Control Panel...pretty much anything that nees explorer). Dr.
Watson pops up with this error message:

EventType: BEX P1:drwtsn32.exe P2:5.1.2600.0 P3:3b7d84a2
P4: dbghelp.dll P5: 5.1.2600.2180 P6: 4110969a P7: 0001295d
P8: c0000409 P9: 00000000

Eventually, it restarts explorer.exe, but the problem persists and repeats
itself if I try to click on My Computer again. Internet Explorer pops up in
the Task Manager, then disappears a second later. No Dr Watson there, but no
IE either.

Windows Explorer works fine in Safe mode, but not in any other mode. Even
tried starting up in Diagnostic mode and still encountered the same error.

Here's the error log. Can anyone please help? This is driving me crazy.

Thanks.

=================

Dr Watson Error Log:

Application exception occurred:
App: C:\WINDOWS\Explorer.EXE (pid=1232)
When: 10/13/2004 @ 01:32:47.529
Exception number: 80000007
()


*----> Task List <----*
0 System Process
4 System
1168 smss.exe
1228 csrss.exe
1252 winlogon.exe
1296 services.exe
1308 lsass.exe
1452 svchost.exe
1544 svchost.exe
1584 svchost.exe
1668 svchost.exe
1796 svchost.exe
184 spoolsv.exe
304 runservice.exe
676 svchost.exe
708 wdfmgr.exe
960 alg.exe
1232 Explorer.EXE
1496 WG511WLU.exe
576 mshta.exe
1984 drwtsn32.exe

*----> Module List <----*
(0000000000ba0000 - 0000000000bb2000: C:\WINDOWS\system32\browselc.dll
(0000000001000000 - 00000000010ff000: C:\WINDOWS\Explorer.EXE
(0000000001190000 - 00000000011ad000: C:\WINDOWS\System32\msibkd.dll
(0000000010000000 - 000000001000b000: C:\Program Files\Adobe\Acrobat
6.0\Acrobat\ActiveX\AcroIEHelper.dll
(0000000020000000 - 00000000202c5000: C:\WINDOWS\system32\xpsp2res.dll
(000000005ad70000 - 000000005ada8000: C:\WINDOWS\system32\UxTheme.dll
(000000005b860000 - 000000005b8b4000: C:\WINDOWS\system32\NETAPI32.dll
(000000005ba60000 - 000000005bad1000: C:\WINDOWS\System32\themeui.dll
(000000005cb70000 - 000000005cb96000: C:\WINDOWS\system32\ShimEng.dll
(000000005d090000 - 000000005d127000: C:\WINDOWS\system32\comctl32.dll
(000000006f880000 - 000000006fa4a000: C:\WINDOWS\AppPatch\AcGenral.DLL
(0000000071aa0000 - 0000000071aa8000: C:\WINDOWS\system32\WS2HELP.dll
(0000000071ab0000 - 0000000071ac7000: C:\WINDOWS\system32\WS2_32.dll
(0000000071ad0000 - 0000000071ad9000: C:\WINDOWS\System32\WSOCK32.dll
(0000000071b20000 - 0000000071b32000: C:\WINDOWS\system32\MPR.dll
(0000000071bf0000 - 0000000071c03000: C:\WINDOWS\system32\SAMLIB.dll
(0000000071c10000 - 0000000071c1e000: C:\WINDOWS\System32\ntlanman.dll
(0000000071c80000 - 0000000071c87000: C:\WINDOWS\System32\NETRAP.dll
(0000000071c90000 - 0000000071cd0000: C:\WINDOWS\System32\NETUI1.dll
(0000000071cd0000 - 0000000071ce7000: C:\WINDOWS\System32\NETUI0.dll
(0000000071d40000 - 0000000071d5c000: C:\WINDOWS\System32\actxprxy.dll
(0000000073030000 - 0000000073040000: C:\WINDOWS\system32\WZCSAPI.DLL
(0000000074ad0000 - 0000000074ad8000: C:\WINDOWS\System32\POWRPROF.dll
(0000000074af0000 - 0000000074afa000: C:\WINDOWS\System32\BatMeter.dll
(0000000074b30000 - 0000000074b76000: C:\WINDOWS\System32\webcheck.dll
(00000000754d0000 - 0000000075550000: C:\WINDOWS\system32\CRYPTUI.dll
(0000000075f60000 - 0000000075f67000: C:\WINDOWS\System32\drprov.dll
(0000000075f70000 - 0000000075f79000: C:\WINDOWS\System32\davclnt.dll
(0000000075f80000 - 000000007607c000: C:\WINDOWS\system32\BROWSEUI.dll
(0000000076280000 - 00000000762a1000: C:\WINDOWS\System32\stobject.dll
(0000000076360000 - 0000000076370000: C:\WINDOWS\system32\WINSTA.dll
(0000000076380000 - 0000000076385000: C:\WINDOWS\System32\MSIMG32.dll
(0000000076400000 - 00000000765a6000: C:\WINDOWS\system32\NETSHELL.dll
(0000000076600000 - 000000007661d000: C:\WINDOWS\System32\CSCDLL.dll
(0000000076980000 - 0000000076988000: C:\WINDOWS\system32\LINKINFO.dll
(0000000076990000 - 00000000769b5000: C:\WINDOWS\system32\ntshrui.dll
(00000000769c0000 - 0000000076a73000: C:\WINDOWS\system32\USERENV.dll
(0000000076b20000 - 0000000076b31000: C:\WINDOWS\system32\ATL.DLL
(0000000076b40000 - 0000000076b6d000: C:\WINDOWS\system32\WINMM.dll
(0000000076c00000 - 0000000076c2e000: C:\WINDOWS\system32\credui.dll
(0000000076c30000 - 0000000076c5e000: C:\WINDOWS\system32\WINTRUST.dll
(0000000076c90000 - 0000000076cb8000: C:\WINDOWS\system32\IMAGEHLP.dll
(0000000076d60000 - 0000000076d79000: C:\WINDOWS\system32\iphlpapi.dll
(0000000076e80000 - 0000000076e8e000: C:\WINDOWS\system32\rtutils.dll
(0000000076f50000 - 0000000076f58000: C:\WINDOWS\System32\WTSAPI32.dll
(0000000076f60000 - 0000000076f8c000: C:\WINDOWS\system32\WLDAP32.dll
(0000000076fd0000 - 000000007704f000: C:\WINDOWS\system32\CLBCATQ.DLL
(0000000077050000 - 0000000077115000: C:\WINDOWS\system32\COMRes.dll
(0000000077120000 - 00000000771ac000: C:\WINDOWS\system32\OLEAUT32.dll
(00000000771b0000 - 0000000077256000: C:\WINDOWS\system32\WININET.dll
(0000000077260000 - 00000000772fc000: C:\WINDOWS\system32\urlmon.dll
(00000000773d0000 - 00000000774d2000:
C:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.2600.2180_x-ww_a84f1ff9\comctl32.dll
(00000000774e0000 - 000000007761c000: C:\WINDOWS\system32\ole32.dll
(0000000077760000 - 00000000778cc000: C:\WINDOWS\system32\SHDOCVW.dll
(0000000077920000 - 0000000077a13000: C:\WINDOWS\system32\SETUPAPI.dll
(0000000077a20000 - 0000000077a74000: C:\WINDOWS\System32\cscui.dll
(0000000077a80000 - 0000000077b14000: C:\WINDOWS\system32\CRYPT32.dll
(0000000077b20000 - 0000000077b32000: C:\WINDOWS\system32\MSASN1.dll
(0000000077b40000 - 0000000077b62000: C:\WINDOWS\system32\appHelp.dll
(0000000077be0000 - 0000000077bf5000: C:\WINDOWS\system32\MSACM32.dll
(0000000077c00000 - 0000000077c08000: C:\WINDOWS\system32\VERSION.dll
(0000000077c10000 - 0000000077c68000: C:\WINDOWS\system32\msvcrt.dll
(0000000077d40000 - 0000000077dd0000: C:\WINDOWS\system32\USER32.dll
(0000000077dd0000 - 0000000077e6b000: C:\WINDOWS\system32\ADVAPI32.dll
(0000000077e70000 - 0000000077f01000: C:\WINDOWS\system32\RPCRT4.dll
(0000000077f10000 - 0000000077f56000: C:\WINDOWS\system32\GDI32.dll
(0000000077f60000 - 0000000077fd6000: C:\WINDOWS\system32\SHLWAPI.dll
(0000000077fe0000 - 0000000077ff1000: C:\WINDOWS\System32\Secur32.dll
(000000007c800000 - 000000007c8f4000: C:\WINDOWS\system32\kernel32.dll
(000000007c900000 - 000000007c9b0000: C:\WINDOWS\system32\ntdll.dll
(000000007c9c0000 - 000000007d1d4000: C:\WINDOWS\system32\SHELL32.dll
(000000007d1e0000 - 000000007d492000: C:\WINDOWS\system32\msi.dll

*----> State Dump for Thread Id 0x74c <----*

eax=000d77b4 ebx=00000003 ecx=7777a638 edx=77762030 esi=000d56d0 edi=00000000
eip=7c90eb94 esp=0007fef0 ebp=0007ff08 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202

*** ERROR: Symbol file could not be found. Defaulted to export symbols for
C:\WINDOWS\system32\ntdll.dll -
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
FAULT ->ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for
C:\WINDOWS\system32\SHELL32.dll -
WARNING: Stack unwind information not available. Following frames may be
wrong.
*** ERROR: Module load completed but symbols could not be loaded for
C:\WINDOWS\Explorer.EXE
*** ERROR: Symbol file could not be found. Defaulted to export symbols for
C:\WINDOWS\system32\kernel32.dll -
ChildEBP RetAddr Args to Child
0007ff08 7ca32c57 00000000 0007ff5c 01016e95 ntdll!KiFastSystemCallRet
0007ff14 01016e95 000d56d0 7ffdc000 0007ffc0 SHELL32!Ordinal201+0x28
0007ff5c 0101e2b6 00000000 00000000 0002064a Explorer+0x16e95
0007ffc0 7c816d4f 00000002 5d093c48 7ffdc000 Explorer+0x1e2b6
0007fff0 00000000 0101e24e 00000000 78746341
kernel32!RegisterWaitForInputIdle+0x49

*----> Raw Stack Dump <----*
000000000007fef0 f5 93 d4 77 ee 95 a3 7c - ac 92 80 7c d0 56 0d 00
...w...|...|.V..
000000000007ff00 d0 56 0d 00 14 ff 07 00 - 14 ff 07 00 57 2c a3 7c
.V..........W,.|
000000000007ff10 00 00 00 00 5c ff 07 00 - 95 6e 01 01 d0 56 0d 00
....\....n...V..
000000000007ff20 00 c0 fd 7f c0 ff 07 00 - 00 00 00 00 24 fd 07 00
............$...
000000000007ff30 50 ff 07 00 e0 ff 07 00 - 27 e0 90 7c ed aa 80 7c
P.......'..|...|
000000000007ff40 ff ff ff ff 0c 00 00 00 - 00 00 00 00 29 47 10 00
............)G..
000000000007ff50 a8 00 00 00 01 00 00 00 - d0 56 0d 00 c0 ff 07 00
.........V......
000000000007ff60 b6 e2 01 01 00 00 00 00 - 00 00 00 00 4a 06 02 00
............J...
000000000007ff70 01 00 00 00 02 00 00 00 - 48 3c 09 5d 44 00 00 00
........H<.]D...
000000000007ff80 9c 06 02 00 7c 06 02 00 - 4c 06 02 00 00 00 00 00
....|...L.......
000000000007ff90 00 00 00 00 00 00 00 00 - 00 00 00 00 48 22 19 00
............H"..
000000000007ffa0 00 00 00 00 1d 69 91 7c - 01 00 00 00 01 00 00 00
.....i.|........
000000000007ffb0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
000000000007ffc0 f0 ff 07 00 4f 6d 81 7c - 02 00 00 00 48 3c 09 5d
....Om.|....H<.]
000000000007ffd0 00 c0 fd 7f 38 b0 54 80 - c8 ff 07 00 48 0b 29 ff
....8.T.....H.).
000000000007ffe0 ff ff ff ff f3 99 83 7c - 58 6d 81 7c 00 00 00 00
.......|Xm.|....
000000000007fff0 00 00 00 00 00 00 00 00 - 4e e2 01 01 00 00 00 00
........N.......
0000000000080000 41 63 74 78 20 00 00 00 - 01 00 00 00 98 24 00 00 Actx
........$..
0000000000080010 c4 00 00 00 00 00 00 00 - 20 00 00 00 00 00 00 00
........ .......
0000000000080020 14 00 00 00 01 00 00 00 - 06 00 00 00 34 00 00 00
............4...

*----> State Dump for Thread Id 0x308 <----*

eax=00b2ff54 ebx=00000000 ecx=000930e8 edx=7c90eb94 esi=000930e8 edi=0009318c
eip=7c90eb94 esp=00b2fe1c ebp=00b2ff80 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for
C:\WINDOWS\system32\RPCRT4.dll -
WARNING: Stack unwind information not available. Following frames may be
wrong.
ChildEBP RetAddr Args to Child
00b2ff80 77e76c22 00b2ffa8 77e76a3b 000930e8 ntdll!KiFastSystemCallRet
00b2ff88 77e76a3b 000930e8 00000000 0007f88c RPCRT4!I_RpcBCacheFree+0x5ea
00b2ffa8 77e76c0a 000a6e30 00b2ffec 7c80b50b RPCRT4!I_RpcBCacheFree+0x403
00b2ffb4 7c80b50b 000b1b20 00000000 0007f88c RPCRT4!I_RpcBCacheFree+0x5d2
00b2ffec 00000000 77e76bf0 000b1b20 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000000b2fe1c 99 e3 90 7c 03 67 e7 77 - 90 01 00 00 70 ff b2 00
...|.g.w....p...
0000000000b2fe2c 00 00 00 00 b0 a0 16 00 - 4c ff b2 00 d4 d4 00 00
........L.......
0000000000b2fe3c e0 f3 d3 81 00 00 00 00 - 9c 36 50 c0 20 3d b4 ff
.........6P. =..
0000000000b2fe4c 82 00 00 00 02 fb 71 f3 - 00 00 4e 80 82 00 00 00
......q...N.....
0000000000b2fe5c 20 3d b4 ff 00 30 fa 7f - fc 07 30 c0 8c fe 1f c0
=...0....0.....
0000000000b2fe6c 82 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
0000000000b2fe7c 00 00 00 00 b8 fb 71 f3 - 28 fc 71 f3 0e c1 4e 80
......q.(.q...N.
0000000000b2fe8c fc 07 30 c0 28 fc 71 f3 - 86 bf 4e 80 00 30 fa 7f
..0.(.q...N..0..
0000000000b2fe9c 00 00 00 00 00 00 00 00 - e8 32 e8 81 28 3b b4 ff
.........2..(;..
0000000000b2feac 01 3b b4 ff 00 00 00 00 - 8c fe 1f c0 00 00 00 00
.;..............
0000000000b2febc ac 07 00 00 ff ff b4 01 - 00 00 04 00 4f 1b 00 00
............O...
0000000000b2fecc f4 3b b4 ff 28 3b b4 ff - 00 00 00 00 00 00 00 00
.;..(;..........
0000000000b2fedc 00 00 b5 01 3c fb 71 f3 - 34 37 50 c0 ff ff ff ff
....<.q.47P.....
0000000000b2feec f1 2a 4e 80 00 30 fa 7f - ff ff ff ff 46 02 00 00
.*N..0......F...
0000000000b2fefc e0 bd 4d 80 20 fc 71 f3 - 80 77 43 ff 20 f1 df ff ..M.
.q..wC. ...
0000000000b2ff0c 46 02 00 00 bc c6 4d 80 - f0 77 43 ff 80 77 43 ff
F.....M..wC..wC.
0000000000b2ff1c f2 c6 4d 80 ec 78 43 ff - 80 77 43 ff b4 77 43 ff
..M..xC..wC..wC.
0000000000b2ff2c 38 b0 54 80 80 ff b2 00 - 99 66 e7 77 4c ff b2 00
8.T......f.wL...
0000000000b2ff3c a9 66 e7 77 ed 10 90 7c - b8 12 0b 00 20 1b 0b 00
.f.w...|.... ...
0000000000b2ff4c 00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff
../M.....]......

*----> State Dump for Thread Id 0x358 <----*

eax=774f319a ebx=00007530 ecx=7ffdc000 edx=00000000 esi=00000000 edi=00c6ff50
eip=7c90eb94 esp=00c6ff20 ebp=00c6ff78 iopl=0 nv up ei pl nz na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000206

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be
wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for
C:\WINDOWS\system32\ole32.dll -
ChildEBP RetAddr Args to Child
00c6ff78 7c802451 0000ea60 00000000 00c6ffb4 ntdll!KiFastSystemCallRet
00c6ff88 774f2fcb 0000ea60 000b41f8 774f314d kernel32!Sleep+0xf
00c6ffb4 7c80b50b 000b41f8 7c910945 7c91094e ole32!StringFromGUID2+0x2d1
00c6ffec 00000000 774f319a 000b41f8 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000000c6ff20 5c d8 90 7c ed 23 80 7c - 00 00 00 00 50 ff c6 00
\..|.#.|....P...
0000000000c6ff30 50 25 80 7c f0 56 60 77 - 30 75 00 00 14 00 00 00
P%.|.V`w0u......
0000000000c6ff40 01 00 00 00 00 00 00 00 - 00 00 00 00 10 00 00 00
................
0000000000c6ff50 00 ba 3c dc ff ff ff ff - e4 fe c6 00 50 ff c6 00
..<.........P...
0000000000c6ff60 30 ff c6 00 e4 fe c6 00 - dc ff c6 00 f3 99 83 7c
0..............|
0000000000c6ff70 58 24 80 7c 00 00 00 00 - 88 ff c6 00 51 24 80 7c
X$.|........Q$.|
0000000000c6ff80 60 ea 00 00 00 00 00 00 - b4 ff c6 00 cb 2f 4f 77
`............/Ow
0000000000c6ff90 60 ea 00 00 f8 41 0b 00 - 4d 31 4f 77 00 00 00 00
`....A..M1Ow....
0000000000c6ffa0 45 09 91 7c f8 41 0b 00 - 00 00 4e 77 b5 31 4f 77
E..|.A....Nw.1Ow
0000000000c6ffb0 4e 09 91 7c ec ff c6 00 - 0b b5 80 7c f8 41 0b 00
N..|.......|.A..
0000000000c6ffc0 45 09 91 7c 4e 09 91 7c - f8 41 0b 00 00 d0 fd 7f
E..|N..|.A......
0000000000c6ffd0 00 46 f4 81 c0 ff c6 00 - 68 38 87 ff ff ff ff ff
.F......h8......
0000000000c6ffe0 f3 99 83 7c 18 b5 80 7c - 00 00 00 00 00 00 00 00
...|...|........
0000000000c6fff0 00 00 00 00 9a 31 4f 77 - f8 41 0b 00 00 00 00 00
.....1Ow.A......
0000000000c70000 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
0000000000c70010 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
0000000000c70020 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
0000000000c70030 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
0000000000c70040 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
0000000000c70050 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................

*----> State Dump for Thread Id 0x298 <----*

eax=f35c1654 ebx=00000000 ecx=000000d6 edx=000000b2 esi=7c97c0d8 edi=00000000
eip=7c90eb94 esp=00cae064 ebp=00cae0ec iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=00bc es=0002 fs=003b gs=ecd1 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top