MS Internet Explorer 4.0

9/9/98

The 4.01 upgrade for IE appears to be more stable. I am using the Desktop Update (new mode Windows Explorer) with this version on NT and don't seem to be having any problems.

1/7/98

If you are thinking of upgrading to Microsoft Internet Explorer 4.0, be careful what you install. One option installs a "Desktop Update Component" and another adds an "Active Desktop" function. If you like to see messages like the following in your event log after Windows NT crashes, go ahead and install these options (the Web functions seem to work fairly well, however).


Application exception occurred: 
App: exe\explorer.dbg (pid=109) 
When: 11/28/1997 @ 18:55:12.315 
Exception number: c0000005 (access violation) 
  
*----> System Information <----* 
Computer Name: MHS_PENTIUM 
User Name: JSG 
Number of Processors: 1 
Processor Type: x86 Family 5 Model 2 Stepping 12 
Windows Version: 4.0 
Current Build: 1381 
Current Type: Uniprocessor Free 
Registered Organization: Mt. Hood Software 
Registered Owner: James S. Gibbons 
  
*----> Task List <----* 
0 Idle.exe 
2 System.exe 
18 smss.exe 
30 csrss.exe 
32 WINLOGON.exe 
40 SERVICES.exe 
43 LSASS.exe 
66 SPOOLSS.exe 
76 mgasc.exe 
61 mgactrl.exe 
79 navapsvc.exe 
44 NDDEAGNT.exe 
97 NPSSVC.exe 
102 RPCSS.exe 
109 EXPLORER.exe 
100 mgaqdesk.exe 
113 mgahook.exe 
119 navapw32.exe 
126 DISTASST.exe 
127 alertsvc.exe 
158 NTVDM.exe 
114 DRWTSN32.exe 
0 _Total.exe 
  
(01580000 - 015bc000) exe\explorer.dbg 
(77f60000 - 77fbc000) dll\ntdll.dbg 
(77ed0000 - 77efc000) dll\gdi32.dbg 
(77f00000 - 77f5e000) dll\kernel32.dbg 
(77e70000 - 77ec4000) dll\user32.dbg 
(77dc0000 - 77dfe000) dll\advapi32.dbg 
(77e10000 - 77e62000) dll\rpcrt4.dbg 
(77c40000 - 77d7c000) dll\shell32.dbg 
(77bf0000 - 77c3f000) dll\comctl32.dbg 
(77720000 - 77731000) dll\mpr.dbg 
(778b0000 - 778d3000) dll\URL.dbg 
(77a40000 - 77a4c000) dll\ntshrui.dbg 
(78000000 - 78000000) 
(77b20000 - 77bd2000) dll\ole32.dbg 
(77800000 - 7783a000) dll\netapi32.dbg 
(77840000 - 77849000) dll\NetRap.dbg 
(777e0000 - 777ed000) dll\samlib.dbg 
(5f810000 - 5f817000) dll\rpcltc1.dbg 
(779b0000 - 779b9000) dll\linkinfo.dbg 
(10000000 - 10000000) 
(777f0000 - 777fc000) dll\ntlanman.dbg 
(77890000 - 778a3000) dll\netui0.dbg 
(77850000 - 7788a000) dll\netui1.dbg 
(01790000 - 01790000) 
(778f0000 - 77919000) dll\syncui.dbg 
(76f00000 - 76f08000) dll\diskcopy.dbg 
(01dd0000 - 01dd0000) 
(65340000 - 653bc000) oleaut32.dbg 
(5f3e0000 - 5f3e0000) 
(02190000 - 02190000) 
(77a90000 - 77a9b000) dll\version.dbg 
(779c0000 - 779c8000) dll\lz32.dbg 
(778e0000 - 778e9000) dll\shcompui.dbg 
(76c20000 - 76c2a000) dll\hticons.dbg 
(77fd0000 - 77ffa000) dll\winmm.dbg 
(02900000 - 02900000) 
(02970000 - 02970000) 
  
State Dump for Thread Id 0x6c 
  
eax=02e70004 ebx=00000000 ecx=00006a01 edx=00000000 esi=0002003e edi=0012ff0c 
eip=77e7276a esp=0012fc94 ebp=0012fca0 iopl=0 nv up ei pl zr na po nc 
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246 
  
  
function: WaitMessage 
77e7275f b802120000 mov eax,0x1202 
77e72764 8d542404 lea edx,[esp+0x4] ss:0104e69b=???????? 
77e72768 cd2e int 2e 
77e7276a c3 ret 
77e7276b 56 push esi 
77e7276c 33c0 xor eax,eax 
77e7276e 8b742408 mov esi,[esp+0x8] ss:0104e69b=???????? 
77e72772 8b4e10 mov ecx,[esi+0x10] ds:00f3ea44=???????? 
77e72775 03ce add ecx,esi 
77e72777 394608 cmp [esi+0x8],eax ds:00f3ea44=???????? 
77e7277a 760e jbe WaitMessage+0x2b (77e7278a) 
77e7277c 8b11 mov edx,[ecx] ds:00006a01=???????? 
77e7277e 40 inc eax 
77e7277f 83c104 add ecx,0x4 
77e72782 013432 add [edx+esi],esi ds:0002003e=00180002 
  
*----> Stack Back Trace <----* 
  
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 
0012fca0 01588132 00000000 00000010 000205e4 7ffdf000 user32!WaitMessage 
0012ff60 01587dea 01580000 00000000 000205e4 0000000a explorer!<nosymbols> 
0012ffc0 77f1b304 00000010 78009484 7ffdf000 7ffdf000 explorer!<nosymbols> 
0012fff0 00000000 01587d5e 00000000 00000000 77fa5aa0 kernel32!GetProcessPriorityBoost 
00000000 00000000 00000000 00000000 00000000 00000000 explorer!<nosymbols> 
  
*----> Raw Stack Dump <----* 
0012fc94 9f 26 58 01 00 00 00 00 - 48 4c 14 00 60 ff 12 00 .&X.....HL..`... 
0012fca4 32 81 58 01 00 00 00 00 - 10 00 00 00 e4 05 02 00 2.X............. 
0012fcb4 00 f0 fd 7f 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0012fcc4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0012fcd4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0012fce4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0012fcf4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0012fd04 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0012fd14 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0012fd24 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0012fd34 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0012fd44 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0012fd54 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0012fd64 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0012fd74 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0012fd84 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0012fd94 00 00 00 00 00 00 00 00 - 00 00 00 00 b5 01 01 00 ................ 
0012fda4 3f 00 3f 00 3f 00 3f 00 - 00 00 00 00 00 00 00 00 ?.?.?.?......... 
0012fdb4 00 00 00 00 00 00 00 00 - 1c 10 fc 7f 22 14 fc 7f ............"... 
0012fdc4 1e 14 fc 7f 00 00 00 00 - e4 04 01 00 3f 00 3f 00 ............?.?. 
  
State Dump for Thread Id 0x76 
  
eax=02e80004 ebx=001682d8 ecx=00010000 edx=00000000 esi=7ffdf000 edi=00000001 
eip=77f6819b esp=00c9fd98 ebp=00c9fdec iopl=0 nv up ei pl nz ac pe cy 
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000213 
  
  
function: NtWaitForMultipleObjects 
77f68190 b8c4000000 mov eax,0xc4 
77f68195 8d542404 lea edx,[esp+0x4] ss:01bbe79f=???????? 
77f68199 cd2e int 2e 
77f6819b c21400 ret 0x14 
77f6819e 8bc0 mov eax,eax 
  
*----> Stack Back Trace <----* 
  
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 
00c9fdec 77e7a670 0000000a 001693e0 00000000 00071787 ntdll!NtWaitForMultipleObjects 
00c9fe48 77e7a6bc 00000009 00c9fe8c 00071787 000000ff user32!MsgWaitForMultipleObjectsEx 
00c9fe64 77c4c849 00000009 00c9fe8c 00000000 00071787 user32!MsgWaitForMultipleObjects 
00c9ffb8 77f04f2c 00000000 00000003 0012f038 00000000 shell32!SHAppBarMessage 
00c9ffec 00000000 00000000 00000000 00000000 00000000 kernel32!lstrcmpiW 
00000000 00000000 00000000 00000000 00000000 00000000 explorer!<nosymbols> 
  
State Dump for Thread Id 0x6f 
  
eax=00038ed7 ebx=02e71560 ecx=00000113 edx=0000038e esi=0137fe80 edi=00000000 
eip=02e71560 esp=0137fe44 ebp=0137fe9c iopl=0 nv up ei pl nz ac po nc 
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000216 
  
  
function: <nosymbols> 
  
*----> Stack Back Trace <----* 
  
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 
0137fe40 77e7128c 00000000 00000113 00007fbe 00038ed7 <nosymbols> 
0137fe9c 015826aa 0014b650 000d006c 00000001 00143d84 user32!TranslateMessageEx 
0137feb8 0158bad1 000d006c 00433d98 0002003e 00143d80 explorer!<nosymbols> 
0137ffb8 77f04f2c 00143d80 00433d98 0002003e 00143d80 explorer!<nosymbols> 
0137ffec 00000000 0158ba01 00143d80 00000000 000000b0 kernel32!lstrcmpiW 
00000000 00000000 00000000 00000000 00000000 00000000 explorer!<nosymbols> 
  
*----> Raw Stack Dump <----* 
0137fe44 8c 12 e7 77 00 00 00 00 - 13 01 00 00 be 7f 00 00 ...w............ 
0137fe54 d7 8e 03 00 9c fe 37 01 - 90 3d 14 00 50 b6 14 00 ......7..=..P... 
0137fe64 88 3d 14 00 9d 56 e7 77 - 80 fe 37 01 00 00 00 00 .=...V.w..7..... 
0137fe74 b2 10 58 01 80 fe 37 01 - 6c 00 0d 00 00 00 00 00 ..X...7.l....... 
0137fe84 13 01 00 00 be 7f 00 00 - 60 15 e7 02 d7 8e 03 00 ........`....... 
0137fe94 60 00 00 00 50 01 00 00 - b8 fe 37 01 aa 26 58 01 `...P.....7..&X. 
0137fea4 50 b6 14 00 6c 00 0d 00 - 01 00 00 00 84 3d 14 00 P...l........=.. 
0137feb4 50 b6 14 00 b8 ff 37 01 - d1 ba 58 01 6c 00 0d 00 P.....7...X.l... 
0137fec4 98 3d 43 00 3e 00 02 00 - 80 3d 14 00 00 00 00 00 .=C.>....=...... 
0137fed4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0137fee4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0137fef4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0137ff04 c0 fe 37 01 00 00 00 00 - ff ff ff ff 94 fe f8 77 ..7............w 
0137ff14 e8 b0 f9 77 ff ff ff ff - 00 00 00 00 33 62 f7 77 ...w........3b.w 
0137ff24 3b 62 f7 77 30 ff 37 01 - 01 00 00 00 17 00 01 00 ;b.w0.7......... 
0137ff34 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0137ff44 00 00 00 00 00 00 00 00 - 1b ee b1 fe 00 00 00 00 ................ 
0137ff54 e8 00 4e 80 90 00 4e 80 - 1c 01 4e 80 08 40 50 80 ..N...N...N..@P. 
0137ff64 68 13 4e 80 1c ee b1 fe - 66 81 00 80 e8 00 4e 80 h.N.....f.....N. 
0137ff74 a8 13 4e 80 1b ee b1 fe - 88 14 4e 80 ec 16 4e 80 ..N.......N...N. 
  
State Dump for Thread Id 0x5d 
  
eax=7ffda000 ebx=0014c5f8 ecx=0014c538 edx=00000000 esi=00000000 edi=0014c538 
eip=77f67e77 esp=0149fe44 ebp=0149ff90 iopl=0 nv up ei pl nz na pe nc 
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000202 
  
  
function: NtReplyWaitReceivePort 
77f67e6c b890000000 mov eax,0x90 
77f67e71 8d542404 lea edx,[esp+0x4] ss:023be84b=???????? 
77f67e75 cd2e int 2e 
77f67e77 c21000 ret 0x10 
77f67e7a 8bc0 mov eax,eax 
  
*----> Stack Back Trace <----* 
  
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 
0149ff90 77e162f0 77e163e5 0014c538 0149ffec 77bbc6ac ntdll!NtReplyWaitReceivePort 
00003a98 00000000 00000000 00000000 00000000 00000000 rpcrt4!NdrOleAllocate 
  
State Dump for Thread Id 0x80 
  
eax=00000000 ebx=016bfea8 ecx=fffffff3 edx=00000000 esi=7ffdf000 edi=00000001 
eip=77f6819b esp=016bfe84 ebp=016bfed8 iopl=0 nv up ei pl nz ac pe cy 
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000213 
  
  
function: NtWaitForMultipleObjects 
77f68190 b8c4000000 mov eax,0xc4 
77f68195 8d542404 lea edx,[esp+0x4] ss:025de88b=???????? 
77f68199 cd2e int 2e 
77f6819b c21400 ret 0x14 
77f6819e 8bc0 mov eax,eax 
  
*----> Stack Back Trace <----* 
  
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 
016bfed8 77e7a670 00000001 016bff00 00000000 000493e0 ntdll!NtWaitForMultipleObjects 
016bff34 77e7a6bc 00000000 00000000 000493e0 00000008 user32!MsgWaitForMultipleObjectsEx 
016bff50 77c70ec2 00000000 00000000 00000000 000493e0 user32!MsgWaitForMultipleObjects 
016bffb8 77f04f2c 00154dd8 00442d18 00000047 00154dd8 shell32!Control_FillCache_RunDLLW 
016bffec 00000000 00000000 00000000 00000000 00000000 kernel32!lstrcmpiW 
00000000 00000000 00000000 00000000 00000000 00000000 explorer!<nosymbols> 
  
  
Application exception occurred: 
App: EXPLORER.dbg (pid=195) 
When: 12/12/1997 @ 12:12:36.817 
Exception number: c0000005 (access violation) 
  
*----> System Information <----* 
Computer Name: MHS_PENTIUM 
User Name: JSG 
Number of Processors: 1 
Processor Type: x86 Family 5 Model 2 Stepping 12 
Windows Version: 4.0 
Current Build: 1381 
Current Type: Uniprocessor Free 
Registered Organization: Mt. Hood Software 
Registered Owner: James S. Gibbons 
  
*----> Task List <----* 
0 Idle.exe 
2 System.exe 
20 smss.exe 
28 csrss.exe 
34 WINLOGON.exe 
42 SERVICES.exe 
45 LSASS.exe 
69 SPOOLSS.exe 
77 AWHOST32.exe 
87 mgasc.exe 
90 mgactrl.exe 
92 navapsvc.exe 
109 NPSSVC.exe 
115 RPCSS.exe 
121 TAPISRV.exe 
130 RASMAN.exe 
145 PSTORES.exe 
151 alertsvc.exe 
189 NDDEAGNT.exe 
195 explorer.exe 
128 mgaqdesk.exe 
131 mgahook.exe 
48 navapw32.exe 
222 DISTASST.exe 
306 NTVDM.exe 
221 Clone_Dir.exe 
350 DRWTSN32.exe 
0 _Total.exe 
  
(00400000 - 0042e000) EXPLORER.dbg 
(77f60000 - 77fbc000) dll\ntdll.dbg 
(77dc0000 - 77dfe000) dll\advapi32.dbg 
(77f00000 - 77f5e000) dll\kernel32.dbg 
(77e70000 - 77ec4000) dll\user32.dbg 
(77ed0000 - 77efc000) dll\gdi32.dbg 
(77e10000 - 77e62000) dll\rpcrt4.dbg 
(71080000 - 710a3000) SHLWAPI.dbg 
(70ff0000 - 71063000) COMCTL32.dbg 
(70930000 - 70ad6000) SHELL32.dbg 
(70740000 - 70917000) SHDOCVW.dbg 
(5f810000 - 5f817000) dll\rpcltc1.dbg 
(77b20000 - 77bd2000) dll\ole32.dbg 
(77a40000 - 77a4c000) dll\ntshrui.dbg 
(78000000 - 78000000) 
(77800000 - 7783a000) dll\netapi32.dbg 
(77840000 - 77849000) dll\NetRap.dbg 
(777e0000 - 777ed000) dll\samlib.dbg 
(06510000 - 06510000) 
(10000000 - 10000000) 
(70300000 - 70358000) WEBCHECK.dbg 
(77780000 - 77786000) dll\msidle.dbg 
(70270000 - 702ec000) URLMON.dbg 
(65340000 - 653bc000) oleaut32.dbg 
(70200000 - 7025e000) WININET.dbg 
(776d0000 - 776d8000) dll\wsock32.dbg 
(776b0000 - 776c2000) dll\ws2_32.dbg 
(776a0000 - 776a6000) dll\ws2help.dbg 
(77660000 - 7766e000) dll\msafd.dbg 
(77690000 - 77699000) dll\wshtcpip.dbg 
(75320000 - 75342000) dll\rasapi32.dbg 
(74a10000 - 74a35000) dll\tapi32.dbg 
(77a90000 - 77a9b000) dll\version.dbg 
(779c0000 - 779c8000) dll\lz32.dbg 
(77d80000 - 77db2000) dll\comdlg32.dbg 
(750f0000 - 75100000) dll\rasscrpt.dbg 
(75210000 - 75217000) dll\rasfil32.dbg 
(752f0000 - 752fb000) dll\rascauth.dbg 
(751a0000 - 751b2000) dll\rasman.dbg 
(779b0000 - 779b9000) dll\linkinfo.dbg 
(77720000 - 77731000) dll\mpr.dbg 
(70680000 - 7069a000) MLANG.dbg 
(70af0000 - 70b6a000) jscript.dbg 
(777f0000 - 777fc000) dll\ntlanman.dbg 
(77890000 - 778a3000) dll\netui0.dbg 
(77850000 - 7788a000) dll\netui1.dbg 
(74ff0000 - 74ffc000) dll\rnr20.dbg 
(75360000 - 75367000) dll\rasadhlp.dbg 
(70420000 - 7066c000) MSHTML.dbg 
(703c0000 - 703d2000) ACTXPRXY.dbg 
(5f600000 - 5f618000) drv\winspool.dbg 
(775a0000 - 775b4000) dll\rasddui.dbg 
(703f0000 - 70405000) dll\msrating.dbg 
(77530000 - 77560000) dll\pscrptui.dbg 
(046a0000 - 046a0000) 
(04df0000 - 04df0000) 
(04e60000 - 04e60000) 
  
State Dump for Thread Id 0xc6 
  
eax=70751598 ebx=00000001 ecx=000918c0 edx=00000000 esi=00000000 edi=00000000 
eip=77e7276a esp=0006fc9c ebp=0006fcb8 iopl=0 nv up ei pl zr na po nc 
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246 
  
  
function: WaitMessage 
77e7275f b802120000 mov eax,0x1202 
77e72764 8d542404 lea edx,[esp+0x4] ss:010ae6a3=???????? 
77e72768 cd2e int 2e 
77e7276a c3 ret 
77e7276b 56 push esi 
77e7276c 33c0 xor eax,eax 
77e7276e 8b742408 mov esi,[esp+0x8] ss:010ae6a3=???????? 
77e72772 8b4e10 mov ecx,[esi+0x10] ds:0103ea06=???????? 
77e72775 03ce add ecx,esi 
77e72777 394608 cmp [esi+0x8],eax ds:0103ea06=???????? 
77e7277a 760e jbe WaitMessage+0x2b (77e7278a) 
77e7277c 8b11 mov edx,[ecx] ds:000918c0=70751598 
77e7277e 40 inc eax 
77e7277f 83c104 add ecx,0x4 
77e72782 013432 add [edx+esi],esi ds:00000000=???????? 
  
*----> Stack Back Trace <----* 
  
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 
0006fcb8 70755a01 00000000 004074e6 000918c0 00403e50 user32!WaitMessage 
0006ff60 00403b91 000000c3 00000000 000205e4 0000000a SHDOCVW!Ordinal120 
0006ffc0 77f1b304 00000000 000000b4 7ffdf000 7ffdf000 EXPLORER!<nosymbols> 
0006fff0 00000000 00403b18 00000000 00000000 77fa5aa0 kernel32!GetProcessPriorityBoost 
00000000 00000000 00000000 00000000 00000000 00000000 EXPLORER!<nosymbols> 
  
*----> Raw Stack Dump <----* 
0006fc9c 40 5f 75 70 00 00 00 00 - 00 00 00 00 01 00 00 00 @_up............ 
0006fcac d6 c7 f1 77 c0 18 09 00 - 00 00 00 00 60 ff 06 00 ...w........`... 
0006fcbc 01 5a 75 70 00 00 00 00 - e6 74 40 00 c0 18 09 00 .Zup.....t@..... 
0006fccc 50 3e 40 00 c0 18 09 00 - 00 00 00 00 e4 05 02 00 P>@............. 
0006fcdc 00 f0 fd 7f 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0006fcec 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0006fcfc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0006fd0c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0006fd1c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0006fd2c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0006fd3c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0006fd4c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0006fd5c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0006fd6c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0006fd7c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0006fd8c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0006fd9c 00 00 00 00 b5 01 01 00 - 3f 00 3f 00 3f 00 3f 00 ........?.?.?.?. 
0006fdac 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0006fdbc 1c 10 fc 7f 22 14 fc 7f - 1e 14 fc 7f 00 00 00 00 ...."........... 
0006fdcc e4 04 01 00 3f 00 3f 00 - 3f 00 3f 00 00 00 00 00 ....?.?.?.?..... 
  
State Dump for Thread Id 0xd5 
  
eax=00000000 ebx=000b8248 ecx=00082d48 edx=00000000 esi=00000000 edi=0008cd50 
eip=77f67e77 esp=008ffe44 ebp=008fff90 iopl=0 nv up ei pl nz na po nc 
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000206 
  
  
function: NtReplyWaitReceivePort 
77f67e6c b890000000 mov eax,0x90 
77f67e71 8d542404 lea edx,[esp+0x4] ss:0193e84b=???????? 
77f67e75 cd2e int 2e 
77f67e77 c21000 ret 0x10 
77f67e7a 8bc0 mov eax,eax 
  
*----> Stack Back Trace <----* 
  
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 
008fff90 77e162f0 77e163e5 0008cd50 008fffec 77bbd7f8 ntdll!NtReplyWaitReceivePort 
00003a98 00000000 00000000 00000000 00000000 00000000 rpcrt4!NdrOleAllocate 
  
State Dump for Thread Id 0xd3 
  
eax=03521008 ebx=0093f684 ecx=00003806 edx=0000e4db esi=000cf000 edi=035214c8 
eip=70932dd4 esp=0093f61c ebp=0093f650 iopl=0 nv up ei pl nz ac po cy 
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000217 
  
  
function: Ordinal18 
70932dba e823000000 call Ordinal152 (70932de2) 
70932dbf 8bf8 mov edi,eax 
70932dc1 57 push edi 
70932dc2 e83c000000 call Ordinal196 (70932e03) 
70932dc7 85c0 test eax,eax 
70932dc9 7412 jz Ordinal18+0x32 (70932ddd) 
70932dcb 8bcf mov ecx,edi 
70932dcd 8bf8 mov edi,eax 
70932dcf 8bd1 mov edx,ecx 
70932dd1 c1e902 shr ecx,0x2 
FAULT ->70932dd4 f3a5 rep movsd ds:000cf000=???????? es:035214c8=00000000 
70932dd6 8bca mov ecx,edx 
70932dd8 83e103 and ecx,0x3 
70932ddb f3a4 rep movsb ds:000cf000=?? es:035214c8=00 
70932ddd 5f pop edi 
70932dde 5e pop esi 
70932ddf c20400 ret 0x4 
  
*----> Stack Back Trace <----* 
  
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 
0093f650 70760d71 035395f0 001e028e 00000001 0093f680 SHELL32!Ordinal18 
0093f678 7079a68b 000ceb40 00000000 0093fc28 0014ad68 SHDOCVW!DllCanUnloadNow 
0093f6c0 7074d449 77bb94f8 0093f748 0014ad98 0093f6f0 SHDOCVW!SetQueryNetSessionCount 
00000000 00000000 00000000 00000000 00000000 00000000 SHDOCVW!Ordinal161 
  
*----> Raw Stack Dump <----* 
0093f61c 80 f6 93 00 40 eb 0c 00 - 72 4a 74 70 40 eb 0c 00 ....@...rJtp@... 
0093f62c 04 07 77 70 40 eb 0c 00 - d8 9e 10 00 62 07 77 70 ..wp@.......b.wp 
0093f63c 40 eb 0c 00 b4 f6 93 00 - 80 f6 93 00 28 fc 93 00 @...........(... 
0093f64c 05 40 00 80 78 f6 93 00 - 71 0d 76 70 f0 95 53 03 .@..x...q.vp..S. 
0093f65c 8e 02 1e 00 01 00 00 00 - 80 f6 93 00 70 14 76 70 ............p.vp 
0093f66c 00 00 00 00 84 f6 93 00 - 68 ad 14 00 c0 f6 93 00 ........h....... 
0093f67c 8b a6 79 70 40 eb 0c 00 - 00 00 00 00 28 fc 93 00 ..yp@.......(... 
0093f68c 68 ad 14 00 00 00 00 00 - 1d 04 00 00 01 00 00 00 h............... 
0093f69c 00 00 00 00 00 00 00 00 - 06 00 00 00 00 00 00 00 ................ 
0093f6ac 00 00 00 00 00 00 00 00 - 68 ad 14 00 d8 bb 0f 00 ........h....... 
0093f6bc 00 00 00 00 00 00 00 00 - 49 d4 74 70 f8 94 bb 77 ........I.tp...w 
0093f6cc 48 f7 93 00 98 ad 14 00 - f0 f6 93 00 4e 00 00 00 H...........N... 
0093f6dc a1 ad 74 70 28 fc 93 00 - 98 ad 14 00 50 69 11 00 ..tp(.......Pi.. 
0093f6ec 01 00 00 00 18 f7 93 00 - 01 d4 74 70 98 ad 14 00 ..........tp.... 
0093f6fc 7a 00 0f 00 4e 00 00 00 - 00 00 00 00 28 fc 93 00 z...N.......(... 
0093f70c 48 f7 93 00 a0 47 09 00 - 50 69 11 00 4c f7 93 00 H....G..Pi..L... 
0093f71c 14 d3 74 70 98 ad 14 00 - 7a 00 0f 00 4e 00 00 00 ..tp....z...N... 
0093f72c 00 00 00 00 28 fc 93 00 - 48 f7 93 00 4e 00 00 00 ....(...H...N... 
0093f73c c0 47 09 00 8e 02 1e 00 - 00 00 00 00 00 00 00 00 .G.............. 
0093f74c 78 f7 93 00 1d 81 74 70 - 8e 02 1e 00 4e 00 00 00 x.....tp....N... 
  
State Dump for Thread Id 0xc8 
  
eax=0000000d ebx=001276a0 ecx=00000009 edx=00000000 esi=7ffdf000 edi=00000001 
eip=77f6819b esp=0099fd9c ebp=0099fdf0 iopl=0 nv up ei pl nz ac pe cy 
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000213 
  
  
function: NtWaitForMultipleObjects 
77f68190 b8c4000000 mov eax,0xc4 
77f68195 8d542404 lea edx,[esp+0x4] ss:019de7a3=???????? 
77f68199 cd2e int 2e 
77f6819b c21400 ret 0x14 
77f6819e 8bc0 mov eax,eax 
  
*----> Stack Back Trace <----* 
  
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 
0099fdf0 77e7a670 0000000e 000eacb0 00000000 0003bf07 ntdll!NtWaitForMultipleObjects 
0099fe4c 77e7a6bc 0000000d 0099febc 0003bf07 000000ff user32!MsgWaitForMultipleObjectsEx 
0099fe68 7093b594 0000000d 0099febc 00000000 0003bf07 user32!MsgWaitForMultipleObjects 
000000c8 00000000 00000000 00000000 00000000 00000000 SHELL32!Ordinal36 
  
*----> Raw Stack Dump <----* 
0099fd9c 83 c7 f1 77 0e 00 00 00 - a0 76 12 00 01 00 00 00 ...w.....v...... 
0099fdac 00 00 00 00 e0 fd 99 00 - e4 ac 0e 00 00 00 00 00 ................ 
0099fdbc b0 ac 0e 00 38 00 00 00 - 0d 00 00 00 bc fe 99 00 ....8........... 
0099fdcc 18 fe 99 00 0c 00 00 00 - 00 00 00 00 a0 76 12 00 .............v.. 
0099fddc 00 00 00 00 90 fe a9 6d - ff ff ff ff 00 00 00 00 .......m........ 
0099fdec e0 fd 99 00 4c fe 99 00 - 70 a6 e7 77 0e 00 00 00 ....L...p..w.... 
0099fdfc b0 ac 0e 00 00 00 00 00 - 07 bf 03 00 00 00 00 00 ................ 
0099fe0c 0d 00 00 00 a0 56 e7 77 - 00 00 00 00 00 00 00 00 .....V.w........ 
0099fe1c 01 00 00 00 38 fe 99 00 - 58 b0 fd 7f 44 b0 fd 7f ....8...X...D... 
0099fe2c 80 3c 45 00 0d 00 00 00 - 02 01 00 00 09 04 09 04 .<E............. 
0099fe3c 00 00 00 00 00 00 00 00 - 44 b0 fd 7f 9c 00 00 00 ........D....... 
0099fe4c 68 fe 99 00 bc a6 e7 77 - 0d 00 00 00 bc fe 99 00 h......w........ 
0099fe5c 07 bf 03 00 ff 00 00 00 - 00 00 00 00 c8 00 00 00 ................ 
0099fe6c 94 b5 93 70 0d 00 00 00 - bc fe 99 00 00 00 00 00 ...p............ 
0099fe7c 07 bf 03 00 ff 00 00 00 - 20 00 00 00 d2 01 e5 77 ........ ......w 
0099fe8c ec ff 99 00 00 00 00 00 - 00 00 00 00 a0 00 00 00 ................ 
0099fe9c c8 00 00 00 00 00 00 00 - 00 04 00 00 00 00 00 00 ................ 
0099feac 00 00 00 00 7e d7 81 03 - 69 01 00 00 4b 00 00 00 ....~...i...K... 
0099febc a4 00 00 00 ac 00 00 00 - c8 00 00 00 18 01 00 00 ................ 
0099fecc 2c 02 00 00 68 02 00 00 - 40 02 00 00 c0 00 00 00 ,...h...@....... 
  
State Dump for Thread Id 0xcb 
  
eax=000000ce ebx=00000000 ecx=00000013 edx=00000000 esi=0009d7e8 edi=00000000 
eip=77e7276a esp=00f0fea0 ebp=00f0ff2c iopl=0 nv up ei pl nz na pe nc 
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000202 
  
  
function: WaitMessage 
77e7275f b802120000 mov eax,0x1202 
77e72764 8d542404 lea edx,[esp+0x4] ss:01f4e8a7=???????? 
77e72768 cd2e int 2e 
77e7276a c3 ret 
77e7276b 56 push esi 
77e7276c 33c0 xor eax,eax 
77e7276e 8b742408 mov esi,[esp+0x8] ss:01f4e8a7=???????? 
77e72772 8b4e10 mov ecx,[esi+0x10] ds:010dc1ee=???????? 
77e72775 03ce add ecx,esi 
77e72777 394608 cmp [esi+0x8],eax ds:010dc1ee=???????? 
77e7277a 760e jbe WaitMessage+0x2b (77e7278a) 
77e7277c 8b11 mov edx,[ecx] ds:00000013=???????? 
77e7277e 40 inc eax 
77e7277f 83c104 add ecx,0x4 
77e72782 013432 add [edx+esi],esi ds:0009d7e8=7076ac50 
  
*----> Stack Back Trace <----* 
  
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 
00f0ff2c 7076a485 000300f2 0006ded4 77f64b1c 00094498 user32!WaitMessage 
00f0ffb8 77f04f2c 00094498 0006ded4 77f64b1c 00094498 SHDOCVW!DllCanUnloadNow 
00f0ffec 00000000 7076a449 00094498 00000000 000000b0 kernel32!lstrcmpiW 
00000000 00000000 00000000 00000000 00000000 00000000 EXPLORER!<nosymbols> 
  
*----> Raw Stack Dump <----* 
00f0fea0 68 a6 76 70 d4 de 06 00 - 1c 4b f6 77 98 44 09 00 h.vp.....K.w.D.. 
00f0feb0 00 00 00 00 20 11 f6 77 - 60 35 fa 77 f2 11 f6 77 .... ..w`5.w...w 
00f0fec0 a0 42 09 00 00 00 00 00 - 98 44 09 00 88 00 00 00 .B.......D...... 
00f0fed0 2d 00 00 00 00 00 00 00 - 04 ff f0 00 3f d6 b3 77 -...........?..w 
00f0fee0 00 00 08 00 02 00 00 00 - 04 ff f0 00 06 d6 b3 77 ...............w 
00f0fef0 14 d6 b3 77 68 5e bc 77 - 00 00 00 00 00 00 00 00 ...wh^.w........ 
00f0ff00 a0 00 03 00 0f 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
00f0ff10 de e0 83 03 37 01 00 00 - 00 00 00 00 cb 00 00 00 ....7........... 
00f0ff20 e8 d7 09 00 00 00 00 00 - 01 00 00 00 b8 ff f0 00 ................ 
00f0ff30 85 a4 76 70 f2 00 03 00 - d4 de 06 00 1c 4b f6 77 ..vp.........K.w 
00f0ff40 98 44 09 00 02 e0 00 00 - 00 00 00 00 e8 ac 63 80 .D............c. 
00f0ff50 97 00 00 00 46 02 00 00 - 67 c0 d1 02 00 00 00 00 ....F...g....... 
00f0ff60 78 00 30 c0 02 cf 12 80 - 00 f0 bd 07 64 6e 45 fe x.0.........dnE. 
00f0ff70 00 b0 fd 7f d0 6d 45 fe - 00 00 00 00 00 00 00 00 .....mE......... 
00f0ff80 00 00 ae 07 8b 00 64 80 - 20 b7 65 80 53 00 64 80 ......d. .e.S.d. 
00f0ff90 01 95 65 80 b2 5b 11 80 - bc 00 64 80 50 95 65 80 ..e..[....d.P.e. 
00f0ffa0 38 ff f0 00 01 00 00 00 - dc ff f0 00 9b 92 81 70 8..............p 
00f0ffb0 90 a4 76 70 00 00 00 00 - ec ff f0 00 2c 4f f0 77 ..vp........,O.w 
00f0ffc0 98 44 09 00 d4 de 06 00 - 1c 4b f6 77 98 44 09 00 .D.......K.w.D.. 
00f0ffd0 1c 4b f6 77 c4 ff f0 00 - 08 00 05 00 ff ff ff ff .K.w............ 
  
State Dump for Thread Id 0xd1 
  
eax=00000003 ebx=0153ff3c ecx=00000000 edx=00000000 esi=7ffdf000 edi=00000001 
eip=77f6819b esp=0153ff18 ebp=0153ff6c iopl=0 nv up ei pl nz ac pe cy 
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000213 
  
  
function: NtWaitForMultipleObjects 
77f68190 b8c4000000 mov eax,0xc4 
77f68195 8d542404 lea edx,[esp+0x4] ss:0257e91f=???????? 
77f68199 cd2e int 2e 
77f6819b c21400 ret 0x14 
77f6819e 8bc0 mov eax,eax 
  
*----> Stack Back Trace <----* 
  
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 
0153ff6c 77f1c690 00000003 0153ffac 00000000 ffffffff ntdll!NtWaitForMultipleObjects 
0153ff88 70302215 00000003 0153ffac 00000000 ffffffff kernel32!WaitForMultipleObjects 
0153ffb8 77f04f2c 00000000 00000000 00770b02 00000000 WEBCHECK!DllGetClassObject 
0153ffec 00000000 7030218d 00000000 00000000 65696c43 kernel32!lstrcmpiW 
00000000 00000000 00000000 00000000 00000000 00000000 EXPLORER!<nosymbols> 
  
*----> Raw Stack Dump <----* 
0153ff18 83 c7 f1 77 03 00 00 00 - 3c ff 53 01 01 00 00 00 ...w....<.S..... 
0153ff28 00 00 00 00 00 00 00 00 - 00 00 00 00 02 00 00 00 ................ 
0153ff38 01 00 00 00 54 01 00 00 - 78 01 00 00 f4 00 00 00 ....T...x....... 
0153ff48 58 ff 53 01 80 00 00 00 - 00 00 00 00 00 00 00 00 X.S............. 
0153ff58 1e 00 20 00 00 7c fd 7f - 78 01 00 00 00 00 00 00 .. ..|..x....... 
0153ff68 00 00 00 00 88 ff 53 01 - 90 c6 f1 77 03 00 00 00 ......S....w.... 
0153ff78 ac ff 53 01 00 00 00 00 - ff ff ff ff 00 00 00 00 ..S............. 
0153ff88 b8 ff 53 01 15 22 30 70 - 03 00 00 00 ac ff 53 01 ..S.."0p......S. 
0153ff98 00 00 00 00 ff ff ff ff - 00 00 00 00 02 0b 77 00 ..............w. 
0153ffa8 00 00 00 00 54 01 00 00 - 78 01 00 00 f4 00 00 00 ....T...x....... 
0153ffb8 ec ff 53 01 2c 4f f0 77 - 00 00 00 00 00 00 00 00 ..S.,O.w........ 
0153ffc8 02 0b 77 00 00 00 00 00 - 02 0b 77 00 c4 ff 53 01 ..w.......w...S. 
0153ffd8 11 00 00 00 ff ff ff ff - 48 b0 f3 77 00 d2 f3 77 ........H..w...w 
0153ffe8 00 00 00 00 00 00 00 00 - 00 00 00 00 8d 21 30 70 .............!0p 
0153fff8 00 00 00 00 00 00 00 00 - 43 6c 69 65 6e 74 20 55 ........Client U 
01540008 72 6c 43 61 63 68 65 20 - 4d 4d 46 20 56 65 72 20 rlCache MMF Ver 
01540018 34 2e 37 00 00 c0 03 00 - 00 40 00 00 00 07 00 00 4.7......@...... 
01540028 04 01 00 00 00 00 00 00 - 00 90 47 01 00 00 00 00 ..........G..... 
01540038 00 98 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
01540048 04 00 00 00 03 00 00 00 - 58 5a 51 45 32 4b 5a 52 ........XZQE2KZR 
  
State Dump for Thread Id 0x65 
  
eax=00000009 ebx=00000000 ecx=009b0900 edx=00000000 esi=00000000 edi=77f681a0 
eip=77f681ab esp=0298fad4 ebp=0298fb28 iopl=0 nv up ei pl zr na po nc 
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246 
  
  
function: NtWaitForSingleObject 
77f681a0 b8c5000000 mov eax,0xc5 
77f681a5 8d542404 lea edx,[esp+0x4] ss:039ce4db=???????? 
77f681a9 cd2e int 2e 
77f681ab c20c00 ret 0xc 
77f681ae 8bc0 mov eax,eax 
  
*----> Stack Back Trace <----* 
  
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 
0298fb28 77664706 0000024c 0000017c 00000001 00000004 ntdll!NtWaitForSingleObject 
0298fbc8 776b938d 00000001 0298fe34 0298fc2c 0298fd30 msafd!<nosymbols> 
0298fc04 7020f599 00000001 0298fe34 0298fc2c 0298fd30 ws2_32!select 
0298ff68 7020f27f 000d4048 702073e2 000d4048 000a5330 WININET!InternetSetStatusCallback 
0298ffb8 77f04f2c 00000000 77f64a89 00080548 0009cae0 WININET!InternetSetStatusCallback 
0298ffec 00000000 00000000 00000000 00000000 00000000 kernel32!lstrcmpiW 
00000000 00000000 00000000 00000000 00000000 00000000 EXPLORER!<nosymbols> 
  
*----> Raw Stack Dump <----* 
0298fad4 b4 7f 66 77 4c 02 00 00 - 01 00 00 00 00 fb 98 02 ..fwL........... 
0298fae4 5c fb 98 02 34 fe 98 02 - 00 00 00 00 10 33 eb 43 \...4........3.C 
0298faf4 3a 07 bd 01 ff ff ff ff - ff ff ff 7f c0 b4 b3 ff :............... 
0298fb04 ff ff ff ff 00 00 00 00 - 01 00 00 00 00 00 00 00 ................ 
0298fb14 d0 46 66 77 7c 01 00 00 - 4c 02 00 00 00 00 00 00 .Ffw|...L....... 
0298fb24 00 00 00 00 c8 fb 98 02 - 06 47 66 77 4c 02 00 00 .........GfwL... 
0298fb34 7c 01 00 00 01 00 00 00 - 04 00 00 00 34 fe 98 02 |...........4... 
0298fb44 01 00 00 00 80 0a 9b 00 - 80 0f 05 fd ff ff ff ff ................ 
0298fb54 01 00 00 00 00 05 08 00 - 7c 01 00 00 19 00 00 00 ........|....... 
0298fb64 10 74 f6 77 98 fb 98 02 - a2 4b f6 77 00 00 08 00 .t.w.....K.w.... 
0298fb74 d8 28 14 00 7c 4c f6 77 - 48 05 08 00 0c c0 24 70 .(..|L.wH.....$p 
0298fb84 00 00 00 00 00 00 00 00 - 01 28 14 00 00 00 00 00 .........(...... 
0298fb94 10 00 00 00 dc fb 98 02 - 7a 2a f0 77 05 00 00 00 ........z*.w.... 
0298fba4 80 69 67 ff 00 00 00 00 - f6 ff ff ff ff ff ff ff .ig............. 
0298fbb4 54 fb 98 02 2c 00 00 00 - 00 00 00 00 00 00 00 00 T...,........... 
0298fbc4 4c fb 98 02 04 fc 98 02 - 8d 93 6b 77 01 00 00 00 L.........kw.... 
0298fbd4 34 fe 98 02 2c fc 98 02 - 30 fd 98 02 38 ff 98 02 4...,...0...8... 
0298fbe4 00 fc 98 02 e8 03 00 00 - 01 00 00 00 cd 5f f0 77 ............._.w 
0298fbf4 00 09 9b 00 a0 2b 9b 00 - 20 0b 9b 00 00 00 00 00 .....+.. ....... 
0298fc04 68 ff 98 02 99 f5 20 70 - 01 00 00 00 34 fe 98 02 h..... p....4... 
  
State Dump for Thread Id 0xdb 
  
eax=000000c0 ebx=00000000 ecx=00000000 edx=00000000 esi=00000000 edi=77f681a0 
eip=77f681ab esp=029cff44 ebp=029cff98 iopl=0 nv up ei ng nz ac po cy 
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000297 
  
  
function: NtWaitForSingleObject 
77f681a0 b8c5000000 mov eax,0xc5 
77f681a5 8d542404 lea edx,[esp+0x4] ss:03a0e94b=???????? 
77f681a9 cd2e int 2e 
77f681ab c20c00 ret 0xc 
77f681ae 8bc0 mov eax,eax 
  
*----> Stack Back Trace <----* 
  
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 
029cff98 77661d0c 00000228 ffffffff 00000003 00000004 ntdll!NtWaitForSingleObject 
029cffec 00000000 00000000 00000000 00000000 00000000 msafd!<nosymbols> 
00000000 00000000 00000000 00000000 00000000 00000000 EXPLORER!<nosymbols> 
  
State Dump for Thread Id 0x12b 
  
eax=0457f71c ebx=00000000 ecx=7ffad000 edx=00000000 esi=00000000 edi=0457fe80 
eip=77e724e7 esp=0457fe40 ebp=0457fe64 iopl=0 nv up ei pl zr na po nc 
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246 
  
  
function: InvalidateRect 
77e724ce b893110000 mov eax,0x1193 
77e724d3 8d542404 lea edx,[esp+0x4] ss:055be847=???????? 
77e724d7 cd2e int 2e 
77e724d9 c20c00 ret 0xc 
77e724dc b87c110000 mov eax,0x117c 
77e724e1 8d542404 lea edx,[esp+0x4] ss:055be847=???????? 
77e724e5 cd2e int 2e 
77e724e7 c21400 ret 0x14 
77e724ea 55 push ebp 
77e724eb 8bec mov ebp,esp 
77e724ed 83ec0c sub esp,0xc 
77e724f0 53 push ebx 
77e724f1 56 push esi 
77e724f2 57 push edi 
77e724f3 8b7508 mov esi,[ebp+0x8] ss:055be86a=???????? 
77e724f6 c745f814000000 mov dword ptr [ebp-0x8],0x14 ss:055be86a=???????? 
77e724fd 8d7e14 lea edi,[esi+0x14] ds:0103ea06=???????? 
77e72500 8b4e04 mov ecx,[esi+0x4] ds:0103ea06=???????? 
77e72503 897dfc mov [ebp-0x4],edi ss:055be86a=???????? 
  
*----> Stack Back Trace <----* 
  
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 
0457fe64 707fd7ce 0457fe80 00000000 00000000 00000000 user32!InvalidateRect 
0457fe9c 7079e580 00490053 005c0044 00102168 00000000 SHDOCVW!<nosymbols> 
0457ff2c 7076a485 004c01f0 00490053 005c0044 00102168 SHDOCVW!SetQueryNetSessionCount 
0457ffb8 77f04f2c 00102168 00490053 005c0044 00102168 SHDOCVW!DllCanUnloadNow 
0457ffec 00000000 00000000 00000000 00000000 00000000 kernel32!lstrcmpiW 
00000000 00000000 00000000 00000000 00000000 00000000 EXPLORER!<nosymbols> 
  
State Dump for Thread Id 0xb7 
  
eax=00000084 ebx=00000000 ecx=04ecffa8 edx=00000000 esi=000c1190 edi=00000000 
eip=77e7276a esp=04ecfea0 ebp=04ecff2c iopl=0 nv up ei pl nz na po nc 
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000206 
  
  
function: WaitMessage 
77e7275f b802120000 mov eax,0x1202 
77e72764 8d542404 lea edx,[esp+0x4] ss:05f0e8a7=???????? 
77e72768 cd2e int 2e 
77e7276a c3 ret 
77e7276b 56 push esi 
77e7276c 33c0 xor eax,eax 
77e7276e 8b742408 mov esi,[esp+0x8] ss:05f0e8a7=???????? 
77e72772 8b4e10 mov ecx,[esi+0x10] ds:010ffb96=???????? 
77e72775 03ce add ecx,esi 
77e72777 394608 cmp [esi+0x8],eax ds:010ffb96=???????? 
77e7277a 760e jbe WaitMessage+0x2b (77e7278a) 
77e7277c 8b11 mov edx,[ecx] ds:04ecffa8=04ecffdc 
77e7277e 40 inc eax 
77e7277f 83c104 add ecx,0x4 
77e72782 013432 add [edx+esi],esi ds:000c1190=7076ac50 
  
*----> Stack Back Trace <----* 
  
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 
04ecff2c 7076a485 00e4007e 00000000 00f0bb28 000e4e28 user32!WaitMessage 
04ecffb8 77f04f2c 000e4e28 00000000 00f0bb28 000e4e28 SHDOCVW!DllCanUnloadNow 
04ecffec 00000000 00000000 00000000 00000000 00000000 kernel32!lstrcmpiW 
00000000 00000000 00000000 00000000 00000000 00000000 EXPLORER!<nosymbols> 
  
  
Application exception occurred: 
App: EXPLORER.dbg (pid=171) 
When: 1/4/1998 @ 17:42:20.948 
Exception number: c0000005 (access violation) 
  
*----> System Information <----* 
Computer Name: MHS_PENTIUM 
User Name: JSG 
Number of Processors: 1 
Processor Type: x86 Family 5 Model 2 Stepping 12 
Windows Version: 4.0 
Current Build: 1381 
Current Type: Uniprocessor Free 
Registered Organization: Mt. Hood Software 
Registered Owner: James S. Gibbons 
  
*----> Task List <----* 
0 Idle.exe 
2 System.exe 
20 smss.exe 
26 csrss.exe 
34 WINLOGON.exe 
42 SERVICES.exe 
45 LSASS.exe 
69 SPOOLSS.exe 
78 AWHOST32.exe 
87 mgasc.exe 
90 mgactrl.exe 
92 navapsvc.exe 
44 NPSSVC.exe 
118 RPCSS.exe 
122 TAPISRV.exe 
137 wfxsvc.exe 
144 NDDEAGNT.exe 
150 RASMAN.exe 
154 wfxmod32.exe 
123 PSTORES.exe 
171 explorer.exe 
48 alertsvc.exe 
140 systray.exe 
175 mgaqdesk.exe 
163 mgahook.exe 
98 navapw32.exe 
192 DISTASST.exe 
197 wfxsnt40.exe 
202 wfxctl32.exe 
235 Clone_Dir.exe 
124 DRWTSN32.exe 
0 _Total.exe 
  
(00400000 - 0042e000) EXPLORER.dbg 
(77f60000 - 77fbc000) dll\ntdll.dbg 
(77dc0000 - 77dfe000) dll\advapi32.dbg 
(77f00000 - 77f5e000) dll\kernel32.dbg 
(77e70000 - 77ec4000) dll\user32.dbg 
(77ed0000 - 77efc000) dll\gdi32.dbg 
(77e10000 - 77e62000) dll\rpcrt4.dbg 
(71080000 - 710a3000) SHLWAPI.dbg 
(70ff0000 - 71063000) COMCTL32.dbg 
(70930000 - 70ad6000) SHELL32.dbg 
(70740000 - 70917000) SHDOCVW.dbg 
(5f810000 - 5f817000) dll\rpcltc1.dbg 
(77b20000 - 77bd2000) dll\ole32.dbg 
(77a40000 - 77a4c000) dll\ntshrui.dbg 
(78000000 - 78000000) 
(77800000 - 7783a000) dll\netapi32.dbg 
(77840000 - 77849000) dll\NetRap.dbg 
(777e0000 - 777ed000) dll\samlib.dbg 
(06510000 - 06510000) 
(10000000 - 10000000) 
(70270000 - 702ec000) URLMON.dbg 
(70300000 - 70358000) WEBCHECK.dbg 
(76c20000 - 76c2a000) dll\hticons.dbg 
(77780000 - 77786000) dll\msidle.dbg 
(65340000 - 653bc000) oleaut32.dbg 
(779b0000 - 779b9000) dll\linkinfo.dbg 
(77720000 - 77731000) dll\mpr.dbg 
(777f0000 - 777fc000) dll\ntlanman.dbg 
(77890000 - 778a3000) dll\netui0.dbg 
(77850000 - 7788a000) dll\netui1.dbg 
(01700000 - 01700000) 
(778f0000 - 77919000) dll\syncui.dbg 
(76f00000 - 76f08000) dll\diskcopy.dbg 
(01d40000 - 01d40000) 
(5f3e0000 - 5f3e0000) 
(01d60000 - 01d60000) 
(77a90000 - 77a9b000) dll\version.dbg 
(779c0000 - 779c8000) dll\lz32.dbg 
(778e0000 - 778e9000) dll\shcompui.dbg 
(74f80000 - 74f87000) dll\rshx32.dbg 
(76df0000 - 76df8000) dll\fmifs.dbg 
(74920000 - 74943000) dll\ulib.dbg 
(76ae0000 - 76b05000) dll\ifsutil.dbg 
  
State Dump for Thread Id 0xaa 
  
eax=00000578 ebx=00000001 ecx=002d012e edx=00000000 esi=00000000 edi=00000000 
eip=77e7276a esp=0006fc9c ebp=0006fcb8 iopl=0 nv up ei pl zr na po nc 
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246 
  
  
function: WaitMessage 
77e7275f b802120000 mov eax,0x1202 
77e72764 8d542404 lea edx,[esp+0x4] ss:010be6a3=???????? 
77e72768 cd2e int 2e 
77e7276a c3 ret 
77e7276b 56 push esi 
77e7276c 33c0 xor eax,eax 
77e7276e 8b742408 mov esi,[esp+0x8] ss:010be6a3=???????? 
77e72772 8b4e10 mov ecx,[esi+0x10] ds:0104ea06=???????? 
77e72775 03ce add ecx,esi 
77e72777 394608 cmp [esi+0x8],eax ds:0104ea06=???????? 
77e7277a 760e jbe WaitMessage+0x2b (77e7278a) 
77e7277c 8b11 mov edx,[ecx] ds:002d012e=???????? 
77e7277e 40 inc eax 
77e7277f 83c104 add ecx,0x4 
77e72782 013432 add [edx+esi],esi ds:00000000=???????? 
  
*----> Stack Back Trace <----* 
  
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 
0006fcb8 70755a01 00000000 004074e6 00091f00 00403e50 user32!WaitMessage 
0006ff60 00403b91 000000ab 00000000 000205e4 0000000a SHDOCVW!Ordinal120 
0006ffc0 77f1b304 00000000 000000b4 7ffdf000 7ffdf000 EXPLORER!<nosymbols> 
0006fff0 00000000 00403b18 00000000 00000000 77fa5aa0 kernel32!GetProcessPriorityBoost 
00000000 00000000 00000000 00000000 00000000 00000000 EXPLORER!<nosymbols> 
  
*----> Raw Stack Dump <----* 
0006fc9c 40 5f 75 70 00 00 00 00 - 00 00 00 00 01 00 00 00 @_up............ 
0006fcac d6 c7 f1 77 00 1f 09 00 - 00 00 00 00 60 ff 06 00 ...w........`... 
0006fcbc 01 5a 75 70 00 00 00 00 - e6 74 40 00 00 1f 09 00 .Zup.....t@..... 
0006fccc 50 3e 40 00 00 1f 09 00 - 00 00 00 00 e4 05 02 00 P>@............. 
0006fcdc 00 f0 fd 7f 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0006fcec 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0006fcfc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0006fd0c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0006fd1c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0006fd2c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0006fd3c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0006fd4c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0006fd5c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0006fd6c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0006fd7c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0006fd8c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0006fd9c 00 00 00 00 b5 01 01 00 - 3f 00 3f 00 3f 00 3f 00 ........?.?.?.?. 
0006fdac 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0006fdbc 1c 10 fc 7f 22 14 fc 7f - 1e 14 fc 7f 00 00 00 00 ...."........... 
0006fdcc e4 04 01 00 3f 00 3f 00 - 3f 00 3f 00 00 00 00 00 ....?.?.?.?..... 
  
State Dump for Thread Id 0xb6 
  
eax=7ffdd000 ebx=0008d480 ecx=0008d390 edx=00000000 esi=00000000 edi=0008d390 
eip=77f67e77 esp=009efe44 ebp=009eff90 iopl=0 nv up ei pl nz na po nc 
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000206 
  
  
function: NtReplyWaitReceivePort 
77f67e6c b890000000 mov eax,0x90 
77f67e71 8d542404 lea edx,[esp+0x4] ss:01a3e84b=???????? 
77f67e75 cd2e int 2e 
77f67e77 c21000 ret 0x10 
77f67e7a 8bc0 mov eax,eax 
  
*----> Stack Back Trace <----* 
  
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 
009eff90 77e162f0 77e163e5 0008d390 009effec 77bbd7f8 ntdll!NtReplyWaitReceivePort 
00003a98 00000000 00000000 00000000 00000000 00000000 rpcrt4!NdrOleAllocate 
  
State Dump for Thread Id 0xb7 
  
eax=000552d1 ebx=00406ec0 ecx=00000113 edx=00000000 esi=0006fc94 edi=00400000 
eip=77e7276a esp=00a2ff80 ebp=00a2ffa0 iopl=0 nv up ei pl zr na po nc 
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246 
  
  
function: WaitMessage 
77e7275f b802120000 mov eax,0x1202 
77e72764 8d542404 lea edx,[esp+0x4] ss:01a7e987=???????? 
77e72768 cd2e int 2e 
77e7276a c3 ret 
77e7276b 56 push esi 
77e7276c 33c0 xor eax,eax 
77e7276e 8b742408 mov esi,[esp+0x8] ss:01a7e987=???????? 
77e72772 8b4e10 mov ecx,[esi+0x10] ds:010be69a=???????? 
77e72775 03ce add ecx,esi 
77e72777 394608 cmp [esi+0x8],eax ds:010be69a=???????? 
77e7277a 760e jbe WaitMessage+0x2b (77e7278a) 
77e7277c 8b11 mov edx,[ecx] ds:00000113=???????? 
77e7277e 40 inc eax 
77e7277f 83c104 add ecx,0x4 
77e72782 013432 add [edx+esi],esi ds:0006fc94=000000e5 
  
*----> Stack Back Trace <----* 
  
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 
00a2ffa0 00406ed2 71087e51 00400000 77bbcb60 0006fbbc user32!WaitMessage 
00a2ffec 00000000 71087e35 0006fc94 00000000 00000000 EXPLORER!<nosymbols> 
00000000 00000000 00000000 00000000 00000000 00000000 EXPLORER!<nosymbols> 
  
*----> Raw Stack Dump <----* 
00a2ff80 6f 6f 40 00 00 00 00 00 - 13 01 00 00 f7 7f 00 00 oo@............. 
00a2ff90 97 11 78 77 37 3d 06 00 - 6f 01 00 00 6a 00 00 00 ..xw7=..o...j... 
00a2ffa0 ec ff a2 00 d2 6e 40 00 - 51 7e 08 71 00 00 40 00 .....n@.Q~.q..@. 
00a2ffb0 60 cb bb 77 bc fb 06 00 - 94 fc 06 00 2c 4f f0 77 `..w........,O.w 
00a2ffc0 94 fc 06 00 60 cb bb 77 - bc fb 06 00 94 fc 06 00 ....`..w........ 
00a2ffd0 bc fb 06 00 c4 ff a2 00 - 14 00 00 00 ff ff ff ff ................ 
00a2ffe0 48 b0 f3 77 00 d2 f3 77 - 00 00 00 00 00 00 00 00 H..w...w........ 
00a2fff0 00 00 00 00 35 7e 08 71 - 94 fc 06 00 00 00 00 00 ....5~.q........ 
00a30000 00 00 00 00 9f 00 01 00 - 10 00 90 01 17 00 b0 01 ................ 
00a30010 ff ff ff 00 ff ff ff 00 - 00 00 00 00 00 00 00 00 ................ 
00a30020 00 00 00 00 01 00 00 00 - 0d 02 01 01 00 00 00 00 ................ 
00a30030 00 00 00 00 00 00 00 00 - 00 00 00 00 02 00 00 00 ................ 
00a30040 01 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
00a30050 00 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
00a30060 07 00 8a 01 00 00 00 40 - 06 00 00 00 00 00 00 00 .......@........ 
00a30070 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 40 ...............@ 
00a30080 06 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
00a30090 00 00 00 00 00 00 00 00 - 00 00 00 00 4b 00 00 00 ............K... 
00a300a0 00 00 00 40 fe ff ff ff - 00 00 00 00 00 00 00 00 ...@............ 
00a300b0 00 00 00 00 00 00 00 00 - 00 00 00 40 fe ff ff ff ...........@.... 
  
State Dump for Thread Id 0xbc 
  
eax=02200004 ebx=00a8fdc0 ecx=00002000 edx=00000000 esi=7ffdf000 edi=00000001 
eip=77f6819b esp=00a8fd9c ebp=00a8fdf0 iopl=0 nv up ei pl nz ac pe cy 
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000213 
  
  
function: NtWaitForMultipleObjects 
77f68190 b8c4000000 mov eax,0xc4 
77f68195 8d542404 lea edx,[esp+0x4] ss:01ade7a3=???????? 
77f68199 cd2e int 2e 
77f6819b c21400 ret 0x14 
77f6819e 8bc0 mov eax,eax 
  
*----> Stack Back Trace <----* 
  
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 
00a8fdf0 77e7a670 00000006 00a8fe18 00000000 0004a927 ntdll!NtWaitForMultipleObjects 
00a8fe4c 77e7a6bc 00000005 00a8febc 0004a927 000000ff user32!MsgWaitForMultipleObjectsEx 
00a8fe68 7093b594 00000005 00a8febc 00000000 0004a927 user32!MsgWaitForMultipleObjects 
000000bc 00000000 00000000 00000000 00000000 00000000 SHELL32!Ordinal36 
  
*----> Raw Stack Dump <----* 
00a8fd9c 83 c7 f1 77 06 00 00 00 - c0 fd a8 00 01 00 00 00 ...w............ 
00a8fdac 00 00 00 00 e0 fd a8 00 - 2c fe a8 00 00 00 00 00 ........,....... 
00a8fdbc 18 fe a8 00 a4 00 00 00 - 7c 00 00 00 d0 00 00 00 ........|....... 
00a8fdcc 08 01 00 00 64 01 00 00 - ac 00 00 00 00 00 00 00 ....d........... 
00a8fddc 00 00 00 00 90 7c f0 49 - ff ff ff ff 00 00 00 00 .....|.I........ 
00a8fdec e0 fd a8 00 4c fe a8 00 - 70 a6 e7 77 06 00 00 00 ....L...p..w.... 
00a8fdfc 18 fe a8 00 00 00 00 00 - 27 a9 04 00 00 00 00 00 ........'....... 
00a8fe0c 05 00 00 00 a0 56 e7 77 - 00 00 00 00 a4 00 00 00 .....V.w........ 
00a8fe1c 7c 00 00 00 d0 00 00 00 - 08 01 00 00 64 01 00 00 |...........d... 
00a8fe2c ac 00 00 00 05 00 00 00 - 02 01 00 00 c0 27 09 00 .............'.. 
00a8fe3c 00 00 00 00 00 00 00 00 - 44 b0 fd 7f ac 00 00 00 ........D....... 
00a8fe4c 68 fe a8 00 bc a6 e7 77 - 05 00 00 00 bc fe a8 00 h......w........ 
00a8fe5c 27 a9 04 00 ff 00 00 00 - 00 00 00 00 bc 00 00 00 '............... 
00a8fe6c 94 b5 93 70 05 00 00 00 - bc fe a8 00 00 00 00 00 ...p............ 
00a8fe7c 27 a9 04 00 ff 00 00 00 - 20 00 00 00 d2 01 e5 77 '....... ......w 
00a8fe8c ec ff a8 00 00 00 00 00 - 00 00 00 00 80 00 00 00 ................ 
00a8fe9c bc 00 00 00 00 00 00 00 - 00 04 00 00 00 00 00 00 ................ 
00a8feac 00 00 00 00 e1 1f 06 00 - b5 00 00 00 0c 00 00 00 ................ 
00a8febc a4 00 00 00 7c 00 00 00 - d0 00 00 00 08 01 00 00 ....|........... 
00a8fecc 64 01 00 00 64 01 00 00 - 78 01 00 00 bc 00 00 00 d...d...x....... 
  
State Dump for Thread Id 0x8d 
  
eax=00000200 ebx=00000000 ecx=0009d39c edx=00000000 esi=0009c450 edi=00000000 
eip=77e7276a esp=00fbfea0 ebp=00fbff2c iopl=0 nv up ei pl nz na po nc 
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000206 
  
  
function: WaitMessage 
77e7275f b802120000 mov eax,0x1202 
77e72764 8d542404 lea edx,[esp+0x4] ss:0200e8a7=???????? 
77e72768 cd2e int 2e 
77e7276a c3 ret 
77e7276b 56 push esi 
77e7276c 33c0 xor eax,eax 
77e7276e 8b742408 mov esi,[esp+0x8] ss:0200e8a7=???????? 
77e72772 8b4e10 mov ecx,[esi+0x10] ds:010eae56=???????? 
77e72775 03ce add ecx,esi 
77e72777 394608 cmp [esi+0x8],eax ds:010eae56=???????? 
77e7277a 760e jbe WaitMessage+0x2b (77e7278a) 
77e7277c 8b11 mov edx,[ecx] ds:0009d39c=70749840 
77e7277e 40 inc eax 
77e7277f 83c104 add ecx,0x4 
77e72782 013432 add [edx+esi],esi ds:0009c450=7076ac50 
  
*----> Stack Back Trace <----* 
  
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 
00fbff2c 7076a485 000100e2 00650074 0033006d 00096f58 user32!WaitMessage 
00fbffb8 77f04f2c 00096f58 00650074 0033006d 00096f58 SHDOCVW!DllCanUnloadNow 
00fbffec 00000000 7076a449 00096f58 00000000 000000b0 kernel32!lstrcmpiW 
00000000 00000000 00000000 00000000 00000000 00000000 EXPLORER!<nosymbols> 
  
*----> Raw Stack Dump <----* 
00fbfea0 68 a6 76 70 74 00 65 00 - 6d 00 33 00 58 6f 09 00 h.vpt.e.m.3.Xo.. 
00fbfeb0 00 00 00 00 ec 11 f6 77 - 60 35 fa 77 f2 11 f6 77 .......w`5.w...w 
00fbfec0 28 59 09 00 00 00 00 00 - 58 6f 09 00 88 00 00 00 (Y......Xo...... 
00fbfed0 03 00 00 00 00 00 00 00 - 04 ff fb 00 3f d6 b3 77 ............?..w 
00fbfee0 00 00 08 00 02 00 00 00 - 04 ff fb 00 06 d6 b3 77 ...............w 
00fbfef0 14 d6 b3 77 68 5e bc 77 - 00 00 00 00 00 00 00 00 ...wh^.w........ 
00fbff00 ec 00 01 00 a3 02 00 00 - 00 00 00 00 00 00 00 00 ................ 
00fbff10 2d 3d 06 00 6f 01 00 00 - 6a 00 00 00 8d 00 00 00 -=..o...j....... 
00fbff20 50 c4 09 00 00 00 00 00 - 01 00 00 00 b8 ff fb 00 P............... 
00fbff30 85 a4 76 70 e2 00 01 00 - 74 00 65 00 6d 00 33 00 ..vp....t.e.m.3. 
00fbff40 58 6f 09 00 00 00 00 00 - 00 00 00 00 48 2a 64 80 Xo..........H*d. 
00fbff50 44 c5 9a e1 c8 c4 9a e1 - 67 a0 df 02 00 00 00 00 D.......g....... 
00fbff60 14 00 30 c0 02 cf 12 80 - 00 f0 4c 01 64 be 05 f9 ..0.......L.d... 
00fbff70 00 90 fd 7f d0 bd 05 f9 - 00 00 00 00 00 00 00 00 ................ 
00fbff80 00 00 3d 01 2b be 54 80 - a0 3a 66 80 f3 bd 54 80 ..=.+.T..:f...T. 
00fbff90 0c f6 70 80 a0 2d 71 80 - d3 f5 70 80 e0 da 14 80 ..p..-q...p..... 
00fbffa0 38 ff fb 00 01 00 00 00 - dc ff fb 00 9b 92 81 70 8..............p 
00fbffb0 90 a4 76 70 00 00 00 00 - ec ff fb 00 2c 4f f0 77 ..vp........,O.w 
00fbffc0 58 6f 09 00 74 00 65 00 - 6d 00 33 00 58 6f 09 00 Xo..t.e.m.3.Xo.. 
00fbffd0 6d 00 33 00 c4 ff fb 00 - 53 00 48 00 ff ff ff ff m.3.....S.H..... 
  
State Dump for Thread Id 0xd3 
  
eax=0000001c ebx=014bff3c ecx=014bff6c edx=00000000 esi=7ffdf000 edi=00000001 
eip=77f6819b esp=014bff18 ebp=014bff6c iopl=0 nv up ei pl nz ac pe cy 
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000213 
  
  
function: NtWaitForMultipleObjects 
77f68190 b8c4000000 mov eax,0xc4 
77f68195 8d542404 lea edx,[esp+0x4] ss:0250e91f=???????? 
77f68199 cd2e int 2e 
77f6819b c21400 ret 0x14 
77f6819e 8bc0 mov eax,eax 
  
*----> Stack Back Trace <----* 
  
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 
014bff6c 77f1c690 00000003 014bffac 00000000 ffffffff ntdll!NtWaitForMultipleObjects 
014bff88 70302215 00000003 014bffac 00000000 ffffffff kernel32!WaitForMultipleObjects 
014bffb8 77f04f2c 00000000 00000000 00770be0 00000000 WEBCHECK!DllGetClassObject 
014bffec 00000000 7030218d 00000000 00000000 00000000 kernel32!lstrcmpiW 
00000000 00000000 00000000 00000000 00000000 00000000 EXPLORER!<nosymbols> 
  
*----> Raw Stack Dump <----* 
014bff18 83 c7 f1 77 03 00 00 00 - 3c ff 4b 01 01 00 00 00 ...w....<.K..... 
014bff28 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 10 00 ................ 
014bff38 01 00 00 00 60 00 00 00 - 1c 01 00 00 34 01 00 00 ....`.......4... 
014bff48 58 ff 4b 01 80 00 00 00 - 00 00 00 00 00 00 00 00 X.K............. 
014bff58 1e 00 20 00 00 8c fd 7f - 1c 01 00 00 00 00 00 00 .. ............. 
014bff68 00 00 00 00 88 ff 4b 01 - 90 c6 f1 77 03 00 00 00 ......K....w.... 
014bff78 ac ff 4b 01 00 00 00 00 - ff ff ff ff 00 00 00 00 ..K............. 
014bff88 b8 ff 4b 01 15 22 30 70 - 03 00 00 00 ac ff 4b 01 ..K.."0p......K. 
014bff98 00 00 00 00 ff ff ff ff - 00 00 00 00 e0 0b 77 00 ..............w. 
014bffa8 00 00 00 00 60 00 00 00 - 1c 01 00 00 34 01 00 00 ....`.......4... 
014bffb8 ec ff 4b 01 2c 4f f0 77 - 00 00 00 00 00 00 00 00 ..K.,O.w........ 
014bffc8 e0 0b 77 00 00 00 00 00 - e0 0b 77 00 c4 ff 4b 01 ..w.......w...K. 
014bffd8 98 01 00 00 ff ff ff ff - 48 b0 f3 77 00 d2 f3 77 ........H..w...w 
014bffe8 00 00 00 00 00 00 00 00 - 00 00 00 00 8d 21 30 70 .............!0p 
014bfff8 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
014c0008 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
014c0018 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
014c0028 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
014c0038 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
014c0048 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
  
State Dump for Thread Id 0xd6 
  
eax=00000000 ebx=00000000 ecx=70783c61 edx=00000000 esi=00000000 edi=0161fe80 
eip=77e724e7 esp=0161fe40 ebp=0161fe64 iopl=0 nv up ei pl zr na po nc 
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246 
  
  
function: InvalidateRect 
77e724ce b893110000 mov eax,0x1193 
77e724d3 8d542404 lea edx,[esp+0x4] ss:0266e847=???????? 
77e724d7 cd2e int 2e 
77e724d9 c20c00 ret 0xc 
77e724dc b87c110000 mov eax,0x117c 
77e724e1 8d542404 lea edx,[esp+0x4] ss:0266e847=???????? 
77e724e5 cd2e int 2e 
77e724e7 c21400 ret 0x14 
77e724ea 55 push ebp 
77e724eb 8bec mov ebp,esp 
77e724ed 83ec0c sub esp,0xc 
77e724f0 53 push ebx 
77e724f1 56 push esi 
77e724f2 57 push edi 
77e724f3 8b7508 mov esi,[ebp+0x8] ss:0266e86a=???????? 
77e724f6 c745f814000000 mov dword ptr [ebp-0x8],0x14 ss:0266e86a=???????? 
77e724fd 8d7e14 lea edi,[esi+0x14] ds:0104ea06=???????? 
77e72500 8b4e04 mov ecx,[esi+0x4] ds:0104ea06=???????? 
77e72503 897dfc mov [ebp-0x4],edi ss:0266e86a=???????? 
  
*----> Stack Back Trace <----* 
  
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 
0161fe64 707fd7ce 0161fe80 00000000 00000000 00000000 user32!InvalidateRect 
0161fe9c 7079e580 0006dcf0 00000000 000a70f8 00000000 SHDOCVW!<nosymbols> 
0161ff2c 7076a485 0002012e 0006dcf0 00000000 000a70f8 SHDOCVW!SetQueryNetSessionCount 
0161ffb8 77f04f2c 000a70f8 0006dcf0 00000000 000a70f8 SHDOCVW!DllCanUnloadNow 
0161ffec 00000000 7076a449 000a70f8 00000000 016207d0 kernel32!lstrcmpiW 
00000000 00000000 00000000 00000000 00000000 00000000 EXPLORER!<nosymbols> 
  
*----> Raw Stack Dump <----* 
0161fe40 18 26 e7 77 80 fe 61 01 - 00 00 00 00 00 00 00 00 .&.w..a......... 
0161fe50 00 00 00 00 60 fe 61 01 - 00 00 00 00 00 00 00 00 ....`.a......... 
0161fe60 00 00 00 00 9c fe 61 01 - ce d7 7f 70 80 fe 61 01 ......a....p..a. 
0161fe70 00 00 00 00 00 00 00 00 - 00 00 00 00 c0 9c 0a 00 ................ 
0161fe80 56 01 01 00 0c 04 00 00 - 00 00 00 00 40 01 1a 00 V...........@... 
0161fe90 b3 3b 05 00 76 00 00 00 - c2 00 00 00 2c ff 61 01 .;..v.......,.a. 
0161fea0 80 e5 79 70 f0 dc 06 00 - 00 00 00 00 f8 70 0a 00 ..yp.........p.. 
0161feb0 00 00 00 00 ec 11 f6 77 - 60 35 fa 77 f2 11 f6 77 .......w`5.w...w 
0161fec0 48 6f 0a 00 00 00 00 00 - f8 70 0a 00 88 00 00 00 Ho.......p...... 
0161fed0 05 00 00 00 00 00 00 00 - 04 ff 61 01 3f d6 b3 77 ..........a.?..w 
0161fee0 00 00 08 00 02 00 00 00 - 04 ff 61 01 06 d6 b3 77 ..........a....w 
0161fef0 14 d6 b3 77 68 5e bc 77 - 00 00 00 00 00 00 00 00 ...wh^.w........ 
0161ff00 00 00 00 00 12 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0161ff10 2e 27 02 00 a1 00 00 00 - 0b 00 00 00 d6 00 00 00 .'.............. 
0161ff20 c0 9c 0a 00 00 00 00 00 - 0a 00 00 00 b8 ff 61 01 ..............a. 
0161ff30 85 a4 76 70 2e 01 02 00 - f0 dc 06 00 00 00 00 00 ..vp............ 
0161ff40 f8 70 0a 00 00 00 00 00 - 00 00 00 00 00 00 00 00 .p.............. 
0161ff50 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0161ff60 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0161ff70 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
  
State Dump for Thread Id 0xd5 
  
eax=00000070 ebx=00000000 ecx=0169ffa8 edx=00000000 esi=0009b3c0 edi=00000000 
eip=77e7276a esp=0169fea0 ebp=0169ff2c iopl=0 nv up ei pl nz na pe nc 
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202 
  
  
function: WaitMessage 
77e7275f b802120000 mov eax,0x1202 
77e72764 8d542404 lea edx,[esp+0x4] ss:026ee8a7=???????? 
77e72768 cd2e int 2e 
77e7276a c3 ret 
77e7276b 56 push esi 
77e7276c 33c0 xor eax,eax 
77e7276e 8b742408 mov esi,[esp+0x8] ss:026ee8a7=???????? 
77e72772 8b4e10 mov ecx,[esi+0x10] ds:010e9dc6=???????? 
77e72775 03ce add ecx,esi 
77e72777 394608 cmp [esi+0x8],eax ds:010e9dc6=???????? 
77e7277a 760e jbe WaitMessage+0x2b (77e7278a) 
77e7277c 8b11 mov edx,[ecx] ds:0169ffa8=0169ffdc 
77e7277e 40 inc eax 
77e7277f 83c104 add ecx,0x4 
77e72782 013432 add [edx+esi],esi ds:0009b3c0=70781a80 
  
*----> Stack Back Trace <----* 
  
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 
0169ff2c 7076a485 001a0140 0006dd6c 77f64b1c 000b8690 user32!WaitMessage 
0169ffb8 77f04f2c 000b8690 0006dd6c 77f64b1c 000b8690 SHDOCVW!DllCanUnloadNow 
0169ffec 00000000 00000000 00000000 00000000 00000000 kernel32!lstrcmpiW 
00000000 00000000 00000000 00000000 00000000 00000000 EXPLORER!<nosymbols> 
  
State Dump for Thread Id 0x86 
  
eax=00000001 ebx=00467b60 ecx=000000c1 edx=0000002b esi=000b3f40 edi=0001023a 
eip=005c0033 esp=021ff900 ebp=00740061 iopl=0 nv up ei pl zr na po nc 
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246 
  
  
function: <nosymbols> 
  
*----> Stack Back Trace <----* 
  
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 
021ff8fc 00740070 00720075 005c0065 00720033 00500064 <nosymbols> 
  
*----> Raw Stack Dump <----* 
021ff900 70 00 74 00 75 00 72 00 - 65 00 5c 00 33 00 72 00 p.t.u.r.e.\.3.r. 
021ff910 64 00 50 00 61 00 72 00 - 74 00 79 00 5c 00 56 00 d.P.a.r.t.y.\.V. 
021ff920 69 00 73 00 69 00 6f 00 - 6e 00 65 00 72 00 5c 00 i.s.i.o.n.e.r.\. 
021ff930 2a 00 00 00 46 00 4c 00 - 49 00 4e 00 4b 00 2e 00 *...F.L.I.N.K... 
021ff940 47 00 4c 00 4b 00 00 00 - 14 7c 46 00 4e 00 00 00 G.L.K....|F.N... 
021ff950 60 7b 46 00 02 00 00 00 - 9c fb 1f 02 f8 6c 46 00 `{F..........lF. 
021ff960 4f 00 4b 00 00 00 00 00 - b4 f9 1f 02 b4 f9 1f 02 O.K............. 
021ff970 99 10 e8 77 3a 02 01 00 - 4e 00 00 00 00 00 00 00 ...w:...N....... 
021ff980 d8 fa 1f 02 4e 00 00 00 - 60 7b 46 00 40 00 00 00 ....N...`{F.@... 
021ff990 b8 af 45 00 02 00 00 00 - dc fb 1f 02 f8 6c 46 00 ..E..........lF. 
021ff9a0 4f 00 4b 00 00 00 1f 02 - 0c 00 00 00 3a 02 01 00 O.K.........:... 
021ff9b0 00 00 00 00 e4 f9 1f 02 - 88 1f e7 77 60 7b 46 00 ...........w`{F. 
021ff9c0 4e 00 00 00 00 00 00 00 - d8 fa 1f 02 00 00 00 00 N............... 
021ff9d0 00 00 00 00 4e 00 00 00 - d8 fa 1f 02 00 00 00 00 ....N........... 
021ff9e0 2a 10 e8 77 04 fa 1f 02 - 97 30 e7 77 60 7b 46 00 *..w.....0.w`{F. 
021ff9f0 4e 00 00 00 00 00 00 00 - d8 fa 1f 02 00 00 00 00 N............... 
021ffa00 a4 fa 1f 02 88 fa 1f 02 - 3f 16 ff 70 3a 02 01 00 ........?..p:... 
021ffa10 4e 00 00 00 00 00 00 00 - d8 fa 1f 02 2e 02 01 00 N............... 
021ffa20 3a 02 01 00 38 02 01 00 - 64 fa 1f 02 7a 78 e7 77 :...8...d...zx.w 
021ffa30 a0 7a 46 00 60 fa 1f 02 - 3b 1e e7 77 38 02 01 00 .zF.`...;..w8... 
  
  
Application exception occurred: 
App: EXPLORER.dbg (pid=194) 
When: 1/4/1998 @ 18:37:37.862 
Exception number: c0000005 (access violation) 
  
*----> System Information <----* 
Computer Name: MHS_PENTIUM 
User Name: JSG 
Number of Processors: 1 
Processor Type: x86 Family 5 Model 2 Stepping 12 
Windows Version: 4.0 
Current Build: 1381 
Current Type: Uniprocessor Free 
Registered Organization: Mt. Hood Software 
Registered Owner: James S. Gibbons 
  
*----> Task List <----* 
0 Idle.exe 
2 System.exe 
20 smss.exe 
28 csrss.exe 
34 WINLOGON.exe 
42 SERVICES.exe 
45 LSASS.exe 
69 SPOOLSS.exe 
78 AWHOST32.exe 
87 mgasc.exe 
90 mgactrl.exe 
92 navapsvc.exe 
108 NPSSVC.exe 
117 RPCSS.exe 
121 TAPISRV.exe 
136 wfxsvc.exe 
44 RASMAN.exe 
143 wfxmod32.exe 
152 PSTORES.exe 
172 alertsvc.exe 
146 NDDEAGNT.exe 
194 explorer.exe 
48 systray.exe 
192 mgaqdesk.exe 
200 mgahook.exe 
205 navapw32.exe 
105 DISTASST.exe 
174 wfxsnt40.exe 
209 wfxctl32.exe 
189 Clone_Dir.exe 
236 DRWTSN32.exe 
0 _Total.exe 
  
(00400000 - 0042e000) EXPLORER.dbg 
(77f60000 - 77fbc000) dll\ntdll.dbg 
(77dc0000 - 77dfe000) dll\advapi32.dbg 
(77f00000 - 77f5e000) dll\kernel32.dbg 
(77e70000 - 77ec4000) dll\user32.dbg 
(77ed0000 - 77efc000) dll\gdi32.dbg 
(77e10000 - 77e62000) dll\rpcrt4.dbg 
(71080000 - 710a3000) SHLWAPI.dbg 
(70ff0000 - 71063000) COMCTL32.dbg 
(70930000 - 70ad6000) SHELL32.dbg 
(70740000 - 70917000) SHDOCVW.dbg 
(5f810000 - 5f817000) dll\rpcltc1.dbg 
(77b20000 - 77bd2000) dll\ole32.dbg 
(77a40000 - 77a4c000) dll\ntshrui.dbg 
(78000000 - 78000000) 
(77800000 - 7783a000) dll\netapi32.dbg 
(77840000 - 77849000) dll\NetRap.dbg 
(777e0000 - 777ed000) dll\samlib.dbg 
(06510000 - 06510000) 
(10000000 - 10000000) 
(70300000 - 70358000) WEBCHECK.dbg 
(77780000 - 77786000) dll\msidle.dbg 
(70270000 - 702ec000) URLMON.dbg 
(65340000 - 653bc000) oleaut32.dbg 
(779b0000 - 779b9000) dll\linkinfo.dbg 
(77720000 - 77731000) dll\mpr.dbg 
(777f0000 - 777fc000) dll\ntlanman.dbg 
(77890000 - 778a3000) dll\netui0.dbg 
(77850000 - 7788a000) dll\netui1.dbg 
(01bd0000 - 01bd0000) 
(5f3e0000 - 5f3e0000) 
(01bf0000 - 01bf0000) 
(77a90000 - 77a9b000) dll\version.dbg 
(779c0000 - 779c8000) dll\lz32.dbg 
(76df0000 - 76df8000) dll\fmifs.dbg 
(74920000 - 74943000) dll\ulib.dbg 
(76ae0000 - 76b05000) dll\ifsutil.dbg 
(020f0000 - 020f0000) 
(778f0000 - 77919000) dll\syncui.dbg 
(76f00000 - 76f08000) dll\diskcopy.dbg 
(778e0000 - 778e9000) dll\shcompui.dbg 
(74f80000 - 74f87000) dll\rshx32.dbg 
  
State Dump for Thread Id 0xc1 
  
eax=00000578 ebx=00000001 ecx=000b018a edx=00000000 esi=00000000 edi=00000000 
eip=77e7276a esp=0006fc9c ebp=0006fcb8 iopl=0 nv up ei pl zr na po nc 
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246 
  
  
function: WaitMessage 
77e7275f b802120000 mov eax,0x1202 
77e72764 8d542404 lea edx,[esp+0x4] ss:010be6a3=???????? 
77e72768 cd2e int 2e 
77e7276a c3 ret 
77e7276b 56 push esi 
77e7276c 33c0 xor eax,eax 
77e7276e 8b742408 mov esi,[esp+0x8] ss:010be6a3=???????? 
77e72772 8b4e10 mov ecx,[esi+0x10] ds:0104ea06=???????? 
77e72775 03ce add ecx,esi 
77e72777 394608 cmp [esi+0x8],eax ds:0104ea06=???????? 
77e7277a 760e jbe WaitMessage+0x2b (77e7278a) 
77e7277c 8b11 mov edx,[ecx] ds:000b018a=00000000 
77e7277e 40 inc eax 
77e7277f 83c104 add ecx,0x4 
77e72782 013432 add [edx+esi],esi ds:00000000=???????? 
  
*----> Stack Back Trace <----* 
  
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 
0006fcb8 70755a01 00000000 004074e6 00091f00 00403e50 user32!WaitMessage 
0006ff60 00403b91 000000c2 00000000 000205e4 0000000a SHDOCVW!Ordinal120 
0006ffc0 77f1b304 00000000 000000b4 7ffdf000 7ffdf000 EXPLORER!<nosymbols> 
0006fff0 00000000 00403b18 00000000 00000000 77fa5aa0 kernel32!GetProcessPriorityBoost 
00000000 00000000 00000000 00000000 00000000 00000000 EXPLORER!<nosymbols> 
  
*----> Raw Stack Dump <----* 
0006fc9c 40 5f 75 70 00 00 00 00 - 00 00 00 00 01 00 00 00 @_up............ 
0006fcac d6 c7 f1 77 00 1f 09 00 - 00 00 00 00 60 ff 06 00 ...w........`... 
0006fcbc 01 5a 75 70 00 00 00 00 - e6 74 40 00 00 1f 09 00 .Zup.....t@..... 
0006fccc 50 3e 40 00 00 1f 09 00 - 00 00 00 00 e4 05 02 00 P>@............. 
0006fcdc 00 f0 fd 7f 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0006fcec 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0006fcfc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0006fd0c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0006fd1c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0006fd2c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0006fd3c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0006fd4c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0006fd5c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0006fd6c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0006fd7c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0006fd8c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0006fd9c 00 00 00 00 b5 01 01 00 - 3f 00 3f 00 3f 00 3f 00 ........?.?.?.?. 
0006fdac 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0006fdbc 1c 10 fc 7f 22 14 fc 7f - 1e 14 fc 7f 00 00 00 00 ...."........... 
0006fdcc e4 04 01 00 3f 00 3f 00 - 3f 00 3f 00 00 00 00 00 ....?.?.?.?..... 
  
State Dump for Thread Id 0xc9 
  
eax=00000000 ebx=00094c38 ecx=000890d0 edx=00000000 esi=00000000 edi=0008d390 
eip=77f67e77 esp=009efe44 ebp=009eff90 iopl=0 nv up ei pl nz na pe nc 
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000202 
  
  
function: NtReplyWaitReceivePort 
77f67e6c b890000000 mov eax,0x90 
77f67e71 8d542404 lea edx,[esp+0x4] ss:01a3e84b=???????? 
77f67e75 cd2e int 2e 
77f67e77 c21000 ret 0x10 
77f67e7a 8bc0 mov eax,eax 
  
*----> Stack Back Trace <----* 
  
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 
009eff90 77e162f0 77e163e5 0008d390 009effec 77bbd7f8 ntdll!NtReplyWaitReceivePort 
00003a98 00000000 00000000 00000000 00000000 00000000 rpcrt4!NdrOleAllocate 
  
State Dump for Thread Id 0xca 
  
eax=00000000 ebx=00406ec0 ecx=004697a8 edx=00000000 esi=0006fc94 edi=00400000 
eip=77e7276a esp=00a2ff80 ebp=00a2ffa0 iopl=0 nv up ei pl zr na po nc 
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246 
  
  
function: WaitMessage 
77e7275f b802120000 mov eax,0x1202 
77e72764 8d542404 lea edx,[esp+0x4] ss:01a7e987=???????? 
77e72768 cd2e int 2e 
77e7276a c3 ret 
77e7276b 56 push esi 
77e7276c 33c0 xor eax,eax 
77e7276e 8b742408 mov esi,[esp+0x8] ss:01a7e987=???????? 
77e72772 8b4e10 mov ecx,[esi+0x10] ds:010be69a=???????? 
77e72775 03ce add ecx,esi 
77e72777 394608 cmp [esi+0x8],eax ds:010be69a=???????? 
77e7277a 760e jbe WaitMessage+0x2b (77e7278a) 
77e7277c 8b11 mov edx,[ecx] ds:004697a8=00020284 
77e7277e 40 inc eax 
77e7277f 83c104 add ecx,0x4 
77e72782 013432 add [edx+esi],esi ds:0006fc94=000000e5 
  
*----> Stack Back Trace <----* 
  
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 
00a2ffa0 00406ed2 71087e51 00400000 77bbcb60 0006fbbc user32!WaitMessage 
00a2ffec 00000000 71087e35 0006fc94 00000000 00000000 EXPLORER!<nosymbols> 
00000000 00000000 00000000 00000000 00000000 00000000 EXPLORER!<nosymbols> 
  
*----> Raw Stack Dump <----* 
00a2ff80 6f 6f 40 00 c0 00 01 00 - 2b c0 00 00 04 00 00 00 oo@.....+....... 
00a2ff90 84 02 02 00 3a 8a 30 00 - 32 01 00 00 20 02 00 00 ....:.0.2... ... 
00a2ffa0 ec ff a2 00 d2 6e 40 00 - 51 7e 08 71 00 00 40 00 .....n@.Q~.q..@. 
00a2ffb0 60 cb bb 77 bc fb 06 00 - 94 fc 06 00 2c 4f f0 77 `..w........,O.w 
00a2ffc0 94 fc 06 00 60 cb bb 77 - bc fb 06 00 94 fc 06 00 ....`..w........ 
00a2ffd0 bc fb 06 00 c4 ff a2 00 - 14 00 00 00 ff ff ff ff ................ 
00a2ffe0 48 b0 f3 77 00 d2 f3 77 - 00 00 00 00 00 00 00 00 H..w...w........ 
00a2fff0 00 00 00 00 35 7e 08 71 - 94 fc 06 00 00 00 00 00 ....5~.q........ 
00a30000 00 00 00 00 9f 00 01 00 - 10 00 90 01 17 00 b0 01 ................ 
00a30010 ff ff ff 00 ff ff ff 00 - 00 00 00 00 00 00 00 00 ................ 
00a30020 00 00 00 00 01 00 00 00 - 0d 02 01 01 00 00 00 00 ................ 
00a30030 00 00 00 00 00 00 00 00 - 00 00 00 00 02 00 00 00 ................ 
00a30040 01 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
00a30050 00 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
00a30060 07 00 8a 01 00 00 00 40 - 06 00 00 00 00 00 00 00 .......@........ 
00a30070 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 40 ...............@ 
00a30080 06 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
00a30090 00 00 00 00 00 00 00 00 - 00 00 00 00 4b 00 00 00 ............K... 
00a300a0 00 00 00 40 fe ff ff ff - 00 00 00 00 00 00 00 00 ...@............ 
00a300b0 00 00 00 00 00 00 00 00 - 00 00 00 40 fe ff ff ff ...........@.... 
  
State Dump for Thread Id 0xcb 
  
eax=02780004 ebx=00a8fdc0 ecx=00002000 edx=00000000 esi=7ffdf000 edi=00000001 
eip=77f6819b esp=00a8fd9c ebp=00a8fdf0 iopl=0 nv up ei pl nz ac pe cy 
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000213 
  
  
function: NtWaitForMultipleObjects 
77f68190 b8c4000000 mov eax,0xc4 
77f68195 8d542404 lea edx,[esp+0x4] ss:01ade7a3=???????? 
77f68199 cd2e int 2e 
77f6819b c21400 ret 0x14 
77f6819e 8bc0 mov eax,eax 
  
*----> Stack Back Trace <----* 
  
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 
00a8fdf0 77e7a670 00000006 00a8fe18 00000000 0008bf61 ntdll!NtWaitForMultipleObjects 
00a8fe4c 77e7a6bc 00000005 00a8febc 0008bf61 000000ff user32!MsgWaitForMultipleObjectsEx 
00a8fe68 7093b594 00000005 00a8febc 00000000 0008bf61 user32!MsgWaitForMultipleObjects 
000000cb 00000000 00000000 00000000 00000000 00000000 SHELL32!Ordinal36 
  
*----> Raw Stack Dump <----* 
00a8fd9c 83 c7 f1 77 06 00 00 00 - c0 fd a8 00 01 00 00 00 ...w............ 
00a8fdac 00 00 00 00 e0 fd a8 00 - 2c fe a8 00 00 00 00 00 ........,....... 
00a8fdbc 18 fe a8 00 a4 00 00 00 - ac 00 00 00 c8 00 00 00 ................ 
00a8fdcc ec 00 00 00 48 01 00 00 - 9c 00 00 00 00 00 00 00 ....H........... 
00a8fddc 00 00 00 00 f0 42 4c aa - fe ff ff ff 00 00 00 00 .....BL......... 
00a8fdec e0 fd a8 00 4c fe a8 00 - 70 a6 e7 77 06 00 00 00 ....L...p..w.... 
00a8fdfc 18 fe a8 00 00 00 00 00 - 61 bf 08 00 00 00 00 00 ........a....... 
00a8fe0c 05 00 00 00 a0 56 e7 77 - 00 00 00 00 a4 00 00 00 .....V.w........ 
00a8fe1c ac 00 00 00 c8 00 00 00 - ec 00 00 00 48 01 00 00 ............H... 
00a8fe2c 9c 00 00 00 05 00 00 00 - 02 01 00 00 c0 27 09 00 .............'.. 
00a8fe3c 00 00 00 00 00 00 00 00 - 44 b0 fd 7f 9c 00 00 00 ........D....... 
00a8fe4c 68 fe a8 00 bc a6 e7 77 - 05 00 00 00 bc fe a8 00 h......w........ 
00a8fe5c 61 bf 08 00 ff 00 00 00 - 00 00 00 00 cb 00 00 00 a............... 
00a8fe6c 94 b5 93 70 05 00 00 00 - bc fe a8 00 00 00 00 00 ...p............ 
00a8fe7c 61 bf 08 00 ff 00 00 00 - 20 00 00 00 d2 01 e5 77 a....... ......w 
00a8fe8c ec ff a8 00 00 00 00 00 - 00 00 00 00 a0 00 00 00 ................ 
00a8fe9c cb 00 00 00 00 00 00 00 - 00 04 00 00 00 00 00 00 ................ 
00a8feac 00 00 00 00 49 79 30 00 - db 01 00 00 32 01 00 00 ....Iy0.....2... 
00a8febc a4 00 00 00 ac 00 00 00 - c8 00 00 00 ec 00 00 00 ................ 
00a8fecc 48 01 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 H............... 
  
State Dump for Thread Id 0xd3 
  
eax=0000001c ebx=0147ff3c ecx=0147ff6c edx=00000000 esi=7ffdf000 edi=00000001 
eip=77f6819b esp=0147ff18 ebp=0147ff6c iopl=0 nv up ei pl nz ac pe cy 
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000213 
  
  
function: NtWaitForMultipleObjects 
77f68190 b8c4000000 mov eax,0xc4 
77f68195 8d542404 lea edx,[esp+0x4] ss:024ce91f=???????? 
77f68199 cd2e int 2e 
77f6819b c21400 ret 0x14 
77f6819e 8bc0 mov eax,eax 
  
*----> Stack Back Trace <----* 
  
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 
0147ff6c 77f1c690 00000003 0147ffac 00000000 ffffffff ntdll!NtWaitForMultipleObjects 
0147ff88 70302215 00000003 0147ffac 00000000 ffffffff kernel32!WaitForMultipleObjects 
0147ffb8 77f04f2c 00000000 00000000 00770b02 00000000 WEBCHECK!DllGetClassObject 
0147ffec 00000000 7030218d 00000000 00000000 000000b0 kernel32!lstrcmpiW 
00000000 00000000 00000000 00000000 00000000 00000000 EXPLORER!<nosymbols> 
  
*----> Raw Stack Dump <----* 
0147ff18 83 c7 f1 77 03 00 00 00 - 3c ff 47 01 01 00 00 00 ...w....<.G..... 
0147ff28 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 10 00 ................ 
0147ff38 01 00 00 00 2c 01 00 00 - 04 01 00 00 20 01 00 00 ....,....... ... 
0147ff48 58 ff 47 01 80 00 00 00 - 00 00 00 00 00 00 00 00 X.G............. 
0147ff58 1e 00 20 00 00 9c fd 7f - 04 01 00 00 00 00 00 00 .. ............. 
0147ff68 00 00 00 00 88 ff 47 01 - 90 c6 f1 77 03 00 00 00 ......G....w.... 
0147ff78 ac ff 47 01 00 00 00 00 - ff ff ff ff 00 00 00 00 ..G............. 
0147ff88 b8 ff 47 01 15 22 30 70 - 03 00 00 00 ac ff 47 01 ..G.."0p......G. 
0147ff98 00 00 00 00 ff ff ff ff - 00 00 00 00 02 0b 77 00 ..............w. 
0147ffa8 00 00 00 00 2c 01 00 00 - 04 01 00 00 20 01 00 00 ....,....... ... 
0147ffb8 ec ff 47 01 2c 4f f0 77 - 00 00 00 00 00 00 00 00 ..G.,O.w........ 
0147ffc8 02 0b 77 00 00 00 00 00 - 02 0b 77 00 c4 ff 47 01 ..w.......w...G. 
0147ffd8 11 00 00 00 ff ff ff ff - 48 b0 f3 77 00 d2 f3 77 ........H..w...w 
0147ffe8 00 00 00 00 00 00 00 00 - 00 00 00 00 8d 21 30 70 .............!0p 
0147fff8 00 00 00 00 00 00 00 00 - b0 00 00 00 00 01 00 00 ................ 
01480008 ff ee ff ee 02 10 00 00 - 00 00 00 00 00 fe 00 00 ................ 
01480018 00 00 10 00 00 20 00 00 - 00 02 00 00 00 20 00 00 ..... ....... .. 
01480028 49 01 00 00 ff ef fd 7f - 07 00 48 05 00 00 00 00 I.........H..... 
01480038 00 00 00 00 00 00 00 00 - 00 00 00 00 d8 04 48 01 ..............H. 
01480048 0f 00 00 00 f8 ff ff ff - 50 00 48 01 50 00 48 01 ........P.H.P.H. 
  
State Dump for Thread Id 0xe6 
  
eax=00000000 ebx=00000000 ecx=014cffa8 edx=00000000 esi=0009f000 edi=00000000 
eip=77e7276a esp=014cfea0 ebp=014cff2c iopl=0 nv up ei pl nz na pe nc 
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000202 
  
  
function: WaitMessage 
77e7275f b802120000 mov eax,0x1202 
77e72764 8d542404 lea edx,[esp+0x4] ss:0251e8a7=???????? 
77e72768 cd2e int 2e 
77e7276a c3 ret 
77e7276b 56 push esi 
77e7276c 33c0 xor eax,eax 
77e7276e 8b742408 mov esi,[esp+0x8] ss:0251e8a7=???????? 
77e72772 8b4e10 mov ecx,[esi+0x10] ds:010eda06=???????? 
77e72775 03ce add ecx,esi 
77e72777 394608 cmp [esi+0x8],eax ds:010eda06=???????? 
77e7277a 760e jbe WaitMessage+0x2b (77e7278a) 
77e7277c 8b11 mov edx,[ecx] ds:014cffa8=014cffdc 
77e7277e 40 inc eax 
77e7277f 83c104 add ecx,0x4 
77e72782 013432 add [edx+esi],esi ds:0009f000=7076ac50 
  
*----> Stack Back Trace <----* 
  
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 
014cff2c 7076a485 0001014c 00000000 00000000 0009c278 user32!WaitMessage 
014cffb8 77f04f2c 0009c278 00000000 00000000 0009c278 SHDOCVW!DllCanUnloadNow 
014cffec 00000000 7076a449 0009c278 00000000 00000000 kernel32!lstrcmpiW 
00000000 00000000 00000000 00000000 00000000 00000000 EXPLORER!<nosymbols> 
  
*----> Raw Stack Dump <----* 
014cfea0 68 a6 76 70 00 00 00 00 - 00 00 00 00 78 c2 09 00 h.vp........x... 
014cfeb0 00 00 00 00 ec 11 f6 77 - 60 35 fa 77 f2 11 f6 77 .......w`5.w...w 
014cfec0 50 56 09 00 00 00 00 00 - 78 c2 09 00 88 00 00 00 PV......x....... 
014cfed0 01 00 00 00 00 00 00 00 - 04 ff 4c 01 3f d6 b3 77 ..........L.?..w 
014cfee0 00 00 08 00 02 00 00 00 - 04 ff 4c 01 06 d6 b3 77 ..........L....w 
014cfef0 14 d6 b3 77 68 5e bc 77 - 00 00 00 00 00 00 00 00 ...wh^.w........ 
014cff00 70 01 01 00 00 02 00 00 - 00 00 00 00 8c 00 a9 00 p............... 
014cff10 78 e1 2f 00 ca 01 00 00 - e5 00 00 00 e6 00 00 00 x./............. 
014cff20 00 f0 09 00 00 00 00 00 - 02 00 00 00 b8 ff 4c 01 ..............L. 
014cff30 85 a4 76 70 4c 01 01 00 - 00 00 00 00 00 00 00 00 ..vpL........... 
014cff40 78 c2 09 00 00 00 00 00 - 00 00 00 00 e8 50 64 80 x............Pd. 
014cff50 f8 ad 00 fe 46 02 00 00 - 67 e0 bd 02 00 00 00 00 ....F...g....... 
014cff60 18 00 30 c0 02 cf 12 80 - 00 f0 8a 01 64 ae 00 fe ..0.........d... 
014cff70 00 d0 fa 7f d0 ad 00 fe - 00 00 00 00 00 00 00 00 ................ 
014cff80 00 00 7b 01 cb cb 52 80 - c0 8a 66 80 93 cb 52 80 ..{...R...f...R. 
014cff90 00 b1 66 80 b2 5b 11 80 - cc cb 52 80 30 b1 66 80 ..f..[....R.0.f. 
014cffa0 38 ff 4c 01 01 01 00 00 - dc ff 4c 01 9b 92 81 70 8.L.......L....p 
014cffb0 90 a4 76 70 00 00 00 00 - ec ff 4c 01 2c 4f f0 77 ..vp......L.,O.w 
014cffc0 78 c2 09 00 00 00 00 00 - 00 00 00 00 78 c2 09 00 x...........x... 
014cffd0 00 00 00 00 c4 ff 4c 01 - 00 00 00 00 ff ff ff ff ......L......... 
  
State Dump for Thread Id 0xe7 
  
eax=00000000 ebx=00000000 ecx=70783c61 edx=00000000 esi=00000000 edi=0151fe80 
eip=77e724e7 esp=0151fe40 ebp=0151fe64 iopl=0 nv up ei pl zr na po nc 
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246 
  
  
function: InvalidateRect 
77e724ce b893110000 mov eax,0x1193 
77e724d3 8d542404 lea edx,[esp+0x4] ss:0256e847=???????? 
77e724d7 cd2e int 2e 
77e724d9 c20c00 ret 0xc 
77e724dc b87c110000 mov eax,0x117c 
77e724e1 8d542404 lea edx,[esp+0x4] ss:0256e847=???????? 
77e724e5 cd2e int 2e 
77e724e7 c21400 ret 0x14 
77e724ea 55 push ebp 
77e724eb 8bec mov ebp,esp 
77e724ed 83ec0c sub esp,0xc 
77e724f0 53 push ebx 
77e724f1 56 push esi 
77e724f2 57 push edi 
77e724f3 8b7508 mov esi,[ebp+0x8] ss:0256e86a=???????? 
77e724f6 c745f814000000 mov dword ptr [ebp-0x8],0x14 ss:0256e86a=???????? 
77e724fd 8d7e14 lea edi,[esi+0x14] ds:0104ea06=???????? 
77e72500 8b4e04 mov ecx,[esi+0x4] ds:0104ea06=???????? 
77e72503 897dfc mov [ebp-0x4],edi ss:0256e86a=???????? 
  
*----> Stack Back Trace <----* 
  
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 
0151fe64 707fd7ce 0151fe80 00000000 00000000 00000000 user32!InvalidateRect 
0151fe9c 7079e580 70932e1c 00000000 000a6040 00000000 SHDOCVW!<nosymbols> 
0151ff2c 7076a485 0001017a 70932e1c 00000000 000a6040 SHDOCVW!SetQueryNetSessionCount 
0151ffb8 77f04f2c 000a6040 70932e1c 00000000 000a6040 SHDOCVW!DllCanUnloadNow 
0151ffec 00000000 7076a449 000a6040 00000000 00000000 kernel32!lstrcmpiW 
00000000 00000000 00000000 00000000 00000000 00000000 EXPLORER!<nosymbols> 
  
*----> Raw Stack Dump <----* 
0151fe40 18 26 e7 77 80 fe 51 01 - 00 00 00 00 00 00 00 00 .&.w..Q......... 
0151fe50 00 00 00 00 60 fe 51 01 - 00 00 00 00 00 00 00 00 ....`.Q......... 
0151fe60 00 00 00 00 9c fe 51 01 - ce d7 7f 70 80 fe 51 01 ......Q....p..Q. 
0151fe70 00 00 00 00 00 00 00 00 - 00 00 00 00 20 61 0a 00 ............ a.. 
0151fe80 a2 01 01 00 0d 04 00 00 - 00 00 00 00 7a 01 01 00 ............z... 
0151fe90 30 81 30 00 5a 01 00 00 - 8f 01 00 00 2c ff 51 01 0.0.Z.......,.Q. 
0151fea0 80 e5 79 70 1c 2e 93 70 - 00 00 00 00 40 60 0a 00 ..yp...p....@`.. 
0151feb0 00 00 00 00 20 11 f6 77 - 60 35 fa 77 f2 11 f6 77 .... ..w`5.w...w 
0151fec0 78 90 09 00 00 00 00 00 - 40 60 0a 00 88 00 00 00 x.......@`...... 
0151fed0 05 00 00 00 00 00 00 00 - 04 ff 51 01 3f d6 b3 77 ..........Q.?..w 
0151fee0 00 00 08 00 02 00 00 00 - 04 ff 51 01 06 d6 b3 77 ..........Q....w 
0151fef0 14 d6 b3 77 68 5e bc 77 - 00 00 00 00 00 00 00 00 ...wh^.w........ 
0151ff00 00 00 00 00 12 00 00 00 - 00 00 00 00 00 00 00 00 ................ 
0151ff10 e6 88 02 00 38 02 00 00 - 1c 00 00 00 e7 00 00 00 ....8........... 
0151ff20 20 61 0a 00 00 00 00 00 - 0a 00 00 00 b8 ff 51 01 a............Q. 
0151ff30 85 a4 76 70 7a 01 01 00 - 1c 2e 93 70 00 00 00 00 ..vpz......p.... 
0151ff40 40 60 0a 00 00 00 00 00 - 00 00 00 00 e8 50 64 80 @`...........Pd. 
0151ff50 f8 ad 00 fe 46 02 00 00 - 67 e0 bd 02 00 00 00 00 ....F...g....... 
0151ff60 18 00 30 c0 02 cf 12 80 - 00 f0 8a 01 64 ae 00 fe ..0.........d... 
0151ff70 00 d0 fa 7f d0 ad 00 fe - 00 00 00 00 00 00 00 00 ................ 
  
State Dump for Thread Id 0x3b 
  
eax=00000070 ebx=00000000 ecx=0208ffa8 edx=00000000 esi=000ac108 edi=00000000 
eip=77e7276a esp=0208fea0 ebp=0208ff2c iopl=0 nv up ei pl nz na pe nc 
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202 
  
  
function: WaitMessage 
77e7275f b802120000 mov eax,0x1202 
77e72764 8d542404 lea edx,[esp+0x4] ss:030de8a7=???????? 
77e72768 cd2e int 2e 
77e7276a c3 ret 
77e7276b 56 push esi 
77e7276c 33c0 xor eax,eax 
77e7276e 8b742408 mov esi,[esp+0x8] ss:030de8a7=???????? 
77e72772 8b4e10 mov ecx,[esi+0x10] ds:010fab0e=???????? 
77e72775 03ce add ecx,esi 
77e72777 394608 cmp [esi+0x8],eax ds:010fab0e=???????? 
77e7277a 760e jbe WaitMessage+0x2b (77e7278a) 
77e7277c 8b11 mov edx,[ecx] ds:0208ffa8=0208ffdc 
77e7277e 40 inc eax 
77e7277f 83c104 add ecx,0x4 
77e72782 013432 add [edx+esi],esi ds:000ac108=70781a80 
  
*----> Stack Back Trace <----* 
  
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 
0208ff2c 7076a485 000c018a 0006dd6c 77f64b1c 000af328 user32!WaitMessage 
0208ffb8 77f04f2c 000af328 0006dd6c 77f64b1c 000af328 SHDOCVW!DllCanUnloadNow 
0208ffec 00000000 00000000 00000000 00000000 00000000 kernel32!lstrcmpiW 
00000000 00000000 00000000 00000000 00000000 00000000 EXPLORER!<nosymbols> 
  
State Dump for Thread Id 0x8a 
  
eax=00000000 ebx=020efea8 ecx=0000002e edx=00000000 esi=7ffdf000 edi=00000001 
eip=77f6819b esp=020efe84 ebp=020efed8 iopl=0 nv up ei pl nz ac pe cy 
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000213 
  
  
function: NtWaitForMultipleObjects 
77f68190 b8c4000000 mov eax,0xc4 
77f68195 8d542404 lea edx,[esp+0x4] ss:0313e88b=???????? 
77f68199 cd2e int 2e 
77f6819b c21400 ret 0x14 
77f6819e 8bc0 mov eax,eax 
  
*----> Stack Back Trace <----* 
  
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 
020efed8 77e7a670 00000001 020eff00 00000000 0000ea60 ntdll!NtWaitForMultipleObjects 
020eff34 77e7a6bc 00000000 00000000 0000ea60 000000ff user32!MsgWaitForMultipleObjectsEx 
020eff50 70953a09 00000000 00000000 00000000 0000ea60 user32!MsgWaitForMultipleObjects 
020effb8 77f04f2c 0000008a 70935e49 000aa4d8 000000d4 SHELL32!Ordinal58 
020effec 00000000 709538fc 000000d4 00000000 00905a4d kernel32!lstrcmpiW 
00000000 00000000 00000000 00000000 00000000 00000000 EXPLORER!<nosymbols> 
  
*----> Raw Stack Dump <----* 
020efe84 83 c7 f1 77 01 00 00 00 - a8 fe 0e 02 01 00 00 00 ...w............ 
020efe94 00 00 00 00 c8 fe 0e 02 - 00 00 00 00 00 00 00 00 ................ 
020efea4 00 ff 0e 02 5c 01 00 00 - 1c ff 0e 02 00 00 00 00 ....\........... 
020efeb4 ec 11 f6 77 60 35 fa 77 - f2 11 f6 77 30 ff 0e 02 ...w`5.w...w0... 
020efec4 d8 a4 0a 00 00 ba 3c dc - ff ff ff ff 00 00 00 00 ......<......... 
020efed4 c8 fe 0e 02 34 ff 0e 02 - 70 a6 e7 77 01 00 00 00 ....4...p..w.... 
020efee4 00 ff 0e 02 00 00 00 00 - 60 ea 00 00 00 00 00 00 ........`....... 
020efef4 00 00 00 00 00 00 00 00 - a0 56 e7 77 5c 01 00 00 .........V.w\... 
020eff04 c0 fe 0e 02 03 00 00 00 - 30 ff 0e 02 83 98 93 70 ........0......p 
020eff14 b8 ef 0a 00 2e 7e e7 77 - 22 02 01 00 a3 04 00 00 .....~.w"....... 
020eff24 00 00 00 00 00 00 00 00 - 44 60 fd 7f 5c 01 00 00 ........D`..\... 
020eff34 50 ff 0e 02 bc a6 e7 77 - 00 00 00 00 00 00 00 00 P......w........ 
020eff44 60 ea 00 00 ff 00 00 00 - 00 00 00 00 b8 ff 0e 02 `............... 
020eff54 09 3a 95 70 00 00 00 00 - 00 00 00 00 00 00 00 00 .:.p............ 
020eff64 60 ea 00 00 ff 00 00 00 - 49 5e 93 70 d8 a4 0a 00 `.......I^.p.... 
020eff74 d4 00 00 00 e8 da 14 80 - 0a 00 00 00 5a c6 11 80 ............Z... 
020eff84 2b fa 64 80 c0 8a 66 80 - f3 f9 64 80 0c f6 70 80 +.d...f...d...p. 
020eff94 00 00 00 00 02 05 00 00 - a8 2b 0b 00 d8 a4 0a 00 .........+...... 
020effa4 00 28 30 00 ca 01 00 00 - e5 00 00 00 8a 00 00 00 .(0............. 
020effb4 00 00 00 00 ec ff 0e 02 - 2c 4f f0 77 8a 00 00 00 ........,O.w.... 
  
State Dump for Thread Id 0xbc 
  
eax=00000001 ebx=00467110 ecx=0000007e edx=00000000 esi=000aafe8 edi=0001023a 
eip=002e0000 esp=0276f900 ebp=00440000 iopl=0 nv up ei pl zr na po nc 
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246 
  
  
function: <nosymbols> 
  
*----> Stack Back Trace <----* 
  
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 
0276f8fc 00650053 00760072 00630069 00200065 00610050 <nosymbols> 
  
*----> Raw Stack Dump <----* 
0276f900 53 00 65 00 72 00 76 00 - 69 00 63 00 65 00 20 00 S.e.r.v.i.c.e. . 
0276f910 50 00 61 00 63 00 6b 00 - 20 00 33 00 00 00 00 00 P.a.c.k. .3..... 
0276f920 80 fb 76 02 01 00 00 00 - 44 fb 76 02 10 42 e8 77 ..v.....D.v..B.w 
0276f930 a9 02 01 4f 60 62 46 00 - 02 00 00 00 80 fb 76 02 ...O`bF.......v. 
0276f940 a0 61 46 00 4f 00 4b 00 - c4 71 46 00 4e 00 00 00 .aF.O.K..qF.N... 
0276f950 10 71 46 00 02 00 00 00 - 9c fb 76 02 a0 61 46 00 .qF.......v..aF. 
0276f960 4f 00 4b 00 00 00 00 00 - b4 f9 76 02 b4 f9 76 02 O.K.......v...v. 
0276f970 99 10 e8 77 3a 02 01 00 - 4e 00 00 00 00 00 00 00 ...w:...N....... 
0276f980 d8 fa 76 02 4e 00 00 00 - 10 71 46 00 40 00 00 00 ..v.N....qF.@... 
0276f990 60 62 46 00 02 00 00 00 - dc fb 76 02 a0 61 46 00 `bF.......v..aF. 
0276f9a0 4f 00 4b 00 00 00 76 02 - 0c 00 00 00 3a 02 01 00 O.K...v.....:... 
0276f9b0 00 00 00 00 e4 f9 76 02 - 88 1f e7 77 10 71 46 00 ......v....w.qF. 
0276f9c0 4e 00 00 00 00 00 00 00 - d8 fa 76 02 00 00 00 00 N.........v..... 
0276f9d0 00 00 00 00 4e 00 00 00 - d8 fa 76 02 00 00 00 00 ....N.....v..... 
0276f9e0 2a 10 e8 77 04 fa 76 02 - 97 30 e7 77 10 71 46 00 *..w..v..0.w.qF. 
0276f9f0 4e 00 00 00 00 00 00 00 - d8 fa 76 02 00 00 00 00 N.........v..... 
0276fa00 a4 fa 76 02 88 fa 76 02 - 3f 16 ff 70 3a 02 01 00 ..v...v.?..p:... 
0276fa10 4e 00 00 00 00 00 00 00 - d8 fa 76 02 2e 02 01 00 N.........v..... 
0276fa20 3a 02 01 00 38 02 01 00 - 64 fa 76 02 7a 78 e7 77 :...8...d.v.zx.w 
0276fa30 e0 06 46 00 60 fa 76 02 - 3b 1e e7 77 38 02 01 00 ..F.`.v.;..w8...


© James S. Gibbons 1987-2015