locked
Windows 2003 disadvantaged! RRS feed

  • Question

  • All,

    I have a question!  I run a legit (just reinstalled) version of Windows 2003, with SP1 and IE v7 without problem.  I have also installed all the critical and non-critical updates from the WindowsUpdate website; without problem.

    When I go to download DirectX9 Web Install (Dec distro) from http://download.microsoft.com it requires the user to validate.  Fair enough, I am all for prevention of Piracy, etc and think that the principle is a good idea.  However Windows 2003 is not supported by the validation process!  What actually happens is that the WGA dll causes a Dr Watson crash dump to occur, and IE v7 does a nose dive!

    From http://www.microsoft.com/genuine/ I have attempted to validate manually and was informed that I am not running on a supported OS.  I have already validated this copy of Windows 2003 with Microsoft over the internet without problem, as part of the install process! It seems silly: Win2K3 is still supported and is an active OS that has yet to be retired; why should users be disadvantaged in this way?  What if I wanted to download DirectX for a Windows XP machine and my main desktop was FreeBSD for example?  (It could be that the XP machine was prevented from accessing the internet for security reasons and another OS was used to download updates from http://download.microsoft.com).

    Does anybody know a way in which a Win2k3 server can validate successfully; Is it possible?  I have contacted the support team for WGA but they only support it on XP, and they suggested that I should created a _paid_ for support request to investigate why WGA does not work on 2003!  I personally do not want to pay monies to have assistance with a download issue, on principle of the issue and a predictable outcome...

    So why in WGAs design has Windows 2003 been excluded and placed in a disadvantaged senario?  I lot of people have invested heavily in Windows 2003 and it seems that Microsoft are pushing people to the next OS level even before it is officially released.  Can anybody help with this senario, especially someone who can respond on Microsoft's behalf to even comment on why Windows 2003 has been put at a disadvantge?

    Thanks for your feedback in advance.

    James.

    Friday, January 5, 2007 9:04 PM

Answers

  • If you have broadband, it might just be simpler to bypass the Web Install and instead try the full redistributable:
    http://www.microsoft.com/downloads/details.aspx?familyid=77BC0499-19D0-46B6-A178-033D9E6C626B&displaylang=en

    It's about 60MB but generally seems to be more Win2k/Win2003 friendly.  I'd file a support ticket though with your bug on the Web Installer as well as zip/save your crash dump.  This will be useful for Microsoft to fix in future revisions of the DX Web Installer.
    Saturday, January 6, 2007 12:47 AM

All replies

  • If you have broadband, it might just be simpler to bypass the Web Install and instead try the full redistributable:
    http://www.microsoft.com/downloads/details.aspx?familyid=77BC0499-19D0-46B6-A178-033D9E6C626B&displaylang=en

    It's about 60MB but generally seems to be more Win2k/Win2003 friendly.  I'd file a support ticket though with your bug on the Web Installer as well as zip/save your crash dump.  This will be useful for Microsoft to fix in future revisions of the DX Web Installer.
    Saturday, January 6, 2007 12:47 AM
  •  JamesElstone wrote:

    All,

    I have a question!  I run a legit (just reinstalled) version of Windows 2003, with SP1 and IE v7 without problem.  I have also installed all the critical and non-critical updates from the WindowsUpdate website; without problem.

    When I go to download DirectX9 Web Install (Dec distro) from http://download.microsoft.com it requires the user to validate.  Fair enough, I am all for prevention of Piracy, etc and think that the principle is a good idea.  However Windows 2003 is not supported by the validation process!  What actually happens is that the WGA dll causes a Dr Watson crash dump to occur, and IE v7 does a nose dive!

    From http://www.microsoft.com/genuine/ I have attempted to validate manually and was informed that I am not running on a supported OS.  I have already validated this copy of Windows 2003 with Microsoft over the internet without problem, as part of the install process! It seems silly: Win2K3 is still supported and is an active OS that has yet to be retired; why should users be disadvantaged in this way?  What if I wanted to download DirectX for a Windows XP machine and my main desktop was FreeBSD for example?  (It could be that the XP machine was prevented from accessing the internet for security reasons and another OS was used to download updates from http://download.microsoft.com).

    Does anybody know a way in which a Win2k3 server can validate successfully; Is it possible?  I have contacted the support team for WGA but they only support it on XP, and they suggested that I should created a _paid_ for support request to investigate why WGA does not work on 2003!  I personally do not want to pay monies to have assistance with a download issue, on principle of the issue and a predictable outcome...

    So why in WGAs design has Windows 2003 been excluded and placed in a disadvantaged senario?  I lot of people have invested heavily in Windows 2003 and it seems that Microsoft are pushing people to the next OS level even before it is officially released.  Can anybody help with this senario, especially someone who can respond on Microsoft's behalf to even comment on why Windows 2003 has been put at a disadvantge?

    Thanks for your feedback in advance.

    James.

     

    WGA Validation is not required and is bypassed for Windows Server 2003.

    Please put the crash dump out and I'll pull it to my team to investigate.

    Saturday, January 6, 2007 1:37 AM
  • Thanks for your answers.  I have now downloaded DirectX v9 core redistributable as suggested above.

    Phil: I wasn't expecting a response this quick!  Thanks for your help on this, any feedback from this would be welcomed.

    One thing I have discovered since posting: If "regsvr32 -u %windir%\system32\legitcheckcontrol.dll" is run and the download site revisited it reinstalls WGA and seems to work the first time after reinstallation but then the same problem reoccurs for subsequent validation attempts, even for the same file again.

    Let me know if you need any more information.

    The DrWtsn log is a bit long (sorry but no way of attaching), but here it is (look for "fault -"):

    Application exception occurred:
            App: C:\Program Files\Internet Explorer\iexplore.exe (pid=1408)
            When: 29/12/2006 @ 22:43:02.200
            Exception number: c0000005 (access violation)

    *----> System Information <----*
            Computer Name: POPPY
            User Name: Administrator
            Terminal Session Id: 0
            Number of Processors: 1
            Processor Type: x86 Family 6 Model 7 Stepping 3
            Windows Version: 5.2
            Current Build: 3790
            Service Pack: 1
            Current Type: Uniprocessor Free

    *----> Task List <----*
       0 System Process
       4 System
     308 smss.exe
     356 csrss.exe
     636 winlogon.exe
     680 services.exe
     692 lsass.exe
     876 svchost.exe
     944 svchost.exe
     996 svchost.exe
    1024 svchost.exe
    1036 svchost.exe
    1216 spoolsv.exe
    1288 msdtc.exe
    1384 appmgr.exe
    1452 dns.exe
    1476 elementmgr.exe
    1504 svchost.exe
    1560 inetinfo.exe
    1596 svchost.exe
    1648 srvcsurg.exe
    1888 svchost.exe
     176 svchost.exe
     232 wmiprvse.exe
     260 alg.exe
    2344 Explorer.EXE
    2456 CPUMon.exe
    2480 ctfmon.exe
    2488 hdi.exe
    2508 speedfan.exe
    2708 svchost.exe
    2748 wmiprvse.exe
    3212 taskmgr.exe
    1408 iexplore.exe
    3800 drwtsn32.exe

    *----> Module List <----*
    0000000000400000 - 000000000049a000: C:\Program Files\Internet Explorer\iexplore.exe
    00000000008f0000 - 0000000000eb9000: C:\WINDOWS\system32\IEFRAME.dll
    00000000012a0000 - 00000000012cf000: C:\WINDOWS\system32\IEUI.dll
    0000000001870000 - 0000000001879000: C:\WINDOWS\system32\Normaliz.dll
    0000000001a80000 - 0000000001aca000: C:\Program Files\Internet Explorer\ieproxy.dll
    0000000002050000 - 0000000002079000: C:\WINDOWS\system32\msls31.dll
    0000000004b80000 - 0000000004bb2000: C:\WINDOWS\system32\iepeers.dll
    0000000005da0000 - 0000000005e17000: C:\WINDOWS\system32\mshtmled.dll
    00000000067f0000 - 0000000006959000: C:\WINDOWS\system32\LegitCheckControl.DLL
    0000000006a30000 - 0000000006a95000: C:\WINDOWS\system32\vbscript.dll
    0000000006d10000 - 0000000006e22000: C:\WINDOWS\system32\msxml3.dll
    0000000010000000 - 00000000102c5000: C:\WINDOWS\system32\xpsp2res.dll
    000000001a400000 - 000000001a524000: C:\WINDOWS\system32\urlmon.dll
    0000000030000000 - 00000000302ee000: C:\WINDOWS\system32\Macromed\Flash\Flash9b.ocx
    0000000035c50000 - 0000000035c89000: C:\WINDOWS\system32\Dxtrans.dll
    0000000035cb0000 - 0000000035d07000: C:\WINDOWS\system32\Dxtmsft.dll
    000000004b8d0000 - 000000004b921000: C:\WINDOWS\system32\MSCTF.dll
    000000004dc30000 - 000000004dc5e000: C:\WINDOWS\system32\msctfime.ime
    000000004dd60000 - 000000004df07000: C:\WINDOWS\WinSxS\x86_Microsoft.Windows.GdiPlus_6595b64144ccf1df_1.0.3790.1830_x-ww_24C40C58\gdiplus.dll
    000000005ccf0000 - 000000005ccff000: C:\WINDOWS\system32\SAMLIB.dll
    000000005dca0000 - 000000005dce5000: C:\WINDOWS\system32\iertutil.dll
    000000005f270000 - 000000005f2c9000: C:\WINDOWS\system32\hnetcfg.dll
    0000000063000000 - 00000000630ce000: C:\WINDOWS\system32\WININET.dll
    0000000063380000 - 00000000633f8000: C:\WINDOWS\system32\jscript.dll
    0000000063580000 - 00000000638ef000: C:\WINDOWS\system32\mshtml.dll
    0000000068000000 - 000000006802f000: C:\WINDOWS\system32\rsaenh.dll
    000000006d4c0000 - 000000006d4ca000: C:\WINDOWS\system32\ddrawex.dll
    0000000071ae0000 - 0000000071ae8000: C:\WINDOWS\System32\wshtcpip.dll
    0000000071b20000 - 0000000071b61000: C:\WINDOWS\system32\mswsock.dll
    0000000071b70000 - 0000000071ba6000: C:\WINDOWS\system32\UxTheme.dll
    0000000071bb0000 - 0000000071bb9000: C:\WINDOWS\system32\WSOCK32.dll
    0000000071bf0000 - 0000000071bf8000: C:\WINDOWS\system32\WS2HELP.dll
    0000000071c00000 - 0000000071c17000: C:\WINDOWS\system32\ws2_32.dll
    0000000071c40000 - 0000000071c98000: C:\WINDOWS\system32\netapi32.dll
    0000000071d00000 - 0000000071d1c000: C:\WINDOWS\system32\actxprxy.dll
    00000000722f0000 - 00000000722f5000: C:\WINDOWS\system32\sensapi.dll
    0000000072d60000 - 0000000072d68000: C:\WINDOWS\system32\msacm32.drv
    0000000072d70000 - 0000000072d79000: C:\WINDOWS\system32\wdmaud.drv
    0000000072ea0000 - 0000000072f00000: C:\WINDOWS\system32\ieapfltr.dll
    0000000073070000 - 0000000073097000: C:\WINDOWS\system32\WINSPOOL.DRV
    0000000073860000 - 00000000738ac000: C:\WINDOWS\system32\DDRAW.dll
    0000000073b30000 - 0000000073b36000: C:\WINDOWS\system32\DCIMAN32.dll
    0000000073ca0000 - 0000000073cb2000: C:\WINDOWS\system32\cryptnet.dll
    00000000744c0000 - 00000000744ea000: C:\WINDOWS\system32\msimtf.dll
    0000000074540000 - 00000000745d4000: C:\WINDOWS\system32\MLANG.dll
    0000000074a80000 - 0000000074aaf000: C:\WINDOWS\system32\oleacc.dll
    0000000075360000 - 00000000753df000: C:\WINDOWS\system32\CRYPTUI.dll
    0000000075490000 - 00000000754f1000: C:\WINDOWS\system32\USP10.dll
    0000000075da0000 - 0000000075e5c000: C:\WINDOWS\system32\SXS.DLL
    0000000075e60000 - 0000000075e87000: C:\WINDOWS\system32\apphelp.dll
    0000000075eb0000 - 0000000075fb0000: C:\WINDOWS\system32\browseui.dll
    0000000076190000 - 00000000761a2000: C:\WINDOWS\system32\MSASN1.dll
    00000000761b0000 - 0000000076243000: C:\WINDOWS\system32\CRYPT32.dll
    0000000076280000 - 0000000076285000: C:\WINDOWS\system32\MSIMG32.dll
    0000000076290000 - 00000000762ad000: C:\WINDOWS\system32\IMM32.DLL
    00000000762b0000 - 00000000762fa000: C:\WINDOWS\system32\comdlg32.dll
    0000000076520000 - 000000007653e000: C:\WINDOWS\System32\CSCDLL.dll
    0000000076750000 - 0000000076777000: C:\WINDOWS\system32\schannel.dll
    0000000076920000 - 00000000769e4000: C:\WINDOWS\system32\USERENV.dll
    0000000076a80000 - 0000000076a98000: C:\WINDOWS\system32\ATL.DLL
    0000000076aa0000 - 0000000076acd000: C:\WINDOWS\system32\WINMM.dll
    0000000076b70000 - 0000000076b7b000: C:\WINDOWS\system32\PSAPI.DLL
    0000000076bb0000 - 0000000076bdb000: C:\WINDOWS\system32\WINTRUST.dll
    0000000076c10000 - 0000000076c39000: C:\WINDOWS\system32\imagehlp.dll
    0000000076c90000 - 0000000076cb7000: C:\WINDOWS\system32\msv1_0.dll
    0000000076cf0000 - 0000000076d0a000: C:\WINDOWS\system32\iphlpapi.dll
    0000000076e30000 - 0000000076e3c000: C:\WINDOWS\system32\rtutils.dll
    0000000076e40000 - 0000000076e52000: C:\WINDOWS\system32\rasman.dll
    0000000076e60000 - 0000000076e8f000: C:\WINDOWS\system32\TAPI32.dll
    0000000076e90000 - 0000000076ecf000: C:\WINDOWS\system32\RASAPI32.dll
    0000000076ed0000 - 0000000076eff000: C:\WINDOWS\system32\DNSAPI.dll
    0000000076f10000 - 0000000076f3e000: C:\WINDOWS\system32\WLDAP32.dll
    0000000076f50000 - 0000000076f63000: C:\WINDOWS\system32\Secur32.dll
    0000000076f70000 - 0000000076f77000: C:\WINDOWS\System32\winrnr.dll
    0000000076f80000 - 0000000076f88000: C:\WINDOWS\system32\rasadhlp.dll
    0000000077010000 - 00000000770d6000: C:\WINDOWS\system32\COMRes.dll
    00000000770e0000 - 00000000771ea000: C:\WINDOWS\system32\SETUPAPI.dll
    0000000077380000 - 0000000077412000: C:\WINDOWS\system32\USER32.dll
    0000000077420000 - 0000000077523000: C:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.3790.2778_x-ww_A8F04F11\comctl32.dll
    0000000077530000 - 00000000775c7000: C:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_5.82.3790.2778_x-ww_497C098C\COMCTL32.dll
    0000000077670000 - 00000000777a4000: C:\WINDOWS\system32\ole32.dll
    00000000777b0000 - 0000000077833000: C:\WINDOWS\system32\CLBCatQ.DLL
    0000000077980000 - 0000000077af5000: C:\WINDOWS\system32\SHDOCVW.dll
    0000000077b00000 - 0000000077b54000: C:\WINDOWS\System32\cscui.dll
    0000000077b60000 - 0000000077b67000: C:\WINDOWS\system32\midimap.dll
    0000000077b70000 - 0000000077b84000: C:\WINDOWS\system32\MSACM32.dll
    0000000077b90000 - 0000000077b98000: C:\WINDOWS\system32\VERSION.dll
    0000000077ba0000 - 0000000077bfa000: C:\WINDOWS\system32\msvcrt.dll
    0000000077c00000 - 0000000077c48000: C:\WINDOWS\system32\GDI32.dll
    0000000077c50000 - 0000000077cef000: C:\WINDOWS\system32\RPCRT4.dll
    0000000077d00000 - 0000000077d8c000: C:\WINDOWS\system32\OLEAUT32.dll
    0000000077da0000 - 0000000077df2000: C:\WINDOWS\system32\SHLWAPI.dll
    0000000077e00000 - 0000000077e22000: C:\WINDOWS\system32\NTMARTA.DLL
    0000000077e40000 - 0000000077f42000: C:\WINDOWS\system32\kernel32.dll
    0000000077f50000 - 0000000077fec000: C:\WINDOWS\system32\ADVAPI32.dll
    00000000780c0000 - 0000000078121000: C:\WINDOWS\system32\MSVCP60.dll
    000000007c800000 - 000000007c8c0000: C:\WINDOWS\system32\ntdll.dll
    000000007c8d0000 - 000000007d0d4000: C:\WINDOWS\system32\SHELL32.dll
    000000007f370000 - 000000007f391000: C:\WINDOWS\system32\xmllite.dll

    *----> State Dump for Thread Id 0x194 <----*

    eax=c0150008 ebx=0012e6d8 ecx=0000004d edx=00000000 esi=0012e6dc edi=7ffdf000
    eip=7c82ed66 esp=0012e68c ebp=0012e734 iopl=0         nv up ei pl zr na po nc
    cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00000246

    *** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\ntdll.dll -
    function: ntdll!KiIntSystemCall
            ntdll!KiFastSystemCall:
            7c82ed50 8bd4             mov     edx,esp
            7c82ed52 0f34             sysenter
            ntdll!KiFastSystemCallRet:
            7c82ed54 c3               ret
            7c82ed55 8da42400000000   lea     esp,[esp]
            7c82ed5c 8d642400         lea     esp,[esp]
            ntdll!KiIntSystemCall:
            7c82ed60 8d542408         lea     edx,[esp+0x8]
            7c82ed64 cd2e             int     2e
            7c82ed66 c3               ret
            ntdll!RtlRaiseException:
            7c82ed67 55               push    ebp
            7c82ed68 8bec             mov     ebp,esp
            7c82ed6a 8da42430fdffff   lea     esp,[esp-0x2d0]
            7c82ed71 54               push    esp
            7c82ed72 e8ad010000       call    ntdll!RtlCaptureContext (7c82ef24)
            7c82ed77 8b5504           mov     edx,[ebp+0x4]
            7c82ed7a 8b4508           mov     eax,[ebp+0x8]
            7c82ed7d 838424c400000004 add     dword ptr [esp+0xc4],0x4
            7c82ed85 89500c           mov     [eax+0xc],edx

    *----> Stack Back Trace <----*
    *** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\USER32.dll -
    *** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\IEUI.dll -
    *** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\IEFRAME.dll -
    *** ERROR: Module load completed but symbols could not be loaded for C:\Program Files\Internet Explorer\iexplore.exe
    *** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\kernel32.dll -
    ChildEBP RetAddr  Args to Child             
    WARNING: Stack unwind information not available. Following frames may be wrong.
    0012e734 7739cd08 00000002 0012e75c 00000000 ntdll!KiIntSystemCall+0x6
    0012e790 012a6029 00000001 0012e7c4 ffffffff USER32!PeekMessageW+0x244
    0012e7b0 012a632d 000004ff ffffffff 00000000 IEUI!DUserRegisterSuper+0x9bd
    0012e7d8 012a60d8 000004ff 00000000 0099fb0b IEUI!PeekMessageExW+0x21f
    0012e814 009afd55 00151568 0012e844 009b12af IEUI!WaitMessageEx+0x31
    0012e820 009b12af 00000000 00000000 001501d0 IEFRAME!SetQueryNetSessionCount+0xa731
    0012e844 009b11fd 17de0006 001501d0 00000000 IEFRAME!Ordinal101+0x34b
    0012f8b4 009b10ad 001501d0 77dc0715 00000000 IEFRAME!Ordinal101+0x299
    0012faec 00402ead 001481d8 00000001 0040f070 IEFRAME!Ordinal101+0x149
    0012ff2c 00402d3a 00400000 00000000 0002075c iexplore+0x2ead
    0012ffc0 77e523e5 00000000 00000000 7ffdf000 iexplore+0x2d3a
    0012fff0 00000000 00402bc5 00000000 78746341 kernel32!IsProcessorFeaturePresent+0x9e

    *----> Raw Stack Dump <----*
    000000000012e68c  14 21 82 7c 43 71 e6 77 - 02 00 00 00 d8 e6 12 00  .!.|Cq.w........
    000000000012e69c  01 00 00 00 00 00 00 00 - 00 00 00 00 02 00 00 00  ................
    000000000012e6ac  00 00 00 00 00 00 00 00 - 24 00 00 00 01 00 00 00  ........$.......
    000000000012e6bc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
    000000000012e6cc  00 00 00 00 00 00 00 00 - 00 00 00 00 10 01 00 00  ................
    000000000012e6dc  2c 00 00 00 cd ab ba dc - 00 00 00 00 3c e7 12 00  ,...........<...
    000000000012e6ec  15 6b 99 00 68 e7 12 00 - 18 e7 12 00 15 6b 99 00  .k..h........k..
    000000000012e6fc  28 00 00 00 00 f0 fd 7f - c8 c4 39 77 00 00 00 00  (.........9w....
    000000000012e70c  d8 e6 12 00 01 00 00 00 - 01 00 00 00 02 00 00 00  ................
    000000000012e71c  a8 e6 12 00 ff ff ff ff - b0 ff 12 00 d0 b7 e6 77  ...............w
    000000000012e72c  30 72 e6 77 00 00 00 00 - 90 e7 12 00 08 cd 39 77  0r.w..........9w
    000000000012e73c  02 00 00 00 5c e7 12 00 - 00 00 00 00 ff ff ff ff  ....\...........
    000000000012e74c  00 00 00 00 ff ff ff ff - 01 00 00 00 01 00 00 00  ................
    000000000012e75c  10 01 00 00 2c 00 00 00 - bd 62 2a 01 eb ce 30 00  ....,....b*...0.
    000000000012e76c  00 7c 15 00 01 00 00 00 - 00 00 00 00 00 00 00 00  .|..............
    000000000012e77c  00 00 00 00 00 00 00 00 - 00 00 00 00 2c 00 00 00  ............,...
    000000000012e78c  5c e7 12 00 b0 e7 12 00 - 29 60 2a 01 01 00 00 00  \.......)`*.....
    000000000012e79c  c4 e7 12 00 ff ff ff ff - ff 04 00 00 00 00 00 00  ................
    000000000012e7ac  48 7b 15 00 d8 e7 12 00 - 2d 63 2a 01 ff 04 00 00  H{......-c*.....
    000000000012e7bc  ff ff ff ff 00 00 00 00 - 10 01 00 00 00 00 00 00  ................

    *----> State Dump for Thread Id 0xffc <----*

    eax=00ec401c ebx=010bfef0 ecx=7ffdd000 edx=00000000 esi=00000002 edi=00000000
    eip=7c82ed66 esp=010bfea4 ebp=010bff48 iopl=0         nv up ei pl zr na po nc
    cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00000246

    function: ntdll!KiIntSystemCall
            ntdll!KiFastSystemCall:
            7c82ed50 8bd4             mov     edx,esp
            7c82ed52 0f34             sysenter
            ntdll!KiFastSystemCallRet:
            7c82ed54 c3               ret
            7c82ed55 8da42400000000   lea     esp,[esp]
            7c82ed5c 8d642400         lea     esp,[esp]
            ntdll!KiIntSystemCall:
            7c82ed60 8d542408         lea     edx,[esp+0x8]
            7c82ed64 cd2e             int     2e
            7c82ed66 c3               ret
            ntdll!RtlRaiseException:
            7c82ed67 55               push    ebp
            7c82ed68 8bec             mov     ebp,esp
            7c82ed6a 8da42430fdffff   lea     esp,[esp-0x2d0]
            7c82ed71 54               push    esp
            7c82ed72 e8ad010000       call    ntdll!RtlCaptureContext (7c82ef24)
            7c82ed77 8b5504           mov     edx,[ebp+0x4]
            7c82ed7a 8b4508           mov     eax,[ebp+0x8]
            7c82ed7d 838424c400000004 add     dword ptr [esp+0xc4],0x4
            7c82ed85 89500c           mov     [eax+0xc],edx

    *----> Stack Back Trace <----*
    ChildEBP RetAddr  Args to Child             
    WARNING: Stack unwind information not available. Following frames may be wrong.
    010bff48 7c80e933 00000002 010bff70 00000000 ntdll!KiIntSystemCall+0x6
    010bffb8 77e6608b 00000000 00000000 00000000 ntdll!RtlSetLastWin32ErrorAndNtStatusFromNtStatus+0x282
    010bffec 00000000 7c80e6d1 00000000 00000000 kernel32!GetModuleFileNameA+0xeb

    *----> Raw Stack Dump <----*
    00000000010bfea4  14 21 82 7c 04 e5 80 7c - 02 00 00 00 f0 fe 0b 01  .!.|...|........
    00000000010bfeb4  01 00 00 00 01 00 00 00 - 10 ff 0b 01 00 10 00 00  ................
    00000000010bfec4  88 1f ec 00 80 89 88 7c - 24 00 00 00 01 00 00 00  .......|$.......
    00000000010bfed4  00 00 00 00 00 00 00 00 - 30 00 00 00 ff ff ff ff  ........0.......
    00000000010bfee4  ff ff ff ff a5 cd 80 7c - 00 00 00 00 88 00 00 00  .......|........
    00000000010bfef4  94 00 00 00 08 00 00 c0 - 00 10 00 00 30 ff 0b 01  ............0...
    00000000010bff04  dc 15 83 7c e1 15 83 7c - 00 10 00 00 00 a2 2f 4d  ...|...|....../M
    00000000010bff14  ff ff ff ff 00 f0 fd 7f - 80 89 88 7c 10 ff 0b 01  ...........|....
    00000000010bff24  f0 fe 0b 01 e8 15 83 7c - 02 00 00 00 c0 fe 0b 01  .......|........
    00000000010bff34  be e6 80 7c dc ff 0b 01 - 80 f6 82 7c 10 ce 80 7c  ...|.......|...|
    00000000010bff44  00 00 00 00 b8 ff 0b 01 - 33 e9 80 7c 02 00 00 00  ........3..|....
    00000000010bff54  70 ff 0b 01 00 00 00 00 - e0 93 04 00 01 00 00 00  p...............
    00000000010bff64  00 00 00 00 00 00 00 00 - 00 00 00 00 88 00 00 00  ................
    00000000010bff74  94 00 00 00 00 10 00 00 - 88 1f ec 00 00 10 00 00  ................
    00000000010bff84  90 2f ec 00 c0 82 88 7c - 00 00 00 00 78 00 00 00  ./.....|....x...
    00000000010bff94  a0 82 88 7c 00 10 00 00 - c0 82 88 7c 88 1f ec 00  ...|.......|....
    00000000010bffa4  00 00 00 00 a0 82 88 7c - e5 03 00 00 00 10 00 00  .......|........
    00000000010bffb4  90 2f ec 00 ec ff 0b 01 - 8b 60 e6 77 00 00 00 00  ./.......`.w....
    00000000010bffc4  00 00 00 00 00 00 00 00 - 00 00 00 00 63 b1 76 03  ............c.v.
    00000000010bffd4  c4 ff 0b 01 6c 47 00 00 - ff ff ff ff d0 b7 e6 77  ....lG.........w

    *----> State Dump for Thread Id 0xd74 <----*

    eax=00150001 ebx=013cfe04 ecx=00152848 edx=00000000 esi=013cfe08 edi=7ffdf000
    eip=7c82ed66 esp=013cfdb8 ebp=013cfe60 iopl=0         nv up ei pl zr na po nc
    cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00000246

    function: ntdll!KiIntSystemCall
            ntdll!KiFastSystemCall:
            7c82ed50 8bd4             mov     edx,esp
            7c82ed52 0f34             sysenter
            ntdll!KiFastSystemCallRet:
            7c82ed54 c3               ret
            7c82ed55 8da42400000000   lea     esp,[esp]
            7c82ed5c 8d642400         lea     esp,[esp]
            ntdll!KiIntSystemCall:
            7c82ed60 8d542408         lea     edx,[esp+0x8]
            7c82ed64 cd2e             int     2e
            7c82ed66 c3               ret
            ntdll!RtlRaiseException:
            7c82ed67 55               push    ebp
            7c82ed68 8bec             mov     ebp,esp
            7c82ed6a 8da42430fdffff   lea     esp,[esp-0x2d0]
            7c82ed71 54               push    esp
            7c82ed72 e8ad010000       call    ntdll!RtlCaptureContext (7c82ef24)
            7c82ed77 8b5504           mov     edx,[ebp+0x4]
            7c82ed7a 8b4508           mov     eax,[ebp+0x8]
            7c82ed7d 838424c400000004 add     dword ptr [esp+0xc4],0x4
            7c82ed85 89500c           mov     [eax+0xc],edx

    *----> Stack Back Trace <----*
    *** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\msvcrt.dll -
    ChildEBP RetAddr  Args to Child             
    WARNING: Stack unwind information not available. Following frames may be wrong.
    013cfe60 7739cd08 00000002 013cfe88 00000000 ntdll!KiIntSystemCall+0x6
    013cfebc 012a6029 00000001 013cfef0 ffffffff USER32!PeekMessageW+0x244
    013cfedc 012a93e4 000004ff ffffffff 00000001 IEUI!DUserRegisterSuper+0x9bd
    013cff10 012a98a6 013cff50 00000000 00000000 IEUI!SetGadgetParent+0x53d
    013cff30 012a9806 013cff50 00000000 00000000 IEUI!GetMessageExA+0x3d
    013cff84 77bcb530 00000000 00000000 00000000 IEUI!SetGadgetParent+0x95f
    013cffb8 77e6608b 008b4978 00000000 00000000 msvcrt!endthreadex+0xa3
    013cffec 00000000 77bcb4bc 008b4978 00000000 kernel32!GetModuleFileNameA+0xeb

    *----> Raw Stack Dump <----*
    00000000013cfdb8  14 21 82 7c 43 71 e6 77 - 02 00 00 00 04 fe 3c 01  .!.|Cq.w......<.
    00000000013cfdc8  01 00 00 00 00 00 00 00 - 00 00 00 00 02 00 00 00  ................
    00000000013cfdd8  04 00 00 00 00 00 00 00 - 24 00 00 00 01 00 00 00  ........$.......
    00000000013cfde8  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
    00000000013cfdf8  00 00 00 00 00 00 00 00 - 00 00 00 00 08 01 00 00  ................
    00000000013cfe08  04 01 00 00 08 17 3d 01 - 24 fe 3c 01 81 6e 2a 01  ......=.$.<..n*.
    00000000013cfe18  08 17 3d 01 00 00 00 00 - 18 dd 12 00 30 fe 3c 01  ..=.........0.<.
    00000000013cfe28  c5 6f 2a 01 00 f0 fd 7f - 40 fe 3c 01 00 00 00 00  .o*.....@.<.....
    00000000013cfe38  04 fe 3c 01 0c 00 00 00 - 98 fe 3c 01 02 00 00 00  ..<.......<.....
    00000000013cfe48  d4 fd 3c 01 63 6f 2a 01 - a8 ff 3c 01 d0 b7 e6 77  ..<.co*...<....w
    00000000013cfe58  30 72 e6 77 00 00 00 00 - bc fe 3c 01 08 cd 39 77  0r.w......<...9w
    00000000013cfe68  02 00 00 00 88 fe 3c 01 - 00 00 00 00 ff ff ff ff  ......<.........
    00000000013cfe78  00 00 00 00 ff ff ff ff - 01 00 00 00 01 00 00 00  ................
    00000000013cfe88  08 01 00 00 04 01 00 00 - bd 62 2a 01 fa 6b 2c 00  .........b*..k,.
    00000000013cfe98  80 60 15 00 01 00 00 00 - 00 00 00 00 00 00 00 00  .`..............
    00000000013cfea8  00 00 00 00 00 00 00 00 - 00 00 00 00 04 01 00 00  ................
    00000000013cfeb8  88 fe 3c 01 dc fe 3c 01 - 29 60 2a 01 01 00 00 00  ..<...<.)`*.....
    00000000013cfec8  f0 fe 3c 01 ff ff ff ff - ff 04 00 00 04 00 00 00  ..<.............
    00000000013cfed8  d0 27 15 00 10 ff 3c 01 - e4 93 2a 01 ff 04 00 00  .'....<...*.....
    00000000013cfee8  ff ff ff ff 01 00 00 00 - 08 01 00 00 00 00 00 00  ................

    *----> State Dump for Thread Id 0xd70 <----*

    eax=002c6bd2 ebx=00000100 ecx=00000000 edx=00000000 esi=0016a9d8 edi=00000000
    eip=7c82ed66 esp=0197fe1c ebp=0197ff84 iopl=0         nv up ei pl zr na po nc
    cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00000246

    function: ntdll!KiIntSystemCall
            ntdll!KiFastSystemCall:
            7c82ed50 8bd4             mov     edx,esp
            7c82ed52 0f34             sysenter
            ntdll!KiFastSystemCallRet:
            7c82ed54 c3               ret
            7c82ed55 8da42400000000   lea     esp,[esp]
            7c82ed5c 8d642400         lea     esp,[esp]
            ntdll!KiIntSystemCall:
            7c82ed60 8d542408         lea     edx,[esp+0x8]
            7c82ed64 cd2e             int     2e
            7c82ed66 c3               ret
            ntdll!RtlRaiseException:
            7c82ed67 55               push    ebp
            7c82ed68 8bec             mov     ebp,esp
            7c82ed6a 8da42430fdffff   lea     esp,[esp-0x2d0]
            7c82ed71 54               push    esp
            7c82ed72 e8ad010000       call    ntdll!RtlCaptureContext (7c82ef24)
            7c82ed77 8b5504           mov     edx,[ebp+0x4]
            7c82ed7a 8b4508           mov     eax,[ebp+0x8]
            7c82ed7d 838424c400000004 add     dword ptr [esp+0xc4],0x4
            7c82ed85 89500c           mov     [eax+0xc],edx

    *----> Stack Back Trace <----*
    *** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\RPCRT4.dll -
    ChildEBP RetAddr  Args to Child             
    WARNING: Stack unwind information not available. Following frames may be wrong.
    0197ff84 77c5778f 0197ffac 77c5f7dd 0016a9d8 ntdll!KiIntSystemCall+0x6
    0197ff8c 77c5f7dd 0016a9d8 00000000 00000000 RPCRT4!NdrOleFree+0x3c5
    0197ffac 77c5de88 00147438 0197ffec 77e6608b RPCRT4!I_RpcTransGetThreadEvent+0x188
    0197ffb8 77e6608b 0018c3d8 00000000 00000000 RPCRT4!I_RpcLogEvent+0xe92
    0197ffec 00000000 77c5de6d 0018c3d8 00000000 kernel32!GetModuleFileNameA+0xeb

    *----> Raw Stack Dump <----*
    000000000197fe1c  54 1c 82 7c 8c 53 c7 77 - 18 02 00 00 74 ff 97 01  T..|.S.w....t...
    000000000197fe2c  00 00 00 00 18 22 4a 04 - 54 ff 97 01 00 00 00 00  ....."J.T.......
    000000000197fe3c  7c 01 00 00 00 a5 95 81 - 20 00 00 00 56 61 64 53  |....... ...VadS
    000000000197fe4c  7c 01 00 00 05 00 00 00 - 04 00 00 00 00 60 b4 81  |............`..
    000000000197fe5c  fb 41 00 00 88 2f 06 81 - 00 00 00 00 fb 41 00 00  .A.../.......A..
    000000000197fe6c  50 8b 99 b9 e5 3a 84 80 - fb 41 00 00 00 00 00 00  P....:...A......
    000000000197fe7c  88 2f 06 81 01 16 00 00 - fb 41 00 00 7c 8b 99 b9  ./.......A..|...
    000000000197fe8c  c1 49 84 80 fc 07 30 c0 - 5c ff 1f c0 58 ff 1f c0  .I....0.\...X...
    000000000197fe9c  f7 02 00 00 8e a8 00 00 - 00 00 00 00 00 00 00 00  ................
    000000000197feac  00 00 00 00 00 00 00 00 - 60 8c 99 b9 5b 37 84 80  ........`...[7..
    000000000197febc  5c ff 1f c0 00 70 fd 7f - 01 00 00 00 88 7d 6f 81  \....p.......}o.
    000000000197fecc  01 16 00 00 46 02 00 00 - 46 02 00 00 d0 86 82 80  ....F...F.......
    000000000197fedc  00 00 00 00 00 00 00 00 - dc 8b 99 b9 fc f7 81 80  ................
    000000000197feec  00 00 00 00 18 f3 5d 81 - 24 8c 99 b9 87 f9 81 80  ......].$.......
    000000000197fefc  70 f2 5d 81 cc f3 5d 81 - 70 f2 5d 81 34 da a6 80  p.]...].p.].4...
    000000000197ff0c  00 00 00 00 c8 90 58 81 - 24 8c 99 b9 87 f9 81 80  ......X.$.......
    000000000197ff1c  20 90 58 81 7c 91 58 81 - 00 00 00 00 34 da a6 80   .X.|.X.....4...
    000000000197ff2c  a0 0f 83 80 84 ff 97 01 - 86 52 c7 77 4c ff 97 01  .........R.wL...
    000000000197ff3c  96 52 c7 77 fc f2 82 7c - b0 c3 18 00 d8 c3 18 00  .R.w...|........
    000000000197ff4c  00 a2 2f 4d ff ff ff ff - 00 17 5b ca ff ff ff ff  ../M......[.....

    *----> State Dump for Thread Id 0xd6c <----*

    eax=0018c7a0 ebx=00007530 ecx=002d5644 edx=00000000 esi=00000000 edi=01a7ff54
    eip=7c82ed66 esp=01a7ff14 ebp=01a7ff7c iopl=0         nv up ei pl nz na pe nc
    cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00000202

    function: ntdll!KiIntSystemCall
            ntdll!KiFastSystemCall:
            7c82ed50 8bd4             mov     edx,esp
            7c82ed52 0f34             sysenter
            ntdll!KiFastSystemCallRet:
            7c82ed54 c3               ret
            7c82ed55 8da42400000000   lea     esp,[esp]
            7c82ed5c 8d642400         lea     esp,[esp]
            ntdll!KiIntSystemCall:
            7c82ed60 8d542408         lea     edx,[esp+0x8]
            7c82ed64 cd2e             int     2e
            7c82ed66 c3               ret
            ntdll!RtlRaiseException:
            7c82ed67 55               push    ebp
            7c82ed68 8bec             mov     ebp,esp
            7c82ed6a 8da42430fdffff   lea     esp,[esp-0x2d0]
            7c82ed71 54               push    esp
            7c82ed72 e8ad010000       call    ntdll!RtlCaptureContext (7c82ef24)
            7c82ed77 8b5504           mov     edx,[ebp+0x4]
            7c82ed7a 8b4508           mov     eax,[ebp+0x8]
            7c82ed7d 838424c400000004 add     dword ptr [esp+0xc4],0x4
            7c82ed85 89500c           mov     [eax+0xc],edx

    *----> Stack Back Trace <----*
    *** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\ole32.dll -
    ChildEBP RetAddr  Args to Child             
    WARNING: Stack unwind information not available. Following frames may be wrong.
    01a7ff7c 77e424c1 0000ea60 00000000 01a7ffb8 ntdll!KiIntSystemCall+0x6
    01a7ff8c 776b22a0 0000ea60 0018eb10 776b2307 kernel32!Sleep+0xf
    01a7ffb8 77e6608b 0018eb10 00000000 00000000 ole32!IsValidInterface+0x474
    01a7ffec 00000000 776b2354 0018eb10 00000000 kernel32!GetModuleFileNameA+0xeb

    *----> Raw Stack Dump <----*
    0000000001a7ff14  64 13 82 7c a7 1e e4 77 - 00 00 00 00 54 ff a7 01  d..|...w....T...
    0000000001a7ff24  50 ba e6 77 40 1f 79 77 - 30 75 00 00 24 00 00 00 
    P..w@.yw0u..$...
    0000000001a7ff34  01 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
    0000000001a7ff44  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
    0000000001a7ff54  00 ba 3c dc ff ff ff ff - 40 fe a7 01 54 ff a7 01  ..<
    .....@...T...
    0000000001a7ff64  24 ff a7 01 40 fe a7 01 - dc ff a7 01 d0 b7 e6 77 
    $...@..........w
    0000000001a7ff74  30 bb e6 77 00 00 00 00 - 8c ff a7 01 c1 24 e4 77  0..w.........$.w
    0000000001a7ff84  60 ea 00 00 00 00 00 00 - b8 ff a7 01 a0 22 6b 77  `............"kw
    0000000001a7ff94  60 ea 00 00 10 eb 18 00 - 07 23 6b 77 00 00 00 00  `........#kw....
    0000000001a7ffa4  00 00 00 00 10 eb 18 00 - 00 00 67 77 74 23 6b 77  ..........gwt#kw
    0000000001a7ffb4  00 00 00 00 ec ff a7 01 - 8b 60 e6 77 10 eb 18 00  .........`.w....
    0000000001a7ffc4  00 00 00 00 00 00 00 00 - 10 eb 18 00 63 71 71 07  ............cqq.
    0000000001a7ffd4  c4 ff a7 01 18 1f 01 00 - ff ff ff ff d0 b7 e6 77  ...............w
    0000000001a7ffe4  98 60 e6 77 00 00 00 00 - 00 00 00 00 00 00 00 00  .`.w............
    0000000001a7fff4  54 23 6b 77 10 eb 18 00 - 00 00 00 00 4d 5a 90 00  T#kw........MZ..
    0000000001a80004  03 00 00 00 04 00 00 00 - ff ff 00 00 b8 00 00 00  ................
    0000000001a80014  00 00 00 00 40 00 00 00 - 00 00 00 00 00 00 00 00  ....@...........
    0000000001a80024  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
    0000000001a80034  00 00 00 00 00 00 00 00 - f8 00 00 00 0e 1f ba 0e  ................
    0000000001a80044  00 b4 09 cd 21 b8 01 4c - cd 21 54 68 69 73 20 70  ....!..L.!This p

    *----> State Dump for Thread Id 0xd68 <----*

    eax=00000f20 ebx=00000000 ecx=047e5b68 edx=047e5b68 esi=068023f0 edi=047e2370
    eip=076c0374 esp=01bcbbdc ebp=01bcbc78 iopl=0         nv up ei pl zr na po nc
    cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00010246

    function: <nosymbols>
    *** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\LegitCheckControl.DLL -
            076c034c fc               cld
            076c034d 890424           mov     [esp],eax
            076c0350 8d6424fc         lea     esp,[esp-0x4]
            076c0354 890424           mov     [esp],eax
            076c0357 8d05cecd8c06 lea eax,[LegitCheckControl!DllUnregisterServer+0xc3302 (068ccdce)]
            076c035d 8d800d020000     lea     eax,[eax+0x20d]
            076c0363 89442404         mov     [esp+0x4],eax
            076c0367 8d050edb8f06 lea eax,[LegitCheckControl!DllUnregisterServer+0xf4042 (068fdb0e)]
            076c036d 8d8097050000     lea     eax,[eax+0x597]
            076c0373 50               push    eax
    FAULT ->076c0374 55               push    ebp
            076c0375 8bec             mov     ebp,esp
            076c0377 83ec08           sub     esp,0x8
            076c037a 894df8           mov     [ebp-0x8],ecx
            076c037d c745fc00000000   mov     dword ptr [ebp-0x4],0x0
            076c0384 6a04             push    0x4
            076c0386 8d45fc           lea     eax,[ebp-0x4]
            076c0389 50               push    eax
            076c038a 8b4df8           mov     ecx,[ebp-0x8]
            076c038d e8230f22ff call LegitCheckControl!DllUnregisterServer+0xd77e9 (068e12b5)
            076c0392 8b45fc           mov     eax,[ebp-0x4]

    *----> Stack Back Trace <----*
    *** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\OLEAUT32.dll -
    *** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\mshtml.dll -
    *** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\jscript.dll -
    ChildEBP RetAddr  Args to Child             
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    01bcbbd8 076b0db7 00000060 01bcbc74 047e9260 0x76c0374
    01bcbc78 076a07a0 00000018 047e24b0 00000000 0x76b0db7
    01bcbd84 0769015d 047e3e60 00000000 01bcbe4c 0x76a07a0
    01bcbe54 07680541 01bcbe84 00000000 00000014 0x769015d
    01bcbe98 06e40683 00000000 067f35cc 00000000 0x7680541
    01bcbee4 06e30bbe 02983ee4 00000052 02435b5c 0x6e40683
    01bcbf04 0681ecdf 02983ee4 02435b5c 01bcbf9c 0x6e30bbe
    01bcbf68 0680a45a 047e2184 02435b5c 01bcbf8c LegitCheckControl!DllUnregisterServer+0x15213
    01bcc8e0 77d06de9 047e2178 02435b5c 01bcc944 LegitCheckControl!DllUnregisterServer+0x98e
    01bcc900 77d06c80 047e2178 00000064 00000004 OLEAUT32!DispCallFunc+0xc3
    01bcc990 0680bbb1 0447ee3c 047e2178 00000000 OLEAUT32!VarBstrFromI4+0x581
    01bcc9bc 63613ebd 047e2178 00000011 636515a0 LegitCheckControl!DllUnregisterServer+0x20e5
    01bcc9fc 638608ba 047e2178 00000011 00000409 mshtml!DllGetClassObject+0x790d2
    01bcca3c 6386031b 04556a98 00000011 00000409 mshtml!ConvertAndEscapePostData+0x89903
    01bcca70 633a33cb 04556a98 00000011 00000409 mshtml!ConvertAndEscapePostData+0x89364
    01bccaa8 633a333b 008bddb0 0299d5d0 00000011 jscript!DllCanUnloadNow+0x330e
    01bccae0 633a437a 008bddb0 0299d5d0 00000011 jscript!DllCanUnloadNow+0x327e
    01bccb50 6339cb86 008bddb0 0299d5d0 00000011 jscript!DllCanUnloadNow+0x42bd
    01bccb98 6339c824 008bddb0 01bccbb8 00000003 jscript!DllGetClassObject+0xf087
    01bccbd8 633a202b 008bddb0 00000003 01bccc40 jscript!DllGetClassObject+0xed25
    01bccbfc 6339ca34 008bddb0 00000000 00000003 jscript!DllCanUnloadNow+0x1f6e
    01bcccb4 633a2fcb 01bccdc8 00000000 008bc028 jscript!DllGetClassObject+0xef35
    01bccccc 633a4570 01bccdc8 00000000 0240dc80 jscript!DllCanUnloadNow+0x2f0e
    01bccd58 633a1098 008bddb0 00000086 00000001 jscript!DllCanUnloadNow+0x44b3
    01bccd84 6339ca34 008bddb0 00000000 00000001 jscript!DllCanUnloadNow+0xfdb
    01bcce3c 633a2fcb 01bcce80 00000000 01bcf21c jscript!DllGetClassObject+0xef35
    01bcce54 633a31c9 01bcce80 00000000 0240dcf0 jscript!DllCanUnloadNow+0x2f0e
    01bccec4 633a3f69 0246d5e0 01bcf21c 00000000 jscript!DllCanUnloadNow+0x310c
    01bccfb4 633a2eed 00000000 00000001 01bcd100 jscript!DllCanUnloadNow+0x3eac
    01bcd034 633a33cb 0246d5e0 00000000 00000409 jscript!DllCanUnloadNow+0x2e30
    01bcd06c 633a333b 008bddb0 0246d5e0 00000000 jscript!DllCanUnloadNow+0x330e
    01bcd0a4 6338ebce 008bddb0 0246d5e0 00000000 jscript!DllCanUnloadNow+0x327e
    01bcd134 635bed49 02447918 01bcd100 00000409 jscript!DllGetClassObject+0x10cf
    01bcd170 635bec2d 02912890 00002718 00000409 mshtml!DllGetClassObject+0x23f5e
    01bcf1e8 6366587f 00202c6c 00002718 00000409 mshtml!DllGetClassObject+0x23e42
    01bcf250 6366513e 00202c6c 00002718 00000409 mshtml!DllGetClassObject+0xcaa94
    01bcf278 633a33cb 001d1df8 00002718 00000409 mshtml!DllGetClassObject+0xca353
    01bcf2b0 633a333b 008bddb0 060afa80 00002718 jscript!DllCanUnloadNow+0x330e
    01bcf2e8 633a437a 008bddb0 060afa80 00002718 jscript!DllCanUnloadNow+0x327e
    01bcf358 633a4845 008bddb0 060afa80 00002718 jscript!DllCanUnloadNow+0x42bd
    01bcf388 6339ca34 008bddb0 00000000 00000001 jscript!DllCanUnloadNow+0x4788
    01bcf440 633a2fcb 01bcf484 00000000 01bcf724 jscript!DllGetClassObject+0xef35
    01bcf458 633a31c9 01bcf484 00000000 0240dda0 jscript!DllCanUnloadNow+0x2f0e
    01bcf4c8 633a3f69 0240ac20 01bcf724 00000000 jscript!DllCanUnloadNow+0x310c
    01bcf5b8 633a2eed 00000000 00000001 01bcf66c jscript!DllCanUnloadNow+0x3eac
    01bcf638 635bf023 0240ac20 00000000 00000809 jscript!DllCanUnloadNow+0x2e30
    01bcf68c 635bef3c 0240ac20 00000000 636515a0 mshtml!DllGetClassObject+0x24238
    01bcf7a4 63612da1 000003ef 8001177b 0299d180 mshtml!DllGetClassObject+0x24151
    01bcf8dc 6361404a 001a0ea8 029caff8 02912590 mshtml!DllGetClassObject+0x77fb6
    01bcfa20 638678d8 000003ef 00000001 00000000 mshtml!DllGetClassObject+0x7925f
    01bcfa94 63833b58 02969d60 00000001 00000000 mshtml!ConvertAndEscapePostData+0x90921
    01bcfabc 636685f5 01bcfc40 00000000 02969d60 mshtml!ConvertAndEscapePostData+0x5cba1
    01bcfae8 63835beb 01bcfc40 044bb7e8 00000000 mshtml!DllGetClassObject+0xcd80a
    01bcfb0c 63686c07 01bcfc40 044bb7e8 00000000 mshtml!ConvertAndEscapePostData+0x5ec34
    01bcfb98 6367da66 00000000 02969d60 044bb7e8 mshtml!DllGetClassObject+0xebe1c
    01bcfce4 636687bf 00000202 00000000 018500e0 mshtml!DllGetClassObject+0xe2c7b
    01bcfe08 6362b698 00000000 00000202 00000000 mshtml!DllGetClassObject+0xcd9d4
    01bcfe34 7739c3b7 00160250 00000202 00000000 mshtml!DllGetClassObject+0x908ad
    01bcfe60 7739c484 6362b64c 00160250 00000202 USER32!EnableMenuItem+0x4cd4
    01bcfed8 7739c73c 00000000 6362b64c 00160250 USER32!EnableMenuItem+0x4da1
    01bcff40 7739c778 01bcff68 00000000 01bcffb8 USER32!GetWindowLongW+0x183
    01bcff50 00993c6e 01bcff68 00000000 00000000 USER32!DispatchMessageW+0xf
    01bcffb8 77e6608b 00199088 00000000 00000000 IEFRAME!Ordinal300+0x3058
    01bcffec 00000000 00993a37 00190090 00000000 kernel32!GetModuleFileNameA+0xeb

    *----> Raw Stack Dump <----*
    0000000001bcbbdc  b7 0d 6b 07 60 00 00 00 - 74 bc bc 01 60 92 7e 04  ..k.`...t...`.~.
    0000000001bcbbec  be 49 b8 06 68 5b 7e 04 - 00 74 00 00 00 00 6b da  .I..h[~..t....k.
    0000000001bcbbfc  1f 0f 00 00 60 3e 7e 04 - 60 3e 7e 04 1f 0f 00 00  ....`>~.`>~.....
    0000000001bcbc0c  60 3e 7e 04 1f 0f 00 00 - c0 94 7e 04 61 20 8e 06  `>~.......~.a ..
    0000000001bcbc1c  44 1d 23 ff 00 00 00 00 - 60 3e 7e 04 1f 0f 00 00  D.#.....`>~.....
    0000000001bcbc2c  60 3e 7e 04 1f 0f 00 00 - d0 74 7e 04 68 5b 7e 04  `>~......t~.h[~.
    0000000001bcbc3c  00 00 00 00 00 00 00 00 - 01 00 00 00 d0 74 7e 04  .............t~.
    0000000001bcbc4c  d0 74 7e 04 00 00 00 00 - ff 01 00 00 68 5b 7e 04  .t~.........h[~.
    0000000001bcbc5c  d0 74 7e 04 00 74 00 00 - 04 00 00 00 00 1d 00 00  .t~..t..........
    0000000001bcbc6c  00 00 00 00 20 0f 00 00 - be 49 b8 06 84 bd bc 01  .... ....I......
    0000000001bcbc7c  a0 07 6a 07 18 00 00 00 - b0 24 7e 04 00 00 00 00  ..j......$~.....
    0000000001bcbc8c  a2 07 00 00 48 13 80 06 - 4c be bc 01 60 3e 7e 04  ....H...L...`>~.
    0000000001bcbc9c  20 0f 00 00 8c 05 86 06 - 17 00 00 00 16 00 00 00   ...............
    0000000001bcbcac  15 00 00 00 14 00 00 00 - 73 00 00 00 98 bc bc 01  ........s.......
    0000000001bcbcbc  0d 00 00 00 18 00 00 00 - b0 24 7e 04 14 00 00 00  .........$~.....
    0000000001bcbccc  b0 24 7e 04 01 00 00 00 - b0 24 7e 04 13 00 00 00  .$~......$~.....
    0000000001bcbcdc  b0 24 7e 04 13 00 00 00 - d8 23 7e 04 13 00 00 00  .$~......#~.....
    0000000001bcbcec  d8 23 7e 04 13 00 00 00 - d8 23 7e 04 13 00 00 00  .#~......#~.....
    0000000001bcbcfc  d8 23 7e 04 13 00 00 00 - b0 24 7e 04 13 00 00 00  .#~......$~.....
    0000000001bcbd0c  b0 24 7e 04 13 00 00 00 - 14 00 00 00 d8 23 7e 04  .$~..........#~.

    *----> State Dump for Thread Id 0x47c <----*

    eax=77c5de6d ebx=00000100 ecx=00000000 edx=00000000 esi=0016a9d8 edi=00000000
    eip=7c82ed66 esp=01dcfe1c ebp=01dcff84 iopl=0         nv up ei pl zr na po nc
    cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00000246

    function: ntdll!KiIntSystemCall
            ntdll!KiFastSystemCall:
            7c82ed50 8bd4             mov     edx,esp
            7c82ed52 0f34             sysenter
            ntdll!KiFastSystemCallRet:
            7c82ed54 c3               ret
            7c82ed55 8da42400000000   lea     esp,[esp]
            7c82ed5c 8d642400         lea     esp,[esp]
            ntdll!KiIntSystemCall:
            7c82ed60 8d542408         lea     edx,[esp+0x8]
            7c82ed64 cd2e             int     2e
            7c82ed66 c3               ret
            ntdll!RtlRaiseException:
            7c82ed67 55               push    ebp
            7c82ed68 8bec             mov     ebp,esp
            7c82ed6a 8da42430fdffff   lea     esp,[esp-0x2d0]
            7c82ed71 54               push    esp
            7c82ed72 e8ad010000       call    ntdll!RtlCaptureContext (7c82ef24)
            7c82ed77 8b5504           mov     edx,[ebp+0x4]
            7c82ed7a 8b4508           mov     eax,[ebp+0x8]
            7c82ed7d 838424c400000004 add     dword ptr [esp+0xc4],0x4
            7c82ed85 89500c           mov     [eax+0xc],edx

    *----> Stack Back Trace <----*
    ChildEBP RetAddr  Args to Child             
    WARNING: Stack unwind information not available. Following frames may be wrong.
    01dcff84 77c5778f 01dcffac 77c5f7dd 0016a9d8 ntdll!KiIntSystemCall+0x6
    01dcff8c 77c5f7dd 0016a9d8 00000000 00000000 RPCRT4!NdrOleFree+0x3c5
    01dcffac 77c5de88 00147438 01dcffec 77e6608b RPCRT4!I_RpcTransGetThreadEvent+0x188
    01dcffb8 77e6608b 00192a08 00000000 00000000 RPCRT4!I_RpcLogEvent+0xe92
    01dcffec 00000000 77c5de6d 00192a08 00000000 kernel32!GetModuleFileNameA+0xeb

    *----> Raw Stack Dump <----*
    0000000001dcfe1c  54 1c 82 7c 8c 53 c7 77 - 18 02 00 00 74 ff dc 01  T..|.S.w....t...
    0000000001dcfe2c  00 00 00 00 d8 31 20 00 - 54 ff dc 01 00 00 00 00  .....1 .T.......
    0000000001dcfe3c  40 00 00 00 88 69 64 81 - 70 03 5c 81 88 03 5c 81  @....id.p.\...\.
    0000000001dcfe4c  cc 4b be b8 6f 43 90 80 - 70 03 5c 81 74 03 5c 81  .K..oC..p.\.t.\.
    0000000001dcfe5c  a8 44 90 80 ff 03 1f 00 - 70 0e b0 81 00 00 00 00  .D......p.......
    0000000001dcfe6c  05 00 00 00 4e 00 ee 00 - 05 00 00 00 00 20 50 c0  ....N........ P.
    0000000001dcfe7c  00 00 00 00 0e 03 00 00 - 88 03 5c 81 98 4b be b8  ..........\..K..
    0000000001dcfe8c  c0 51 90 80 78 a7 04 e1 - 11 00 00 00 88 69 64 81  .Q..x........id.
    0000000001dcfe9c  03 00 1f 00 88 03 5c 81 - 03 00 00 00 00 00 00 00  ......\.........
    0000000001dcfeac  70 03 5c 81 88 03 5c 81 - c4 4b be b8 c0 51 90 80  p.\...\..K...Q..
    0000000001dcfebc  78 a7 04 e1 11 00 00 00 - ff 03 1f 00 70 0e b0 81  x...........p...
    0000000001dcfecc  78 a7 04 e1 6c 02 00 00 - 46 02 00 00 d0 86 82 80  x...l...F.......
    0000000001dcfedc  00 00 00 00 00 00 00 00 - dc 4b be b8 fc f7 81 80  .........K......
    0000000001dcfeec  00 00 00 00 c8 c0 94 81 - 24 4c be b8 87 f9 81 80  ........$L......
    0000000001dcfefc  20 c0 94 81 7c c1 94 81 - 20 c0 94 81 34 da a6 80   ...|... ...4...
    0000000001dcff0c  64 4d be b8 d0 3b 19 00 - c3 74 90 80 a0 69 64 81  dM...;...t...id.
    0000000001dcff1c  00 00 00 00 e0 60 b2 81 - 00 00 00 00 a0 69 64 81  .....`.......id.
    0000000001dcff2c  f0 4c be b8 84 ff dc 01 - 86 52 c7 77 4c ff dc 01  .L.......R.wL...
    0000000001dcff3c  96 52 c7 77 fc f2 82 7c - e0 29 19 00 08 2a 19 00  .R.w...|.)...*..
    0000000001dcff4c  00 a2 2f 4d ff ff ff ff - 00 17 5b ca ff ff ff ff  ../M......[.....

    *----> State Dump for Thread Id 0xfa0 <----*

    eax=001af570 ebx=00000000 ecx=00000008 edx=00000000 esi=000003d4 edi=00000000
    eip=7c82ed66 esp=025dff08 ebp=025dff78 iopl=0         nv up ei ng nz ac pe cy
    cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00000293

    function: ntdll!KiIntSystemCall
            ntdll!KiFastSystemCall:
            7c82ed50 8bd4             mov     edx,esp
            7c82ed52 0f34             sysenter
            ntdll!KiFastSystemCallRet:
            7c82ed54 c3               ret
            7c82ed55 8da42400000000   lea     esp,[esp]
            7c82ed5c 8d642400         lea     esp,[esp]
            ntdll!KiIntSystemCall:
            7c82ed60 8d542408         lea     edx,[esp+0x8]
            7c82ed64 cd2e             int     2e
            7c82ed66 c3               ret
            ntdll!RtlRaiseException:
            7c82ed67 55               push    ebp
            7c82ed68 8bec             mov     ebp,esp
            7c82ed6a 8da42430fdffff   lea     esp,[esp-0x2d0]
            7c82ed71 54               push    esp
            7c82ed72 e8ad010000       call    ntdll!RtlCaptureContext (7c82ef24)
            7c82ed77 8b5504           mov     edx,[ebp+0x4]
            7c82ed7a 8b4508           mov     eax,[ebp+0x8]
            7c82ed7d 838424c400000004 add     dword ptr [esp+0xc4],0x4
            7c82ed85 89500c           mov     [eax+0xc],edx

    *----> Stack Back Trace <----*
    ChildEBP RetAddr  Args to Child             
    WARNING: Stack unwind information not available. Following frames may be wrong.
    025dff78 77e6ba42 000003d4 000927c0 00000000 ntdll!KiIntSystemCall+0x6
    025dff8c 6361452f 000003d4 000927c0 63580000 kernel32!WaitForSingleObject+0x12
    025dffb8 77e6608b 00206d80 00000000 00000000 mshtml!DllGetClassObject+0x79744
    025dffec 00000000 6359a6fa 00206d80 00000000 kernel32!GetModuleFileNameA+0xeb

    *----> Raw Stack Dump <----*
    00000000025dff08  24 21 82 7c d8 ba e6 77 - d4 03 00 00 00 00 00 00  $!.|...w........
    00000000025dff18  4c ff 5d 02 00 00 00 00 - 80 6d 20 00 00 00 00 00  L.]......m .....
    00000000025dff28  24 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00  $...............
    00000000025dff38  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
    00000000025dff48  00 00 00 00 00 44 5f 9a - fe ff ff ff 00 f0 fd 7f  .....D_.........
    00000000025dff58  4c ff 5d 02 00 00 00 00 - 1c ff 5d 02 00 00 00 00  L.].......].....
    00000000025dff68  dc ff 5d 02 d0 b7 e6 77 - 00 bb e6 77 00 00 00 00  ..]....w...w....
    00000000025dff78  8c ff 5d 02 42 ba e6 77 - d4 03 00 00 c0 27 09 00  ..].B..w.....'..
    00000000025dff88  00 00 00 00 b8 ff 5d 02 - 2f 45 61 63 d4 03 00 00  ......]./Eac....
    00000000025dff98  c0 27 09 00 00 00 58 63 - 80 6d 20 00 80 6d 20 00  .'....Xc.m ..m .
    00000000025dffa8  76 33 62 63 00 00 00 00 - 00 00 00 00 07 a7 59 63  v3bc..........Yc
    00000000025dffb8  ec ff 5d 02 8b 60 e6 77 - 80 6d 20 00 00 00 00 00  ..]..`.w.m .....
    00000000025dffc8  00 00 00 00 80 6d 20 00 - bc 7a 46 ff c4 ff 5d 02  .....m ..zF...].
    00000000025dffd8  bd 7e 4d ff ff ff ff ff - d0 b7 e6 77 98 60 e6 77  .~M........w.`.w
    00000000025dffe8  00 00 00 00 00 00 00 00 - 00 00 00 00 fa a6 59 63  ..............Yc
    00000000025dfff8  80 6d 20 00 00 00 00 00 - 00 00 00 00 00 00 00 00  .m .............
    00000000025e0008  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
    00000000025e0018  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
    00000000025e0028  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
    00000000025e0038  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................

    *----> State Dump for Thread Id 0xd8 <----*

    eax=00000000 ebx=00000000 ecx=00000000 edx=00000000 esi=000003ec edi=00000000
    eip=7c82ed66 esp=0227ff08 ebp=0227ff78 iopl=0         nv up ei ng nz ac pe cy
    cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00000293

    function: ntdll!KiIntSystemCall
            ntdll!KiFastSystemCall:
            7c82ed50 8bd4             mov     edx,esp
            7c82ed52 0f34             sysenter
            ntdll!KiFastSystemCallRet:
            7c82ed54 c3               ret
            7c82ed55 8da42400000000   lea     esp,[esp]
            7c82ed5c 8d642400         lea     esp,[esp]
            ntdll!KiIntSystemCall:
            7c82ed60 8d542408         lea     edx,[esp+0x8]
            7c82ed64 cd2e             int     2e
            7c82ed66 c3               ret
            ntdll!RtlRaiseException:
            7c82ed67 55               push    ebp
            7c82ed68 8bec             mov     ebp,esp
            7c82ed6a 8da42430fdffff   lea     esp,[esp-0x2d0]
            7c82ed71 54               push    esp
            7c82ed72 e8ad010000       call    ntdll!RtlCaptureContext (7c82ef24)
            7c82ed77 8b5504           mov     edx,[ebp+0x4]
            7c82ed7a 8b4508           mov     eax,[ebp+0x8]
            7c82ed7d 838424c400000004 add     dword ptr [esp+0xc4],0x4
            7c82ed85 89500c           mov     [eax+0xc],edx

    *----> Stack Back Trace <----*
    ChildEBP RetAddr  Args to Child             
    WARNING: Stack unwind information not available. Following frames may be wrong.
    0227ff78 77e6ba42 000003ec 000927c0 00000000 ntdll!KiIntSystemCall+0x6
    0227ff8c 6361452f 000003ec 000927c0 63580000 kernel32!WaitForSingleObject+0x12
    0227ffb8 77e6608b 001c55d0 00000000 00000000 mshtml!DllGetClassObject+0x79744
    0227ffec 00000000 6359a6fa 001c55d0 00000000 kernel32!GetModuleFileNameA+0xeb

    *----> Raw Stack Dump <----*
    000000000227ff08  24 21 82 7c d8 ba e6 77 - ec 03 00 00 00 00 00 00  $!.|...w........
    000000000227ff18  4c ff 27 02 00 00 00 00 - d0 55 1c 00 00 00 00 00  L.'......U......
    000000000227ff28  24 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00  $...............
    000000000227ff38  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
    000000000227ff48  00 00 00 00 00 44 5f 9a - fe ff ff ff 00 f0 fd 7f  .....D_.........
    000000000227ff58  4c ff 27 02 b0 62 88 63 - 1c ff 27 02 90 68 96 02  L.'..b.c..'..h..
    000000000227ff68  dc ff 27 02 d0 b7 e6 77 - 00 bb e6 77 00 00 00 00  ..'....w...w....
    000000000227ff78  8c ff 27 02 42 ba e6 77 - ec 03 00 00 c0 27 09 00  ..'.B..w.....'..
    000000000227ff88  00 00 00 00 b8 ff 27 02 - 2f 45 61 63 ec 03 00 00  ......'./Eac....
    000000000227ff98  c0 27 09 00 00 00 58 63 - d0 55 1c 00 d0 55 1c 00  .'....Xc.U...U..
    000000000227ffa8  76 33 62 63 00 00 00 00 - 00 00 00 00 07 a7 59 63  v3bc..........Yc
    000000000227ffb8  ec ff 27 02 8b 60 e6 77 - d0 55 1c 00 00 00 00 00  ..'..`.w.U......
    000000000227ffc8  00 00 00 00 d0 55 1c 00 - 63 c1 fc 08 c4 ff 27 02  .....U..c.....'.
    000000000227ffd8  0d 8b 00 00 ff ff ff ff - d0 b7 e6 77 98 60 e6 77  ...........w.`.w
    000000000227ffe8  00 00 00 00 00 00 00 00 - 00 00 00 00 fa a6 59 63  ..............Yc
    000000000227fff8  d0 55 1c 00 00 00 00 00 - 93 01 93 01 93 01 93 01  .U..............
    0000000002280008  93 01 93 01 93 01 93 01 - 93 01 93 01 93 01 93 01  ................
    0000000002280018  92 01 92 01 93 01 93 01 - 93 01 93 01 93 01 93 01  ................
    0000000002280028  93 01 93 01 93 01 93 01 - 93 01 93 01 93 01 93 01  ................
    0000000002280038  93 01 93 01 93 01 93 01 - 93 01 93 01 93 01 93 01  ................

    *----> State Dump for Thread Id 0xe0 <----*

    eax=000000c0 ebx=00000000 ecx=00000000 edx=00000000 esi=00000000 edi=00000000
    eip=7c82ed66 esp=027dffa0 ebp=027dffb8 iopl=0         nv up ei pl zr na po nc
    cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

    function: ntdll!KiIntSystemCall
            ntdll!KiFastSystemCall:
            7c82ed50 8bd4             mov     edx,esp
            7c82ed52 0f34             sysenter
            ntdll!KiFastSystemCallRet:
            7c82ed54 c3               ret
            7c82ed55 8da42400000000   lea     esp,[esp]
            7c82ed5c 8d642400         lea     esp,[esp]
            ntdll!KiIntSystemCall:
            7c82ed60 8d542408         lea     edx,[esp+0x8]
            7c82ed64 cd2e             int     2e
            7c82ed66 c3               ret
            ntdll!RtlRaiseException:
            7c82ed67 55               push    ebp
            7c82ed68 8bec             mov     ebp,esp
            7c82ed6a 8da42430fdffff   lea     esp,[esp-0x2d0]
            7c82ed71 54               push    esp
            7c82ed72 e8ad010000       call    ntdll!RtlCaptureContext (7c82ef24)
            7c82ed77 8b5504           mov     edx,[ebp+0x4]
            7c82ed7a 8b4508           mov     eax,[ebp+0x8]
            7c82ed7d 838424c400000004 add     dword ptr [esp+0xc4],0x4
            7c82ed85 89500c           mov     [eax+0xc],edx

    *----> Stack Back Trace <----*
    ChildEBP RetAddr  Args to Child             
    WARNING: Stack unwind information not available. Following frames may be wrong.
    027dffb8 77e6608b 00000000 00000000 00000000 ntdll!KiIntSystemCall+0x6
    027dffec 00000000 7c81fddf 00000000 00000000 kernel32!GetModuleFileNameA+0xeb

    *----> Raw Stack Dump <----*
    00000000027dffa0  64 13 82 7c 26 fe 81 7c - 01 00 00 00 b0 ff 7d 02  d..|&..|......}.
    00000000027dffb0  00 00 00 00 00 00 00 80 - ec ff 7d 02 8b 60 e6 77  ..........}..`.w
    00000000027dffc0  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
    00000000027dffd0  63 d1 49 09 c4 ff 7d 02 - 9e 1c 00 00 ff ff ff ff  c.I...}.........
    00000000027dffe0  d0 b7 e6 77 98 60 e6 77 - 00 00 00 00 00 00 00 00  ...w.`.w........
    00000000027dfff0  00 00 00 00 df fd 81 7c - 00 00 00 00 00 00 00 00  .......|........
    00000000027e0000  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
    00000000027e0010  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
    00000000027e0020  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
    00000000027e0030  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
    00000000027e0040  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
    00000000027e0050  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
    00000000027e0060  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
    00000000027e0070  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
    00000000027e0080  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
    00000000027e0090  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
    00000000027e00a0  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
    00000000027e00b0  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
    00000000027e00c0  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
    00000000027e00d0  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................

    *----> State Dump for Thread Id 0xd4 <----*

    eax=01d60006 ebx=0290a7f0 ecx=0000016a edx=00000000 esi=7fffffff edi=ffffffff
    eip=7c82ed66 esp=02f9fadc ebp=02f9fb18 iopl=0         nv up ei ng nz ac pe cy
    cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00000293

    function: ntdll!KiIntSystemCall
            ntdll!KiFastSystemCall:
            7c82ed50 8bd4             mov     edx,esp
            7c82ed52 0f34             sysenter
            ntdll!KiFastSystemCallRet:
            7c82ed54 c3               ret
            7c82ed55 8da42400000000   lea     esp,[esp]
            7c82ed5c 8d642400         lea     esp,[esp]
            ntdll!KiIntSystemCall:
            7c82ed60 8d542408         lea     edx,[esp+0x8]
            7c82ed64 cd2e             int     2e
            7c82ed66 c3               ret
            ntdll!RtlRaiseException:
            7c82ed67 55               push    ebp
            7c82ed68 8bec             mov     ebp,esp
            7c82ed6a 8da42430fdffff   lea     esp,[esp-0x2d0]
            7c82ed71 54               push    esp
            7c82ed72 e8ad010000       call    ntdll!RtlCaptureContext (7c82ef24)
            7c82ed77 8b5504           mov     edx,[ebp+0x4]
            7c82ed7a 8b4508           mov     eax,[ebp+0x8]
            7c82ed7d 838424c400000004 add     dword ptr [esp+0xc4],0x4
            7c82ed85 89500c           mov     [eax+0xc],edx

    *----> Stack Back Trace <----*
    *** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\mswsock.dll -
    *** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\ws2_32.dll -
    *** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\WININET.dll -
    ChildEBP RetAddr  Args to Child             
    WARNING: Stack unwind information not available. Following frames may be wrong.
    02f9fb18 71b23a52 0000054c 00000568 00000000 ntdll!KiIntSystemCall+0x6
    02f9fc08 71c0470c 00000001 02f9fe88 02f9fc80 mswsock+0x3a52
    02f9fc58 63029346 00000001 02f9fe88 02f9fc80 ws2_32!select+0xa1
    02f9ffb0 6301accc 02f9ffec 77e6608b 0021cac0 WININET!DetectAutoProxyUrl+0x5b9
    02f9ffb8 77e6608b 0021cac0 00000000 00000000 WININET!InternetOpenA+0x5ef
    02f9ffec 00000000 6301acbf 0021cac0 00000000 kernel32!GetModuleFileNameA+0xeb

    *----> Raw Stack Dump <----*
    0000000002f9fadc  24 21 82 7c 09 3a b2 71 - 4c 05 00 00 01 00 00 00  $!.|.:.qL.......
    0000000002f9faec  04 fb f9 02 00 00 00 00 - b8 fb f9 02 a8 fb f9 02  ................
    0000000002f9fafc  50 20 16 b2 9a 2b c7 01 - ff ff ff ff ff ff ff 7f  P ...+..........
    0000000002f9fb0c  f0 a7 90 02 00 00 00 00 - 00 00 00 00 08 fc f9 02  ................
    0000000002f9fb1c  52 3a b2 71 4c 05 00 00 - 68 05 00 00 00 00 00 00  R:.qL...h.......
    0000000002f9fb2c  04 00 00 00 84 fd f9 02 - 10 c2 23 00 80 fc f9 02  ..........#.....
    0000000002f9fb3c  d4 9a 92 02 00 00 00 00 - fe 19 01 00 90 fa f9 02  ................
    0000000002f9fb4c  00 00 00 00 a8 fb f9 02 - 00 00 00 00 01 00 00 00  ................
    0000000002f9fb5c  1c 00 00 00 3c fc f9 02 - 00 00 00 00 00 00 14 00  ....<...........
    0000000002f9fb6c  00 00 00 00 f0 a7 90 02 - b8 fb f9 02 00 00 00 00  ................
    0000000002f9fb7c  01 00 00 00 80 fc f9 02 - c4 fb f9 02 84 fd f9 02  ................
    0000000002f9fb8c  88 fe f9 02 00 00 00 00 - a8 fb f9 02 e0 fa f9 02  ................
    0000000002f9fb9c  00 00 00 00 f8 fb f9 02 - 01 00 00 00 80 0f 05 fd  ................
    0000000002f9fbac  ff ff ff ff 01 00 00 00 - 00 f6 82 7c 68 05 00 00  ...........|h...
    0000000002f9fbbc  99 00 00 00 dd f9 82 7c - 0c fc f9 02 80 f6 82 7c  .......|.......|
    0000000002f9fbcc  e0 f9 82 7c ff ff ff ff - dd f9 82 7c 64 bc e6 77  ...|.......|d..w
    0000000002f9fbdc  00 00 14 00 00 00 00 00 - 77 bc e6 77 dc c0 09 63  ........w..w...c
    0000000002f9fbec  8e 86 00 00 30 fb f9 02 - fc 17 bf 71 48 fc f9 02  ....0......qH...
    0000000002f9fbfc  cc 5f b4 71 90 38 b2 71 - ff ff ff ff 58 fc f9 02  ._.q.8.q....X...
    0000000002f9fc0c  0c 47 c0 71 01 00 00 00 - 88 fe f9 02 80 fc f9 02  .G.q............

    *----> State Dump for Thread Id 0x244 <----*

    eax=71b23e4b ebx=c0000000 ecx=00000000 edx=00000000 esi=00000000 edi=71b593b8
    eip=7c82ed66 esp=030fff80 ebp=030fffb8 iopl=0         nv up ei pl zr na po nc
    cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00000246

    function: ntdll!KiIntSystemCall
            ntdll!KiFastSystemCall:
            7c82ed50 8bd4             mov     edx,esp
            7c82ed52 0f34             sysenter
            ntdll!KiFastSystemCallRet:
            7c82ed54 c3               ret
            7c82ed55 8da42400000000   lea     esp,[esp]
            7c82ed5c 8d642400         lea     esp,[esp]
            ntdll!KiIntSystemCall:
            7c82ed60 8d542408         lea     edx,[esp+0x8]
            7c82ed64 cd2e             int     2e
            7c82ed66 c3               ret
            ntdll!RtlRaiseException:
            7c82ed67 55               push    ebp
            7c82ed68 8bec             mov     ebp,esp
            7c82ed6a 8da42430fdffff   lea     esp,[esp-0x2d0]
            7c82ed71 54               push    esp
            7c82ed72 e8ad010000       call    ntdll!RtlCaptureContext (7c82ef24)
            7c82ed77 8b5504           mov     edx,[ebp+0x4]
            7c82ed7a 8b4508           mov     eax,[ebp+0x8]
            7c82ed7d 838424c400000004 add     dword ptr [esp+0xc4],0x4
            7c82ed85 89500c           mov     [eax+0xc],edx

    *----> Stack Back Trace <----*
    ChildEBP RetAddr  Args to Child             
    WARNING: Stack unwind information not available. Following frames may be wrong.
    030fffb8 77e6608b 71b268c0 00000000 00000000 ntdll!KiIntSystemCall+0x6
    030fffec 00000000 71b23e4b 02900be0 00000000 kernel32!GetModuleFileNameA+0xeb

    *----> Raw Stack Dump <----*
    00000000030fff80  f4 1b 82 7c b4 3e b2 71 - a8 05 00 00 c0 ff 0f 03  ...|.>.q........
    00000000030fff90  b4 ff 0f 03 a8 ff 0f 03 - 00 3f b2 71 00 00 00 00  .........?.q....
    00000000030fffa0  00 00 00 00 e0 0b 90 02 - 00 00 00 00 00 00 00 00  ................
    00000000030fffb0  00 00 b2 71 50 03 48 04 - ec ff 0f 03 8b 60 e6 77  ...qP.H......`.w
    00000000030fffc0  c0 68 b2 71 00 00 00 00 - 00 00 00 00 e0 0b 90 02  .h.q............
    00000000030fffd0  c8 d0 d4 00 c4 ff 0f 03 - c8 d0 d4 00 ff ff ff ff  ................
    00000000030fffe0  d0 b7 e6 77 98 60 e6 77 - 00 00 00 00 00 00 00 00  ...w.`.w........
    00000000030ffff0  00 00 00 00 4b 3e b2 71 - e0 0b 90 02 00 00 00 00  ....K>.q........
    0000000003100000  08 00 00 00 00 20 00 00 - 00 00 00 00 ff ff ff ff  ..... ..........
    0000000003100010  40 1f 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00  @...............
    0000000003100020  00 00 00 00 00 00 00 00 - 58 00 00 00 58 00 00 00  ........X...X...
    0000000003100030  a0 e1 db 57 25 de d2 11 - af dd 00 10 5a 27 99 b5  ...W%.......Z'..
    0000000003100040  03 00 00 00 01 00 00 00 - 00 00 00 00 68 0d 00 00  ............h...
    0000000003100050  80 05 00 00 ec 00 00 00 - 21 75 2c 00 00 00 00 00  ........!u,.....
    0000000003100060  00 00 00 00 48 00 00 00 - 00 00 00 00 00 00 00 00  ....H...........
    0000000003100070  08 00 00 00 01 00 04 00 - 07 00 00 00 00 00 00 00  ................
    0000000003100080  00 00 00 00 00 00 00 00 - 08 00 00 00 ff ff ff ff  ................
    0000000003100090  40 1f 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00  @...............
    00000000031000a0  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
    00000000031000b0  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................

    *----> State Dump for Thread Id 0xef0 <----*

    eax=35c51c1d ebx=0021d4c4 ecx=00000000 edx=00000000 esi=00000000 edi=00000000
    eip=7c82ed66 esp=042dff14 ebp=042dff40 iopl=0         nv up ei pl zr na po nc
    cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00000246

    function: ntdll!KiIntSystemCall
            ntdll!KiFastSystemCall:
            7c82ed50 8bd4             mov     edx,esp
            7c82ed52 0f34             sysenter
            ntdll!KiFastSystemCallRet:
            7c82ed54 c3               ret
            7c82ed55 8da42400000000   lea     esp,[esp]
            7c82ed5c 8d642400         lea     esp,[esp]
            ntdll!KiIntSystemCall:
            7c82ed60 8d542408         lea     edx,[esp+0x8]
            7c82ed64 cd2e             int     2e
            7c82ed66 c3               ret
            ntdll!RtlRaiseException:
            7c82ed67 55               push    ebp
            7c82ed68 8bec             mov     ebp,esp
            7c82ed6a 8da42430fdffff   lea     esp,[esp-0x2d0]
            7c82ed71 54               push    esp
            7c82ed72 e8ad010000       call    ntdll!RtlCaptureContext (7c82ef24)
            7c82ed77 8b5504           mov     edx,[ebp+0x4]
            7c82ed7a 8b4508           mov     eax,[ebp+0x8]
            7c82ed7d 838424c400000004 add     dword ptr [esp+0xc4],0x4
            7c82ed85 89500c           mov     [eax+0xc],edx

    *----> Stack Back Trace <----*
    *** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\Dxtrans.dll -
    ChildEBP RetAddr  Args to Child             
    WARNING: Stack unwind information not available. Following frames may be wrong.
    042dff40 35c51c5f 00000668 042dff90 042dff94 ntdll!KiIntSystemCall+0x6
    042dffb8 77e6608b 0021d4c4 00000000 00000000 Dxtrans+0x1c5f
    042dffec 00000000 35c51c1d 0021d4c4 00000000 kernel32!GetModuleFileNameA+0xeb

    *----> Raw Stack Dump <----*
    00000000042dff14  f4 1b 82 7c 42 61 e6 77 - 68 06 00 00 94 ff 2d 04  ...|Ba.wh.....-.
    00000000042dff24  58 ff 2d 04 38 ff 2d 04 - 00 00 00 00 00 00 00 00  X.-.8.-.........
    00000000042dff34  00 00 00 00 c4 d4 21 00 - 20 83 21 00 b8 ff 2d 04  ......!. .!...-.
    00000000042dff44  5f 1c c5 35 68 06 00 00 - 90 ff 2d 04 94 ff 2d 04  _..5h.....-...-.
    00000000042dff54  98 ff 2d 04 ff ff ff ff - 40 89 2d 04 00 00 00 00  ..-.....@.-.....
    00000000042dff64  00 00 00 00 c4 d4 21 00 - 83 d9 a6 80 00 00 00 00  ......!.........
    00000000042dff74  c8 d0 d4 00 c8 d0 d4 00 - 00 d0 d4 00 00 00 00 00  ................
    00000000042dff84  d0 30 a3 81 99 d4 83 80 - 00 00 00 00 00 00 00 00  .0..............
    00000000042dff94  00 00 00 00 f3 65 84 80 - 00 00 00 00 c4 d4 21 00  .....e........!.
    00000000042dffa4  00 00 00 00 5c ff 2d 04 - dc ff 2d 04 45 81 c7 35  ....\.-...-.E..5
    00000000042dffb4  00 00 00 00 ec ff 2d 04 - 8b 60 e6 77 c4 d4 21 00  ......-..`.w..!.
    00000000042dffc4  00 00 00 00 00 00 00 00 - c4 d4 21 00 c8 d0 d4 00  ..........!.....
    00000000042dffd4  c4 ff 2d 04 c8 d0 d4 00 - ff ff ff ff d0 b7 e6 77  ..-............w
    00000000042dffe4  98 60 e6 77 00 00 00 00 - 00 00 00 00 00 00 00 00  .`.w............
    00000000042dfff4  1d 1c c5 35 c4 d4 21 00 - 00 00 00 00 00 00 00 00  ...5..!.........
    00000000042e0004  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
    00000000042e0014  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
    00000000042e0024  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
    00000000042e0034  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
    00000000042e0044  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................

    *----> State Dump for Thread Id 0xf8c <----*

    eax=35c51c1d ebx=0021d4c4 ecx=00000000 edx=00000000 esi=00000000 edi=00000000
    eip=7c82ed66 esp=043dff14 ebp=043dff40 iopl=0         nv up ei pl zr na po nc
    cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00000246

    function: ntdll!KiIntSystemCall
            ntdll!KiFastSystemCall:
            7c82ed50 8bd4             mov     edx,esp
            7c82ed52 0f34             sysenter
            ntdll!KiFastSystemCallRet:
            7c82ed54 c3               ret
            7c82ed55 8da42400000000   lea     esp,[esp]
            7c82ed5c 8d642400         lea     esp,[esp]
            ntdll!KiIntSystemCall:
            7c82ed60 8d542408         lea     edx,[esp+0x8]
            7c82ed64 cd2e             int     2e
            7c82ed66 c3               ret
            ntdll!RtlRaiseException:
            7c82ed67 55               push    ebp
            7c82ed68 8bec             mov     ebp,esp
            7c82ed6a 8da42430fdffff   lea     esp,[esp-0x2d0]
            7c82ed71 54               push    esp
            7c82ed72 e8ad010000       call    ntdll!RtlCaptureContext (7c82ef24)
            7c82ed77 8b5504           mov     edx,[ebp+0x4]
            7c82ed7a 8b4508           mov     eax,[ebp+0x8]
            7c82ed7d 838424c400000004 add     dword ptr [esp+0xc4],0x4
            7c82ed85 89500c           mov     [eax+0xc],edx

    *----> Stack Back Trace <----*
    ChildEBP RetAddr  Args to Child             
    WARNING: Stack unwind information not available. Following frames may be wrong.
    043dff40 35c51c5f 00000668 043dff90 043dff94 ntdll!KiIntSystemCall+0x6
    043dffb8 77e6608b 0021d4c4 00000000 00000000 Dxtrans+0x1c5f
    043dffec 00000000 35c51c1d 0021d4c4 00000000 kernel32!GetModuleFileNameA+0xeb

    *----> Raw Stack Dump <----*
    00000000043dff14  f4 1b 82 7c 42 61 e6 77 - 68 06 00 00 94 ff 3d 04  ...|Ba.wh.....=.
    00000000043dff24  58 ff 3d 04 38 ff 3d 04 - 00 00 00 00 00 00 00 00  X.=.8.=.........
    00000000043dff34  00 00 00 00 c4 d4 21 00 - 38 8b 21 00 b8 ff 3d 04  ......!.8.!...=.
    00000000043dff44  5f 1c c5 35 68 06 00 00 - 90 ff 3d 04 94 ff 3d 04  _..5h.....=...=.
    00000000043dff54  98 ff 3d 04 ff ff ff ff - 40 89 3d 04 00 00 00 00  ..=.....@.=.....
    00000000043dff64  00 00 00 00 c4 d4 21 00 - 83 d9 a6 80 00 00 00 00  ......!.........
    00000000043dff74  c8 d0 d4 00 c8 d0 d4 00 - 00 d0 d4 00 00 00 00 00  ................
    00000000043dff84  d0 30 a3 81 99 d4 83 80 - 00 00 00 00 00 00 00 00  .0..............
    00000000043dff94  00 00 00 00 f3 65 84 80 - 00 00 00 00 c4 d4 21 00  .....e........!.
    00000000043dffa4  00 00 00 00 5c ff 3d 04 - dc ff 3d 04 45 81 c7 35  ....\.=...=.E..5
    00000000043dffb4  00 00 00 00 ec ff 3d 04 - 8b 60 e6 77 c4 d4 21 00  ......=..`.w..!.
    00000000043dffc4  00 00 00 00 00 00 00 00 - c4 d4 21 00 c8 d0 d4 00  ..........!.....
    00000000043dffd4  c4 ff 3d 04 c8 d0 d4 00 - ff ff ff ff d0 b7 e6 77  ..=............w
    00000000043dffe4  98 60 e6 77 00 00 00 00 - 00 00 00 00 00 00 00 00  .`.w............
    00000000043dfff4  1d 1c c5 35 c4 d4 21 00 - 00 00 00 00 00 00 00 00  ...5..!.........
    00000000043e0004  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
    00000000043e0014  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
    00000000043e0024  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
    00000000043e0034  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
    00000000043e0044  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................

    *----> State Dump for Thread Id 0xef8 <----*

    eax=72d73108 ebx=05d5ff14 ecx=00000000 edx=00000000 esi=05d5ff18 edi=7ffdf000
    eip=7c82ed66 esp=05d5fec8 ebp=05d5ff70 iopl=0         nv up ei pl zr na po nc
    cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00000246

    function: ntdll!KiIntSystemCall
            ntdll!KiFastSystemCall:
            7c82ed50 8bd4             mov     edx,esp
            7c82ed52 0f34             sysenter
            ntdll!KiFastSystemCallRet:
            7c82ed54 c3               ret
            7c82ed55 8da42400000000   lea     esp,[esp]
            7c82ed5c 8d642400         lea     esp,[esp]
            ntdll!KiIntSystemCall:
            7c82ed60 8d542408         lea     edx,[esp+0x8]
            7c82ed64 cd2e             int     2e
            7c82ed66 c3               ret
            ntdll!RtlRaiseException:
            7c82ed67 55               push    ebp
            7c82ed68 8bec             mov     ebp,esp
            7c82ed6a 8da42430fdffff   lea     esp,[esp-0x2d0]
            7c82ed71 54               push    esp
            7c82ed72 e8ad010000       call    ntdll!RtlCaptureContext (7c82ef24)
            7c82ed77 8b5504           mov     edx,[ebp+0x4]
            7c82ed7a 8b4508           mov     eax,[ebp+0x8]
            7c82ed7d 838424c400000004 add     dword ptr [esp+0xc4],0x4
            7c82ed85 89500c           mov     [eax+0xc],edx

    *----> Stack Back Trace <----*
    *** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\wdmaud.drv -
    ChildEBP RetAddr  Args to Child             
    WARNING: Stack unwind information not available. Following frames may be wrong.
    05d5ff70 77e6109d 00000002 05d5ffa8 00000000 ntdll!KiIntSystemCall+0x6
    05d5ff8c 72d7314a 00000002 05d5ffa8 00000000 kernel32!WaitForMultipleObjects+0x18
    05d5ffb8 77e6608b 00000000 00000000 00000000 wdmaud!midMessage+0x348
    05d5ffec 00000000 72d73108 00000000 00000000 kernel32!GetModuleFileNameA+0xeb

    *----> Raw Stack Dump <----*
    0000000005d5fec8  14 21 82 7c 43 71 e6 77 - 02 00 00 00 14 ff d5 05  .!.|Cq.w........
    0000000005d5fed8  01 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
    0000000005d5fee8  00 00 00 00 00 00 00 00 - 24 00 00 00 01 00 00 00  ........$.......
    0000000005d5fef8  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
    0000000005d5ff08  00 00 00 00 00 00 00 00 - 00 00 00 00 5c 06 00 00  ............\...
    0000000005d5ff18  38 07 00 00 c8 d0 d4 00 - c8 d0 d4 00 00 00 00 00  8...............
    0000000005d5ff28  c8 d0 d4 00 c8 d0 d4 00 - 08 17 91 80 00 90 fa 7f  ................
    0000000005d5ff38  30 49 ab 81 00 f0 fd 7f - 0b 66 84 80 00 00 00 00  0I.......f......
    0000000005d5ff48  14 ff d5 05 00 00 00 00 - 00 00 00 00 02 00 00 00  ................
    0000000005d5ff58  e4 fe d5 05 00 00 00 00 - dc ff d5 05 d0 b7 e6 77  ...............w
    0000000005d5ff68  30 72 e6 77 00 00 00 00 - 8c ff d5 05 9d 10 e6 77  0r.w...........w
    0000000005d5ff78  02 00 00 00 a8 ff d5 05 - 00 00 00 00 ff ff ff ff  ................
    0000000005d5ff88  00 00 00 00 b8 ff d5 05 - 4a 31 d7 72 02 00 00 00  ........J1.r....
    0000000005d5ff98  a8 ff d5 05 00 00 00 00 - ff ff ff ff 00 00 00 00  ................
    0000000005d5ffa8  5c 06 00 00 38 07 00 00 - 00 00 00 00 c4 1b 82 7c  \...8..........|
    0000000005d5ffb8  ec ff d5 05 8b 60 e6 77 - 00 00 00 00 00 00 00 00  .....`.w........
    0000000005d5ffc8  00 00 00 00 00 00 00 00 - c8 d0 d4 00 c4 ff d5 05  ................
    0000000005d5ffd8  c8 d0 d4 00 ff ff ff ff - d0 b7 e6 77 98 60 e6 77  ...........w.`.w
    0000000005d5ffe8  00 00 00 00 00 00 00 00 - 00 00 00 00 08 31 d7 72  .............1.r
    0000000005d5fff8  00 00 00 00 00 00 00 00 - 17 ef c8 ca 01 00 00 00  ................

    *----> State Dump for Thread Id 0xf68 <----*

    eax=00000000 ebx=00000000 ecx=000000db edx=00000000 esi=7c889038 edi=7c889880
    eip=7c82ed66 esp=028dff74 ebp=028dffb8 iopl=0         nv up ei ng nz na po nc
    cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00000286

    function: ntdll!KiIntSystemCall
            ntdll!KiFastSystemCall:
            7c82ed50 8bd4             mov     edx,esp
            7c82ed52 0f34             sysenter
            ntdll!KiFastSystemCallRet:
            7c82ed54 c3               ret
            7c82ed55 8da42400000000   lea     esp,[esp]
            7c82ed5c 8d642400         lea     esp,[esp]
            ntdll!KiIntSystemCall:
            7c82ed60 8d542408         lea     edx,[esp+0x8]
            7c82ed64 cd2e             int     2e
            7c82ed66 c3               ret
            ntdll!RtlRaiseException:
            7c82ed67 55               push    ebp
            7c82ed68 8bec             mov     ebp,esp
            7c82ed6a 8da42430fdffff   lea     esp,[esp-0x2d0]
            7c82ed71 54               push    esp
            7c82ed72 e8ad010000       call    ntdll!RtlCaptureContext (7c82ef24)
            7c82ed77 8b5504           mov     edx,[ebp+0x4]
            7c82ed7a 8b4508           mov     eax,[ebp+0x8]
            7c82ed7d 838424c400000004 add     dword ptr [esp+0xc4],0x4
            7c82ed85 89500c           mov     [eax+0xc],edx

    *----> Stack Back Trace <----*
    ChildEBP RetAddr  Args to Child             
    WARNING: Stack unwind information not available. Following frames may be wrong.
    028dffb8 77e6608b 00000000 00000000 00000000 ntdll!KiIntSystemCall+0x6
    028dffec 00000000 7c83ad38 00000000 00000000 kernel32!GetModuleFileNameA+0xeb

    *----> Raw Stack Dump <----*
    00000000028dff74  f4 1b 82 7c 75 ad 83 7c - 0c 04 00 00 b0 ff 8d 02  ...|u..|........
    00000000028dff84  b4 ff 8d 02 9c ff 8d 02 - a4 ff 8d 02 00 00 00 00  ................
    00000000028dff94  00 00 00 00 00 00 00 00 - 00 00 00 00 30 b7 51 04  ............0.Q.
    00000000028dffa4  00 7c 28 e8 ff ff ff ff - 26 2a a7 80 bb 00 82 7c  .|(.....&*.....|
    00000000028dffb4  38 e8 1d 00 ec ff 8d 02 - 8b 60 e6 77 00 00 00 00  8........`.w....
    00000000028dffc4  00 00 00 00 00 00 00 00 - 00 00 00 00 cc 2c 15 b8  .............,..
    00000000028dffd4  c4 ff 8d 02 40 d8 6b fd - ff ff ff ff d0 b7 e6 77 
    ....@.k........w
    00000000028dffe4  98 60 e6 77 00 00 00 00 - 00 00 00 00 00 00 00 00  .`.w............
    00000000028dfff4  38 ad 83 7c 00 00 00 00 - 00 00 00 00 08 00 00 00  8..|............
    00000000028e0004  00 01 00 01 ee ff ee ff - 00 00 00 00 00 00 14 00  ................
    00000000028e0014  00 00 00 00 00 00 8e 02 - 00 01 00 00 40 00 8e 02  ............@...
    00000000028e0024  00 00 9e 02 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
    00000000028e0034  00 00 00 00 40 00 8e 02 - 00 00 00 00 00 08 08 00  ....@...........
    00000000028e0044  2f 01 08 01 e0 dc 22 00 - 00 00 14 00 0e 00 00 00  /.....".........
    00000000028e0054  c0 d0 e0 f0 4a 93 5d ae - 00 01 24 ff 00 00 00 00  ....J.]...$.....
    00000000028e0064  bb 05 0a e9 00 00 00 00 - 29 00 00 00 0d 00 00 00  ........).......
    00000000028e0074  00 00 00 00 00 00 00 40 - 06 00 00 00 00 00 00 40  .......@.......@
    00000000028e0084  06 00 00 00 00 00 00 40 - fe ff ff ff 00 00 00 40  .......@.......@
    00000000028e0094  fe ff ff ff 00 00 d0 00 - 00 00 40 00 1e ff 20 1f  ..........@... .
    00000000028e00a4  00 00 00 00 71 80 0e 00 - b0 00 b0 00 b0 00 b0 00  ....q...........

    *----> State Dump for Thread Id 0x190 <----*

    eax=00002733 ebx=00000000 ecx=71b2671b edx=00000000 esi=7c889038 edi=7c889880
    eip=7c82ed66 esp=02b0ff74 ebp=02b0ffb8 iopl=0         nv up ei ng nz na po nc
    cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00000286

    function: ntdll!KiIntSystemCall
            ntdll!KiFastSystemCall:
            7c82ed50 8bd4             mov     edx,esp
            7c82ed52 0f34             sysenter
            ntdll!KiFastSystemCallRet:
            7c82ed54 c3               ret
            7c82ed55 8da42400000000   lea     esp,[esp]
            7c82ed5c 8d642400         lea     esp,[esp]
            ntdll!KiIntSystemCall:
            7c82ed60 8d542408         lea     edx,[esp+0x8]
            7c82ed64 cd2e             int     2e
            7c82ed66 c3               ret
            ntdll!RtlRaiseException:
            7c82ed67 55               push    ebp
            7c82ed68 8bec             mov     ebp,esp
            7c82ed6a 8da42430fdffff   lea     esp,[esp-0x2d0]
            7c82ed71 54               push    esp
            7c82ed72 e8ad010000       call    ntdll!RtlCaptureContext (7c82ef24)
            7c82ed77 8b5504           mov     edx,[ebp+0x4]
            7c82ed7a 8b4508           mov     eax,[ebp+0x8]
            7c82ed7d 838424c400000004 add     dword ptr [esp+0xc4],0x4
            7c82ed85 89500c           mov     [eax+0xc],edx

    *----> Stack Back Trace <----*
    ChildEBP RetAddr  Args to Child             
    WARNING: Stack unwind information not available. Following frames may be wrong.
    02b0ffb8 77e6608b 00000000 00000000 00000000 ntdll!KiIntSystemCall+0x6
    02b0ffec 00000000 7c83ad38 00000000 00000000 kernel32!GetModuleFileNameA+0xeb

    *----> Raw Stack Dump <----*
    0000000002b0ff74  f4 1b 82 7c 75 ad 83 7c - 0c 04 00 00 b0 ff b0 02  ...|u..|........
    0000000002b0ff84  b4 ff b0 02 9c ff b0 02 - a4 ff b0 02 00 00 00 00  ................
    0000000002b0ff94  00 00 00 00 00 00 00 00 - 00 00 00 00 38 c1 51 04  ............8.Q.
    0000000002b0ffa4  00 7c 28 e8 ff ff ff ff - 26 2a a7 80 bb 00 82 7c  .|(.....&*.....|
    0000000002b0ffb4  d8 e5 1d 00 ec ff b0 02 - 8b 60 e6 77 00 00 00 00  .........`.w....
    0000000002b0ffc4  00 00 00 00 00 00 00 00 - 00 00 00 00 63 f1 81 08  ............c...
    0000000002b0ffd4  c4 ff b0 02 e0 31 01 00 - ff ff ff ff d0 b7 e6 77  .....1.........w
    0000000002b0ffe4  98 60 e6 77 00 00 00 00 - 00 00 00 00 00 00 00 00  .`.w............
    0000000002b0fff4  38 ad 83 7c 00 00 00 00 - 00 00 00 00 c8 00 00 00  8..|............
    0000000002b10004  19 01 00 00 ff ee ff ee - 02 10 00 00 00 00 00 00  ................
    0000000002b10014  00 fe 00 00 00 00 10 00 - 00 20 00 00 00 02 00 00  ......... ......
    0000000002b10024  00 20 00 00 1e 14 00 00 - ff ef fd 7f 0d 00 08 06  . ..............
    0000000002b10034  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
    0000000002b10044  98 05 b1 02 0f 00 00 00 - f8 ff ff ff 50 00 b1 02  ............P...
    0000000002b10054  50 00 b1 02 40 06 b1 02 - 00 00 00 00 00 00 00 00  P...@...........
    0000000002b10064  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
    0000000002b10074  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
    0000000002b10084  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
    0000000002b10094  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
    0000000002b100a4  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................

    *----> State Dump for Thread Id 0x500 <----*

    eax=00000000 ebx=028fe74c ecx=06caff48 edx=00000000 esi=000008c8 edi=00000000
    eip=7c82ed66 esp=06cafefc ebp=06caff6c iopl=0         nv up ei pl zr na po nc
    cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00000246

    function: ntdll!KiIntSystemCall
            ntdll!KiFastSystemCall:
            7c82ed50 8bd4             mov     edx,esp
            7c82ed52 0f34             sysenter
            ntdll!KiFastSystemCallRet:
            7c82ed54 c3               ret
            7c82ed55 8da42400000000   lea     esp,[esp]
            7c82ed5c 8d642400         lea     esp,[esp]
            ntdll!KiIntSystemCall:
            7c82ed60 8d542408         lea     edx,[esp+0x8]
            7c82ed64 cd2e             int     2e
            7c82ed66 c3               ret
            ntdll!RtlRaiseException:
            7c82ed67 55               push    ebp
            7c82ed68 8bec             mov     ebp,esp
            7c82ed6a 8da42430fdffff   lea     esp,[esp-0x2d0]
            7c82ed71 54               push    esp
            7c82ed72 e8ad010000       call    ntdll!RtlCaptureContext (7c82ef24)
            7c82ed77 8b5504           mov     edx,[ebp+0x4]
            7c82ed7a 8b4508           mov     eax,[ebp+0x8]
            7c82ed7d 838424c400000004 add     dword ptr [esp+0xc4],0x4
            7c82ed85 89500c           mov     [eax+0xc],edx

    *----> Stack Back Trace <----*
    ChildEBP RetAddr  Args to Child             
    WARNING: Stack unwind information not available. Following frames may be wrong.
    06caff6c 77e6ba42 000008c8 ffffffff 00000000 ntdll!KiIntSystemCall+0x6
    06caff80 636810bf 000008c8 ffffffff 63580000 kernel32!WaitForSingleObject+0x12
    06caffa4 63623376 00000000 00000000 6359a707 mshtml!DllGetClassObject+0xe62d4
    06caffb8 77e6608b 028fe708 00000000 00000000 mshtml!DllGetClassObject+0x8858b
    06caffec 00000000 6359a6fa 028fe708 00000000 kernel32!GetModuleFileNameA+0xeb

    *----> Raw Stack Dump <----*
    0000000006cafefc  24 21 82 7c d8 ba e6 77 - c8 08 00 00 00 00 00 00  $!.|...w........
    0000000006caff0c  00 00 00 00 00 00 00 00 - 08 e7 8f 02 4c e7 8f 02  ............L...
    0000000006caff1c  24 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00  $...............
    0000000006caff2c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
    0000000006caff3c  00 00 00 00 30 22 f9 ff - ff ff ff ff 00 f0 fd 7f  ....0"..........
    0000000006caff4c  00 00 00 00 02 01 00 00 - 10 ff ca 06 e8 a2 63 63  ..............cc
    0000000006caff5c  dc ff ca 06 d0 b7 e6 77 - 00 bb e6 77 00 00 00 00  .......w...w....
    0000000006caff6c  80 ff ca 06 42 ba e6 77 - c8 08 00 00 ff ff ff ff  ....B..w........
    0000000006caff7c  00 00 00 00 a4 ff ca 06 - bf 10 68 63 c8 08 00 00  ..........hc....
    0000000006caff8c  ff ff ff ff 00 00 58 63 - 08 e7 8f 02 08 e7 8f 02  ......Xc........
    0000000006caff9c  f7 35 30 00 ff ff ff ff - b8 ff ca 06 76 33 62 63  .50.........v3bc
    0000000006caffac  00 00 00 00 00 00 00 00 - 07 a7 59 63 ec ff ca 06  ..........Yc....
    0000000006caffbc  8b 60 e6 77 08 e7 8f 02 - 00 00 00 00 00 00 00 00  .`.w............
    0000000006caffcc  08 e7 8f 02 63 41 89 11 - c4 ff ca 06 d5 7a 00 00  ....cA.......z..
    0000000006caffdc  ff ff ff ff d0 b7 e6 77 - 98 60 e6 77 00 00 00 00  .......w.`.w....
    0000000006caffec  00 00 00 00 00 00 00 00 - fa a6 59 63 08 e7 8f 02  ..........Yc....
    0000000006cafffc  00 00 00 00 41 63 74 78 - 20 00 00 00 01 00 00 00  ....Actx .......
    0000000006cb000c  10 1a 00 00 7c 00 00 00 - 00 00 00 00 20 00 00 00  ....|....... ...
    0000000006cb001c  00 00 00 00 14 00 00 00 - 01 00 00 00 03 00 00 00  ................
    0000000006cb002c  34 00 00 00 fc 00 00 00 - 01 00 00 00 00 00 00 00  4...............

    *----> State Dump for Thread Id 0xecc <----*

    eax=000000c0 ebx=00000000 ecx=00000000 edx=00000000 esi=00000000 edi=00000001
    eip=7c82ed66 esp=0747fcf0 ebp=0747ffb8 iopl=0         nv up ei pl zr na po nc
    cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

    function: ntdll!KiIntSystemCall
            ntdll!KiFastSystemCall:
            7c82ed50 8bd4             mov     edx,esp
            7c82ed52 0f34             sysenter
            ntdll!KiFastSystemCallRet:
            7c82ed54 c3               ret
            7c82ed55 8da42400000000   lea     esp,[esp]
            7c82ed5c 8d642400         lea     esp,[esp]
            ntdll!KiIntSystemCall:
            7c82ed60 8d542408         lea     edx,[esp+0x8]
            7c82ed64 cd2e             int     2e
            7c82ed66 c3               ret
            ntdll!RtlRaiseException:
            7c82ed67 55               push    ebp
            7c82ed68 8bec             mov     ebp,esp
            7c82ed6a 8da42430fdffff   lea     esp,[esp-0x2d0]
            7c82ed71 54               push    esp
            7c82ed72 e8ad010000       call    ntdll!RtlCaptureContext (7c82ef24)
            7c82ed77 8b5504           mov     edx,[ebp+0x4]
            7c82ed7a 8b4508           mov     eax,[ebp+0x8]
            7c82ed7d 838424c400000004 add     dword ptr [esp+0xc4],0x4
            7c82ed85 89500c           mov     [eax+0xc],edx

    *----> Stack Back Trace <----*
    ChildEBP RetAddr  Args to Child             
    WARNING: Stack unwind information not available. Following frames may be wrong.
    0747ffb8 77e6608b 00000000 00000000 00000000 ntdll!KiIntSystemCall+0x6
    0747ffec 00000000 7c83abb0 00000000 00000000 kernel32!GetModuleFileNameA+0xeb

    *----> Raw Stack Dump <----*
    000000000747fcf0  14 21 82 7c fd ac 83 7c - 14 00 00 00 34 fd 47 07  .!.|...|....4.G.
    000000000747fd00  01 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00  ................
    000000000747fd10  00 00 00 00 00 00 00 00 - a8 8f 88 7c a8 8f 88 7c  ...........|...|
    000000000747fd20  f8 07 00 00 cc 0e 00 00 - 14 00 00 00 14 00 00 00  ................
    000000000747fd30  13 00 00 00 b0 08 00 00 - 64 03 00 00 f4 07 00 00  ........d.......
    000000000747fd40  cc 07 00 00 b0 05 00 00 - 5c 08 00 00 b4 06 00 00  ........\.......
    000000000747fd50  68 09 00 00 74 09 00 00 - 80 09 00 00 90 09 00 00  h...t...........
    000000000747fd60  9c 09 00 00 ac 09 00 00 - bc 09 00 00 cc 09 00 00  ................
    000000000747fd70  d8 09 00 00 e8 09 00 00 - f8 09 00 00 08 0a 00 00  ................
    000000000747fd80  14 0a 00 00 44 0a 00 00 - 28 0a 00 00 54 0a 00 00  ....D...(...T...
    000000000747fd90  5c 0a 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  \...............
    000000000747fda0  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
    000000000747fdb0  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
    000000000747fdc0  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
    000000000747fdd0  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
    000000000747fde0  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
    000000000747fdf0  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
    000000000747fe00  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
    000000000747fe10  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
    000000000747fe20  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................

    *----> State Dump for Thread Id 0xed4 <----*

    eax=769283b9 ebx=0757ff10 ecx=00000000 edx=00000000 esi=0757ff18 edi=7ffdf000
    eip=7c82ed66 esp=0757fec4 ebp=0757ff6c iopl=0         nv up ei pl zr na po nc
    cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00000246

    function: ntdll!KiIntSystemCall
            ntdll!KiFastSystemCall:
            7c82ed50 8bd4             mov     edx,esp
            7c82ed52 0f34             sysenter
            ntdll!KiFastSystemCallRet:
            7c82ed54 c3               ret
            7c82ed55 8da42400000000   lea     esp,[esp]
            7c82ed5c 8d642400         lea     esp,[esp]
            ntdll!KiIntSystemCall:
            7c82ed60 8d542408         lea     edx,[esp+0x8]
            7c82ed64 cd2e             int     2e
            7c82ed66 c3               ret
            ntdll!RtlRaiseException:
            7c82ed67 55               push    ebp
            7c82ed68 8bec             mov     ebp,esp
            7c82ed6a 8da42430fdffff   lea     esp,[esp-0x2d0]
            7c82ed71 54               push    esp
            7c82ed72 e8ad010000       call    ntdll!RtlCaptureContext (7c82ef24)
            7c82ed77 8b5504           mov     edx,[ebp+0x4]
            7c82ed7a 8b4508           mov     eax,[ebp+0x8]
            7c82ed7d 838424c400000004 add     dword ptr [esp+0xc4],0x4
            7c82ed85 89500c           mov     [eax+0xc],edx

    *----> Stack Back Trace <----*
    *** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\USERENV.dll -
    ChildEBP RetAddr  Args to Child             
    WARNING: Stack unwind information not available. Following frames may be wrong.
    0757ff6c 77e6109d 00000003 769cf34c 00000000 ntdll!KiIntSystemCall+0x6
    0757ff88 76928415 00000003 769cf34c 00000000 kernel32!WaitForMultipleObjects+0x18
    0757ffb8 77e6608b 00000000 00000000 00000000 USERENV!GetProfilesDirectoryW+0x1de
    0757ffec 00000000 769283b9 00000000 00000000 kernel32!GetModuleFileNameA+0xeb

    *----> Raw Stack Dump <----*
    000000000757fec4  14 21 82 7c 43 71 e6 77 - 03 00 00 00 10 ff 57 07  .!.|Cq.w......W.
    000000000757fed4  01 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
    000000000757fee4  f8 f3 9c 76 ea c1 e6 77 - 24 00 00 00 01 00 00 00  ...v...w$.......
    000000000757fef4  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
    000000000757ff04  00 00 00 00 00 00 00 00 - 00 00 00 00 fc 07 00 00  ................
    000000000757ff14  4c 08 00 00 50 08 00 00 - dd f9 82 7c f9 1b e4 77  L...P......|...w
    000000000757ff24  00 00 14 00 00 00 00 00 - 09 1c e4 77 00 00 00 00  ...........w....
    000000000757ff34  00 00 00 00 00 f0 fd 7f - fe 01 00 02 00 00 00 00  ................
    000000000757ff44  10 ff 57 07 00 00 00 00 - 00 00 00 00 03 00 00 00  ..W.............
    000000000757ff54  e0 fe 57 07 00 00 00 00 - dc ff 57 07 d0 b7 e6 77  ..W.......W....w
    000000000757ff64  30 72 e6 77 00 00 00 00 - 88 ff 57 07 9d 10 e6 77  0r.w......W....w
    000000000757ff74  03 00 00 00 4c f3 9c 76 - 00 00 00 00 ff ff ff ff  ....L..v........
    000000000757ff84  00 00 00 00 b8 ff 57 07 - 15 84 92 76 03 00 00 00  ......W....v....
    000000000757ff94  4c f3 9c 76 00 00 00 00 - ff ff ff ff 00 00 00 00  L..v............
    000000000757ffa4  00 00 00 00 00 00 00 00 - 00 00 92 76 03 00 00 00  ...........v....
    000000000757ffb4  00 00 00 00 ec ff 57 07 - 8b 60 e6 77 00 00 00 00  ......W..`.w....
    000000000757ffc4  00 00 00 00 00 00 00 00 - 00 00 00 00 63 b1 8d 06  ............c...
    000000000757ffd4  c4 ff 57 07 dc 95 00 00 - ff ff ff ff d0 b7 e6 77  ..W............w
    000000000757ffe4  98 60 e6 77 00 00 00 00 - 00 00 00 00 00 00 00 00  .`.w............
    000000000757fff4  b9 83 92 76 00 00 00 00 - 00 00 00 00 00 00 00 00  ...v............

    *----> State Dump for Thread Id 0xee4 <----*

    eax=80070057 ebx=00000000 ecx=0767d1bc edx=00000000 esi=7c889038 edi=7c889880
    eip=7c82ed66 esp=0767ff74 ebp=0767ffb8 iopl=0         nv up ei ng nz na po nc
    cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00000286

    function: ntdll!KiIntSystemCall
            ntdll!KiFastSystemCall:
            7c82ed50 8bd4             mov     edx,esp
            7c82ed52 0f34             sysenter
            ntdll!KiFastSystemCallRet:
            7c82ed54 c3               ret
            7c82ed55 8da42400000000   lea     esp,[esp]
            7c82ed5c 8d642400         lea     esp,[esp]
            ntdll!KiIntSystemCall:
            7c82ed60 8d542408         lea     edx,[esp+0x8]
            7c82ed64 cd2e             int     2e
            7c82ed66 c3               ret
            ntdll!RtlRaiseException:
            7c82ed67 55               push    ebp
            7c82ed68 8bec             mov     ebp,esp
            7c82ed6a 8da42430fdffff   lea     esp,[esp-0x2d0]
            7c82ed71 54               push    esp
            7c82ed72 e8ad010000       call    ntdll!RtlCaptureContext (7c82ef24)
            7c82ed77 8b5504           mov     edx,[ebp+0x4]
            7c82ed7a 8b4508           mov     eax,[ebp+0x8]
            7c82ed7d 838424c400000004 add     dword ptr [esp+0xc4],0x4
            7c82ed85 89500c           mov     [eax+0xc],edx

    *----> Stack Back Trace <----*
    ChildEBP RetAddr  Args to Child             
    WARNING: Stack unwind information not available. Following frames may be wrong.
    0767ffb8 77e6608b 00000000 00000000 00000000 ntdll!KiIntSystemCall+0x6
    0767ffec 00000000 7c83ad38 00000000 00000000 kernel32!GetModuleFileNameA+0xeb

    *----> Raw Stack Dump <----*
    000000000767ff74  f4 1b 82 7c 75 ad 83 7c - 0c 04 00 00 b0 ff 67 07  ...|u..|......g.
    000000000767ff84  b4 ff 67 07 9c ff 67 07 - a4 ff 67 07 00 00 00 00  ..g...g...g.....
    000000000767ff94  00 00 00 00 00 00 00 00 - 00 00 00 00 50 64 3f 02  ............Pd?.
    000000000767ffa4  00 7c 28 e8 ff ff ff ff - 26 2a a7 80 bb 00 82 7c  .|(.....&*.....|
    000000000767ffb4  58 e7 1d 00 ec ff 67 07 - 8b 60 e6 77 00 00 00 00  X.....g..`.w....
    000000000767ffc4  00 00 00 00 00 00 00 00 - 00 00 00 00 63 81 7f 11  ............c...
    000000000767ffd4  c4 ff 67 07 39 86 00 00 - ff ff ff ff d0 b7 e6 77  ..g.9..........w
    000000000767ffe4  98 60 e6 77 00 00 00 00 - 00 00 00 00 00 00 00 00  .`.w............
    000000000767fff4  38 ad 83 7c 00 00 00 00 - 00 00 00 00 00 84 22 07  8..|..........".
    0000000007680004  00 4e 01 00 00 8d 64 24 - fc 89 3c 24 8d 64 24 fc  .N....d$..<$.d$.
    0000000007680014  89 3c 24 8d 3d 28 a4 82 - 06 8d bf 81 05 00 00 89  .<$.=(..........
    0000000007680024  7c 24 04 8d 3d ad 90 8f - 06 8d bf ec 0a 00 00 8d  |$..=...........
    0000000007680034  64 24 fc 89 3c 24 8b 7c - 24 04 c2 04 00 3b 00 00  d$..<$.|$....;..
    0000000007680044  00 c4 24 07 00 bc 24 07 - 00 41 00 00 00 8d 64 24  ..$...$..A....d$
    0000000007680054  fc 89 2c 24 55 8d 2d 3e - a0 82 06 8d ad a7 09 00  ..,$U.->........
    0000000007680064  00 89 6c 24 04 8d 2d 91 - 91 8f 06 8d ad 08 0a 00  ..l$..-.........
    0000000007680074  00 55 8b 6c 24 04 c2 04 - 00 3b 00 00 00 0f 25 07  .U.l$....;....%.
    0000000007680084  00 07 25 07 00 13 00 00 - 00 57 8d 64 24 fc 89 3c  ..%......W.d$..<
    0000000007680094  24 8d 3d fe a2 82 06 8d - bf 23 07 00 00 89 7c 24  $.=......#....|$
    00000000076800a4  04 8d 3d d5 96 8f 06 8d - bf c4 04 00 00 57 8b 7c  ..=..........W.|

    *----> Symbol Table <----*
    Error 0x80004002

    Saturday, January 6, 2007 1:52 AM