S
stringer
Guest
Hello
We are having an issue with one user.
Using WinXP pro SP2
Roming profile
We have rebuilt PC, resetup account and remove local and network Profiles.
Every time she open a excel file Explorer shuts down.
Here is the dump file, any help would be great?
Application exception occurred:
App: C:\WINDOWS\Explorer.EXE (pid=3248)
When: 02/11/2007 @ 10:36:02.193
Exception number: c0000005 (access violation)
*----> System Information <----*
Computer Name: ************
User Name: ccrow
Terminal Session Id: 0
Number of Processors: 2
Processor Type: x86 Family 15 Model 4 Stepping 3
Windows Version: 5.1
Current Build: 2600
Service Pack: 2
Current Type: Multiprocessor Free
Registered Organization: ***********
Registered Owner: ***********
*----> Task List <----*
0 System Process
4 Error 0xD0000022
372 Error 0xD0000022
420 Error 0xD0000022
444 Error 0xD0000022
488 Error 0xD0000022
500 Error 0xD0000022
672 Error 0xD0000022
720 Error 0xD0000022
788 Error 0xD0000022
960 Error 0xD0000022
1016 Error 0xD0000022
1128 Error 0xD0000022
1324 Error 0xD0000022
1412 Error 0xD0000022
1436 Error 0xD0000022
1492 Error 0xD0000022
1552 Error 0xD0000022
1572 Error 0xD0000022
1700 Error 0xD0000022
1776 Error 0xD0000022
1856 Error 0xD0000022
396 Error 0xD0000022
880 Error 0xD0000022
1488 Error 0xD0000022
2096 Error 0xD0000022
3248 Explorer.EXE
3604 iexplore.exe
3856 hkcmd.exe
3900 igfxpers.exe
3972 SHSTAT.EXE
492 NWTRAY.EXE
176 agentView.exe
320 ctfmon.exe
364 Merlin_Alerts.exe
908 UdaterUI.exe
1800 McTray.exe
2700 winresa.exe
2784 iexplore.exe
1716 iexplore.exe
932 TOMSDesktop.exe
4064 wfcrun32.exe
4032 WFICA32.EXE
2584 OUTLOOK.EXE
2724 WINWORD.EXE
2172 achiever.exe
2504 AchieverCS.exe
3240 EXCEL.EXE
3792 iexplore.exe
344 dwwin.exe
660 drwtsn32.exe
*----> Module List <----*
(0000000000c20000 - 0000000000c31000: C:\WINDOWS\IME\SPGRMR.DLL
(0000000000f50000 - 0000000000f6d000:
C:\WINDOWS\system32\NLS\ENGLISH\NWSHLXNR.DLL
(0000000001000000 - 00000000010ff000: C:\WINDOWS\Explorer.EXE
(0000000001b10000 - 0000000001b98000: C:\WINDOWS\System32\shdoclc.dll
(0000000002080000 - 000000000208f000: C:\Program
Files\Etalk\AutoQuality\SAHooks.dll
(0000000002bc0000 - 0000000002bd2000: C:\WINDOWS\system32\browselc.dll
(0000000002ca0000 - 0000000002cae000: C:\Program Files\Adobe\Acrobat
7.0\ActiveX\AcroIEHelper.dll
(0000000003440000 - 000000000345c000: C:\Program Files\Adobe\Acrobat
7.0\ActiveX\PDFShell.dll
(000000000a000000 - 000000000a012000: C:\WINDOWS\system32\EntApi.dll
(000000000ffd0000 - 000000000fff8000: C:\WINDOWS\system32\rsaenh.dll
(0000000010000000 - 000000001005b000: C:\Program Files\Common
Files\Microsoft Shared\Ink\SKCHUI.DLL
(0000000020000000 - 00000000202c5000: C:\WINDOWS\system32\xpsp2res.dll
(0000000032520000 - 0000000032532000: C:\Program Files\Microsoft
Office\Office10\msohev.dll
(000000004ec50000 - 000000004edf3000:
C:\WINDOWS\WinSxS\x86_Microsoft.Windows.GdiPlus_6595b64144ccf1df_1.0.2600.2180_x-ww_522f9f82\gdiplus.dll
(0000000050d00000 - 0000000050d15000: C:\WINDOWS\system32\CLNWIN32.DLL
(0000000050d20000 - 0000000050d4b000: C:\WINDOWS\system32\CALWIN32.DLL
(0000000050d50000 - 0000000050d97000: C:\WINDOWS\system32\NETWIN32.DLL
(0000000050da0000 - 0000000050dab000: C:\WINDOWS\system32\CLXWIN32.DLL
(0000000050db0000 - 0000000050ddb000: C:\WINDOWS\system32\NCPWIN32.dll
(0000000050df0000 - 0000000050e10000: C:\WINDOWS\system32\LOCWIN32.DLL
(0000000058200000 - 00000000582cd000: C:\WINDOWS\system32\NOVNPNT.DLL
(0000000058300000 - 0000000058338000: C:\WINDOWS\system32\MAPBASE.dll
(0000000058380000 - 00000000583bd000: C:\WINDOWS\system32\NWSHLXNT.dll
(000000005ad70000 - 000000005ada8000: C:\WINDOWS\system32\UxTheme.dll
(000000005b860000 - 000000005b8b4000: C:\WINDOWS\system32\NETAPI32.dll
(000000005ba60000 - 000000005bad1000: C:\WINDOWS\System32\themeui.dll
(000000005c2c0000 - 000000005c300000: C:\WINDOWS\ime\sptip.dll
(000000005cb00000 - 000000005cb6e000: C:\WINDOWS\system32\shimgvw.dll
(000000005cb70000 - 000000005cb96000: C:\WINDOWS\system32\ShimEng.dll
(000000005d090000 - 000000005d12a000: C:\WINDOWS\system32\comctl32.dll
(000000005fc10000 - 000000005fc43000: C:\WINDOWS\System32\msutb.dll
(00000000605d0000 - 00000000605d9000: C:\WINDOWS\system32\mslbui.dll
(0000000062c30000 - 0000000062c3d000: C:\WINDOWS\System32\twext.dll
(0000000066900000 - 000000006691b000: C:\Program Files\McAfee\Common
Framework\JrMac.dll
(000000006a400000 - 000000006a41b000:
C:\WINDOWS\system32\NLS\ENGLISH\MAPBASER.DLL
(000000006c1b0000 - 000000006c1fd000: C:\WINDOWS\system32\DUSER.dll
(000000006f880000 - 000000006fa4a000: C:\WINDOWS\AppPatch\AcGenral.DLL
(0000000071aa0000 - 0000000071aa8000: C:\WINDOWS\system32\WS2HELP.dll
(0000000071ab0000 - 0000000071ac7000: C:\WINDOWS\system32\WS2_32.dll
(0000000071ad0000 - 0000000071ad9000: C:\WINDOWS\system32\WSOCK32.dll
(0000000071b20000 - 0000000071b32000: C:\WINDOWS\system32\MPR.dll
(0000000071bf0000 - 0000000071c03000: C:\WINDOWS\System32\SAMLIB.dll
(0000000071c10000 - 0000000071c1e000: C:\WINDOWS\System32\ntlanman.dll
(0000000071c80000 - 0000000071c87000: C:\WINDOWS\System32\NETRAP.dll
(0000000071c90000 - 0000000071cd0000: C:\WINDOWS\System32\NETUI1.dll
(0000000071cd0000 - 0000000071ce7000: C:\WINDOWS\System32\NETUI0.dll
(0000000071d40000 - 0000000071d5c000: C:\WINDOWS\System32\actxprxy.dll
(00000000722b0000 - 00000000722b5000: C:\WINDOWS\system32\sensapi.dll
(00000000746c0000 - 00000000746e7000: C:\WINDOWS\System32\msls31.dll
(00000000746f0000 - 000000007471a000: C:\WINDOWS\System32\msimtf.dll
(0000000074720000 - 000000007476b000: C:\WINDOWS\System32\MSCTF.dll
(0000000074ad0000 - 0000000074ad8000: C:\WINDOWS\System32\POWRPROF.dll
(0000000074af0000 - 0000000074afa000: C:\WINDOWS\System32\BatMeter.dll
(0000000074b30000 - 0000000074b76000: C:\WINDOWS\System32\webcheck.dll
(0000000074c80000 - 0000000074cac000: C:\WINDOWS\system32\OLEACC.dll
(00000000754d0000 - 0000000075550000: C:\WINDOWS\system32\CRYPTUI.dll
(0000000075cf0000 - 0000000075d81000: C:\WINDOWS\system32\mlang.dll
(0000000075e90000 - 0000000075f40000: C:\WINDOWS\system32\SXS.DLL
(0000000075f60000 - 0000000075f67000: C:\WINDOWS\System32\drprov.dll
(0000000075f70000 - 0000000075f79000: C:\WINDOWS\System32\davclnt.dll
(0000000075f80000 - 000000007607d000: C:\WINDOWS\system32\BROWSEUI.dll
(0000000076080000 - 00000000760e5000: C:\WINDOWS\system32\MSVCP60.dll
(0000000076280000 - 00000000762a1000: C:\WINDOWS\System32\stobject.dll
(0000000076360000 - 0000000076370000: C:\WINDOWS\system32\WINSTA.dll
(0000000076380000 - 0000000076385000: C:\WINDOWS\System32\MSIMG32.dll
(0000000076400000 - 00000000765a6000: C:\WINDOWS\system32\NETSHELL.dll
(0000000076600000 - 000000007661d000: C:\WINDOWS\System32\CSCDLL.dll
(0000000076980000 - 0000000076988000: C:\WINDOWS\system32\LINKINFO.dll
(0000000076990000 - 00000000769b5000: C:\WINDOWS\system32\ntshrui.dll
(00000000769c0000 - 0000000076a73000: C:\WINDOWS\system32\USERENV.dll
(0000000076b20000 - 0000000076b31000: C:\WINDOWS\system32\ATL.DLL
(0000000076b40000 - 0000000076b6d000: C:\WINDOWS\system32\WINMM.dll
(0000000076bf0000 - 0000000076bfb000: C:\WINDOWS\system32\PSAPI.DLL
(0000000076c00000 - 0000000076c2e000: C:\WINDOWS\system32\credui.dll
(0000000076c30000 - 0000000076c5e000: C:\WINDOWS\system32\WINTRUST.dll
(0000000076c90000 - 0000000076cb8000: C:\WINDOWS\system32\IMAGEHLP.dll
(0000000076d60000 - 0000000076d79000: C:\WINDOWS\system32\iphlpapi.dll
(0000000076e80000 - 0000000076e8e000: C:\WINDOWS\system32\rtutils.dll
(0000000076e90000 - 0000000076ea2000: C:\WINDOWS\system32\rasman.dll
(0000000076eb0000 - 0000000076edf000: C:\WINDOWS\system32\TAPI32.dll
(0000000076ee0000 - 0000000076f1c000: C:\WINDOWS\system32\RASAPI32.DLL
(0000000076f50000 - 0000000076f58000: C:\WINDOWS\System32\WTSAPI32.dll
(0000000076f60000 - 0000000076f8c000: C:\WINDOWS\system32\WLDAP32.dll
(0000000076fd0000 - 000000007704f000: C:\WINDOWS\system32\CLBCATQ.DLL
(0000000077050000 - 0000000077115000: C:\WINDOWS\system32\COMRes.dll
(0000000077120000 - 00000000771ab000: C:\WINDOWS\system32\OLEAUT32.dll
(00000000771b0000 - 0000000077256000: C:\WINDOWS\system32\WININET.dll
(00000000773d0000 - 00000000774d3000:
C:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.2600.2982_x-ww_ac3f9c03\comctl32.dll
(00000000774e0000 - 000000007761d000: C:\WINDOWS\system32\ole32.dll
(0000000077920000 - 0000000077a13000: C:\WINDOWS\system32\SETUPAPI.dll
(0000000077a20000 - 0000000077a74000: C:\WINDOWS\System32\cscui.dll
(0000000077a80000 - 0000000077b14000: C:\WINDOWS\system32\CRYPT32.dll
(0000000077b20000 - 0000000077b32000: C:\WINDOWS\system32\MSASN1.dll
(0000000077b40000 - 0000000077b62000: C:\WINDOWS\system32\appHelp.dll
(0000000077be0000 - 0000000077bf5000: C:\WINDOWS\system32\MSACM32.dll
(0000000077c00000 - 0000000077c08000: C:\WINDOWS\system32\VERSION.dll
(0000000077c10000 - 0000000077c68000: C:\WINDOWS\system32\msvcrt.dll
(0000000077c70000 - 0000000077c93000: C:\WINDOWS\system32\msv1_0.dll
(0000000077dd0000 - 0000000077e6b000: C:\WINDOWS\system32\ADVAPI32.dll
(0000000077e70000 - 0000000077f02000: C:\WINDOWS\system32\RPCRT4.dll
(0000000077f10000 - 0000000077f57000: C:\WINDOWS\system32\GDI32.dll
(0000000077f60000 - 0000000077fd6000: C:\WINDOWS\system32\SHLWAPI.dll
(0000000077fe0000 - 0000000077ff1000: C:\WINDOWS\system32\Secur32.dll
(000000007c340000 - 000000007c396000: C:\WINDOWS\system32\MSVCR71.dll
(000000007c800000 - 000000007c8f5000: C:\WINDOWS\system32\kernel32.dll
(000000007c900000 - 000000007c9b0000: C:\WINDOWS\system32\ntdll.dll
(000000007c9c0000 - 000000007d1d5000: C:\WINDOWS\system32\SHELL32.dll
(000000007d1e0000 - 000000007d49e000: C:\WINDOWS\system32\msi.dll
(000000007dc30000 - 000000007df21000: C:\WINDOWS\System32\mshtml.dll
(000000007e1e0000 - 000000007e280000: C:\WINDOWS\system32\urlmon.dll
(000000007e290000 - 000000007e3ff000: C:\WINDOWS\system32\SHDOCVW.dll
(000000007e410000 - 000000007e4a0000: C:\WINDOWS\system32\USER32.dll
*----> State Dump for Thread Id 0xcb4 <----*
eax=0007fed4 ebx=00000003 ecx=0007fed4 edx=7c90eb94 esi=000a2f70 edi=00000000
eip=7c90eb94 esp=0007fef0 ebp=0007ff08 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202
*** ERROR: Symbol file could not be found. Defaulted to export symbols for
C:\WINDOWS\system32\ntdll.dll -
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for
C:\WINDOWS\system32\SHELL32.dll -
WARNING: Stack unwind information not available. Following frames may be
wrong.
*** ERROR: Module load completed but symbols could not be loaded for
C:\WINDOWS\Explorer.EXE
*** ERROR: Symbol file could not be found. Defaulted to export symbols for
C:\WINDOWS\system32\kernel32.dll -
ChildEBP RetAddr Args to Child
0007ff08 7ca0be9c 00000000 0007ff5c 01016e95 ntdll!KiFastSystemCallRet
0007ff14 01016e95 000a2f70 7ffdf000 0007ffc0 SHELL32!Ordinal201+0x28
0007ff5c 0101e2b6 00000000 00000000 00020876 Explorer+0x16e95
0007ffc0 7c816fd7 00000002 5d094598 7ffdf000 Explorer+0x1e2b6
0007fff0 00000000 0101e24e 00000000 78746341
kernel32!RegisterWaitForInputIdle+0x49
*----> Raw Stack Dump <----*
000000000007fef0 18 94 41 7e 02 3c a2 7c - 9c 92 80 7c 70 2f 0a 00
...A~.<.|...|p/..
000000000007ff00 70 2f 0a 00 14 ff 07 00 - 14 ff 07 00 9c be a0 7c
p/.............|
000000000007ff10 00 00 00 00 5c ff 07 00 - 95 6e 01 01 70 2f 0a 00
.....\....n..p/..
000000000007ff20 00 f0 fd 7f c0 ff 07 00 - 00 00 00 00 24 fd 07 00
.............$...
000000000007ff30 50 ff 07 00 e0 ff 07 00 - 27 e0 90 7c 65 ac 80 7c
P.......'..|e..|
000000000007ff40 ff ff ff ff 0c 00 00 00 - 00 00 00 00 b4 03 01 00
.................
000000000007ff50 a8 00 00 00 01 00 00 00 - 70 2f 0a 00 c0 ff 07 00
.........p/......
000000000007ff60 b6 e2 01 01 00 00 00 00 - 00 00 00 00 76 08 02 00
.............v...
000000000007ff70 01 00 00 00 02 00 00 00 - 98 45 09 5d 44 00 00 00
..........E.]D...
000000000007ff80 c8 08 02 00 a8 08 02 00 - 78 08 02 00 00 00 00 00
.........x.......
000000000007ff90 00 00 00 00 00 00 00 00 - 00 00 00 00 4e 09 91 7c
.............N..|
000000000007ffa0 e8 f2 07 00 24 00 02 00 - 01 00 00 00 01 00 00 00
.....$...........
000000000007ffb0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
000000000007ffc0 f0 ff 07 00 d7 6f 81 7c - 02 00 00 00 98 45 09 5d
......o.|.....E.]
000000000007ffd0 00 f0 fd 7f ed a6 54 80 - c8 ff 07 00 90 34 e0 85
.......T......4..
000000000007ffe0 ff ff ff ff a8 9a 83 7c - e0 6f 81 7c 00 00 00 00
........|.o.|....
000000000007fff0 00 00 00 00 00 00 00 00 - 4e e2 01 01 00 00 00 00
.........N.......
0000000000080000 41 63 74 78 20 00 00 00 - 01 00 00 00 98 24 00 00 Actx
.........$..
0000000000080010 c4 00 00 00 00 00 00 00 - 20 00 00 00 00 00 00 00
......... .......
0000000000080020 14 00 00 00 01 00 00 00 - 06 00 00 00 34 00 00 00
.............4...
*----> State Dump for Thread Id 0x43c <----*
eax=0000001d ebx=00000102 ecx=00000002 edx=7c90eb94 esi=00ceff28 edi=00000000
eip=7c90eb94 esp=00cefeac ebp=00cefed4 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for
C:\WINDOWS\system32\USER32.dll -
WARNING: Stack unwind information not available. Following frames may be
wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for
C:\WINDOWS\system32\SHLWAPI.dll -
ChildEBP RetAddr Args to Child
00cefed4 7e419402 00ceff28 00000000 00000000 ntdll!KiFastSystemCallRet
00ceff00 010019c1 00ceff28 00000000 00000000 USER32!PeekMessageW+0x167
00ceff44 01011e8b 00000000 00ceffb4 77f7429a Explorer+0x19c1
00ceff50 77f7429a 010460d8 0000005c 00860044 Explorer+0x11e8b
00ceffb4 7c80b683 00000000 0000005c 00860044 SHLWAPI!Ordinal505+0x3e9
00ceffec 00000000 77f7422b 0007fdbc 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
0000000000cefeac e9 93 41 7e a8 93 41 7e - 28 ff ce 00 00 00 00 00
...A~..A~(.......
0000000000cefebc 00 00 00 00 00 00 00 00 - 01 00 00 00 c8 38 55 00
..............8U.
0000000000cefecc 00 b0 fd 7f ba b8 41 7e - 00 ff ce 00 02 94 41 7e
.......A~......A~
0000000000cefedc 28 ff ce 00 00 00 00 00 - 00 00 00 00 00 00 00 00
(...............
0000000000cefeec 01 00 00 00 00 00 00 00 - 00 00 00 00 d8 60 04 01
..............`..
0000000000cefefc ba b8 41 7e 44 ff ce 00 - c1 19 00 01 28 ff ce 00
...A~D.......(...
0000000000ceff0c 00 00 00 00 00 00 00 00 - 00 00 00 00 01 00 00 00
.................
0000000000ceff1c 00 00 00 00 d8 60 04 01 - 00 00 00 00 00 00 00 00
......`..........
0000000000ceff2c ae c0 00 00 00 00 00 00 - c4 09 00 00 22 67 5d 00
............."g].
0000000000ceff3c 44 02 00 00 da 01 00 00 - 50 ff ce 00 8b 1e 01 01
D.......P.......
0000000000ceff4c 00 00 00 00 b4 ff ce 00 - 9a 42 f7 77 d8 60 04 01
..........B.w.`..
0000000000ceff5c 5c 00 00 00 44 00 86 00 - bc fd 07 00 62 1e 01 01
\...D.......b...
0000000000ceff6c b1 79 01 01 64 01 00 00 - d8 60 04 01 08 00 00 00
..y..d....`......
0000000000ceff7c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000ceff8c 00 00 00 00 d0 7b e0 85 - 42 24 50 80 00 00 00 00
......{..B$P.....
0000000000ceff9c 00 00 00 00 00 00 00 00 - 4a 24 50 80 00 00 00 00
.........J$P.....
0000000000ceffac f2 4e 6e 80 dc e2 90 7c - ec ff ce 00 83 b6 80 7c
..Nn....|.......|
0000000000ceffbc 00 00 00 00 5c 00 00 00 - 44 00 86 00 bc fd 07 00
.....\...D.......
0000000000ceffcc 00 b0 fd 7f 00 e6 5b 86 - c0 ff ce 00 c8 a5 df 85
.......[.........
0000000000ceffdc ff ff ff ff a8 9a 83 7c - 90 b6 80 7c 00 00 00 00
........|...|....
*----> State Dump for Thread Id 0x8d8 <----*
eax=7c92798d ebx=00000000 ecx=000a0000 edx=77dd6a51 esi=7c90fb71 edi=ffffffff
eip=7c90eb94 esp=00d2ff9c ebp=00d2ffb4 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be
wrong.
ChildEBP RetAddr Args to Child
00d2ffb4 7c80b683 00000000 ffffffff 7c90fb71 ntdll!KiFastSystemCallRet
00d2ffec 00000000 7c92798d 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
0000000000d2ff9c 5c d8 90 7c d4 79 92 7c - 01 00 00 00 ac ff d2 00
\..|.y.|........
0000000000d2ffac 00 00 00 00 00 00 00 80 - ec ff d2 00 83 b6 80 7c
................|
0000000000d2ffbc 00 00 00 00 ff ff ff ff - 71 fb 90 7c 00 00 00 00
.........q..|....
0000000000d2ffcc 00 a0 fd 7f 00 c6 5b 86 - c0 ff d2 00 88 14 de 85
.......[.........
0000000000d2ffdc ff ff ff ff a8 9a 83 7c - 90 b6 80 7c 00 00 00 00
........|...|....
0000000000d2ffec 00 00 00 00 00 00 00 00 - 8d 79 92 7c 00 00 00 00
..........y.|....
0000000000d2fffc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000d3000c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000d3001c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000d3002c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000d3003c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000d3004c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000d3005c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000d3006c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000d3007c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000d3008c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000d3009c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000d300ac 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000d300bc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000d300cc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
*----> State Dump for Thread Id 0x8f0 <----*
eax=000000c0 ebx=00000000 ecx=7c910992 edx=00000000 esi=00000000 edi=00000001
eip=7c90eb94 esp=00dafcec ebp=00daffb4 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be
wrong.
ChildEBP RetAddr Args to Child
00daffb4 7c80b683 00000000 00000020 00cefce4 ntdll!KiFastSystemCallRet
00daffec 00000000 7c929fae 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
0000000000dafcec ab e9 90 7c d5 a0 92 7c - 03 00 00 00 30 fd da 00
....|...|....0...
0000000000dafcfc 01 00 00 00 01 00 00 00 - 00 00 00 00 20 00 00 00
............. ...
0000000000dafd0c e4 fc ce 00 00 00 00 00 - 08 e5 97 7c 08 e5 97 7c
............|...|
0000000000dafd1c d0 01 00 00 f0 08 00 00 - 03 00 00 00 03 00 00 00
.................
0000000000dafd2c 02 00 00 00 cc 01 00 00 - b4 01 00 00 18 06 00 00
.................
0000000000dafd3c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000dafd4c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000dafd5c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000dafd6c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000dafd7c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000dafd8c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000dafd9c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000dafdac 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000dafdbc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000dafdcc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000dafddc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000dafdec 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000dafdfc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000dafe0c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000dafe1c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
*----> State Dump for Thread Id 0x918 <----*
eax=02eaacf0 ebx=00e4fd58 ecx=e9110002 edx=e9110003 esi=00000000 edi=7ffdf000
eip=7c90eb94 esp=00e4fd30 ebp=00e4fdcc iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be
wrong.
ChildEBP RetAddr Args to Child
00e4fdcc 7e4195f9 00000008 00e4fdf4 00000000 ntdll!KiFastSystemCallRet
00e4fe28 7c9f4e7f 00000007 00e4fe50 ffffffff USER32!GetLastInputInfo+0x105
00e4ff4c 7ca0a398 77f7429a 00000000 000600f4 SHELL32!Ordinal646+0x21da
00e4ffb4 7c80b683 00000000 000600f4 00ceefc4 SHELL32!Ordinal753+0x133
00e4ffec 00000000 77f7422b 00cef324 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
0000000000e4fd30 ab e9 90 7c e2 94 80 7c - 08 00 00 00 58 fd e4 00
....|...|....X...
0000000000e4fd40 01 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000e4fd50 08 00 00 00 02 00 00 00 - 94 09 00 00 98 05 00 00
.................
0000000000e4fd60 24 06 00 00 2c 04 00 00 - 78 03 00 00 14 02 00 00
$...,...x.......
0000000000e4fd70 28 02 00 00 fc 01 00 00 - 14 00 00 00 01 00 00 00
(...............
0000000000e4fd80 80 62 0d 00 00 00 00 00 - 00 00 00 00 ec fd e4 00
..b..............
0000000000e4fd90 57 04 44 7e 30 88 41 7e - 00 f0 fd 7f 00 70 fd 7f
W.D~0.A~.....p..
0000000000e4fda0 cd 89 41 7e 00 00 00 00 - 58 fd e4 00 8c 00 04 00
...A~....X.......
0000000000e4fdb0 08 00 00 00 4c fd e4 00 - 00 00 00 00 dc ff e4 00
.....L...........
0000000000e4fdc0 a8 9a 83 7c d8 95 80 7c - 00 00 00 00 28 fe e4 00
....|...|....(...
0000000000e4fdd0 f9 95 41 7e 08 00 00 00 - f4 fd e4 00 00 00 00 00
...A~............
0000000000e4fde0 ff ff ff ff 01 00 00 00 - 98 98 0f 00 07 00 00 00
.................
0000000000e4fdf0 00 00 00 00 94 09 00 00 - 98 05 00 00 24 06 00 00
.............$...
0000000000e4fe00 2c 04 00 00 78 03 00 00 - 14 02 00 00 28 02 00 00
,...x.......(...
0000000000e4fe10 fc 01 00 00 74 bd 00 00 - 00 00 00 00 01 00 00 00
.....t...........
0000000000e4fe20 00 70 fd 7f fc 01 00 00 - 4c ff e4 00 7f 4e 9f 7c
..p......L....N.|
0000000000e4fe30 07 00 00 00 50 fe e4 00 - ff ff ff ff ff 04 00 00
.....P...........
0000000000e4fe40 f4 fd e4 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000e4fe50 94 09 00 00 98 05 00 00 - 24 06 00 00 2c 04 00 00
.........$...,...
0000000000e4fe60 78 03 00 00 14 02 00 00 - 28 02 00 00 28 02 00 00
x.......(...(...
*----> State Dump for Thread Id 0xeec <----*
rest to follow
We are having an issue with one user.
Using WinXP pro SP2
Roming profile
We have rebuilt PC, resetup account and remove local and network Profiles.
Every time she open a excel file Explorer shuts down.
Here is the dump file, any help would be great?
Application exception occurred:
App: C:\WINDOWS\Explorer.EXE (pid=3248)
When: 02/11/2007 @ 10:36:02.193
Exception number: c0000005 (access violation)
*----> System Information <----*
Computer Name: ************
User Name: ccrow
Terminal Session Id: 0
Number of Processors: 2
Processor Type: x86 Family 15 Model 4 Stepping 3
Windows Version: 5.1
Current Build: 2600
Service Pack: 2
Current Type: Multiprocessor Free
Registered Organization: ***********
Registered Owner: ***********
*----> Task List <----*
0 System Process
4 Error 0xD0000022
372 Error 0xD0000022
420 Error 0xD0000022
444 Error 0xD0000022
488 Error 0xD0000022
500 Error 0xD0000022
672 Error 0xD0000022
720 Error 0xD0000022
788 Error 0xD0000022
960 Error 0xD0000022
1016 Error 0xD0000022
1128 Error 0xD0000022
1324 Error 0xD0000022
1412 Error 0xD0000022
1436 Error 0xD0000022
1492 Error 0xD0000022
1552 Error 0xD0000022
1572 Error 0xD0000022
1700 Error 0xD0000022
1776 Error 0xD0000022
1856 Error 0xD0000022
396 Error 0xD0000022
880 Error 0xD0000022
1488 Error 0xD0000022
2096 Error 0xD0000022
3248 Explorer.EXE
3604 iexplore.exe
3856 hkcmd.exe
3900 igfxpers.exe
3972 SHSTAT.EXE
492 NWTRAY.EXE
176 agentView.exe
320 ctfmon.exe
364 Merlin_Alerts.exe
908 UdaterUI.exe
1800 McTray.exe
2700 winresa.exe
2784 iexplore.exe
1716 iexplore.exe
932 TOMSDesktop.exe
4064 wfcrun32.exe
4032 WFICA32.EXE
2584 OUTLOOK.EXE
2724 WINWORD.EXE
2172 achiever.exe
2504 AchieverCS.exe
3240 EXCEL.EXE
3792 iexplore.exe
344 dwwin.exe
660 drwtsn32.exe
*----> Module List <----*
(0000000000c20000 - 0000000000c31000: C:\WINDOWS\IME\SPGRMR.DLL
(0000000000f50000 - 0000000000f6d000:
C:\WINDOWS\system32\NLS\ENGLISH\NWSHLXNR.DLL
(0000000001000000 - 00000000010ff000: C:\WINDOWS\Explorer.EXE
(0000000001b10000 - 0000000001b98000: C:\WINDOWS\System32\shdoclc.dll
(0000000002080000 - 000000000208f000: C:\Program
Files\Etalk\AutoQuality\SAHooks.dll
(0000000002bc0000 - 0000000002bd2000: C:\WINDOWS\system32\browselc.dll
(0000000002ca0000 - 0000000002cae000: C:\Program Files\Adobe\Acrobat
7.0\ActiveX\AcroIEHelper.dll
(0000000003440000 - 000000000345c000: C:\Program Files\Adobe\Acrobat
7.0\ActiveX\PDFShell.dll
(000000000a000000 - 000000000a012000: C:\WINDOWS\system32\EntApi.dll
(000000000ffd0000 - 000000000fff8000: C:\WINDOWS\system32\rsaenh.dll
(0000000010000000 - 000000001005b000: C:\Program Files\Common
Files\Microsoft Shared\Ink\SKCHUI.DLL
(0000000020000000 - 00000000202c5000: C:\WINDOWS\system32\xpsp2res.dll
(0000000032520000 - 0000000032532000: C:\Program Files\Microsoft
Office\Office10\msohev.dll
(000000004ec50000 - 000000004edf3000:
C:\WINDOWS\WinSxS\x86_Microsoft.Windows.GdiPlus_6595b64144ccf1df_1.0.2600.2180_x-ww_522f9f82\gdiplus.dll
(0000000050d00000 - 0000000050d15000: C:\WINDOWS\system32\CLNWIN32.DLL
(0000000050d20000 - 0000000050d4b000: C:\WINDOWS\system32\CALWIN32.DLL
(0000000050d50000 - 0000000050d97000: C:\WINDOWS\system32\NETWIN32.DLL
(0000000050da0000 - 0000000050dab000: C:\WINDOWS\system32\CLXWIN32.DLL
(0000000050db0000 - 0000000050ddb000: C:\WINDOWS\system32\NCPWIN32.dll
(0000000050df0000 - 0000000050e10000: C:\WINDOWS\system32\LOCWIN32.DLL
(0000000058200000 - 00000000582cd000: C:\WINDOWS\system32\NOVNPNT.DLL
(0000000058300000 - 0000000058338000: C:\WINDOWS\system32\MAPBASE.dll
(0000000058380000 - 00000000583bd000: C:\WINDOWS\system32\NWSHLXNT.dll
(000000005ad70000 - 000000005ada8000: C:\WINDOWS\system32\UxTheme.dll
(000000005b860000 - 000000005b8b4000: C:\WINDOWS\system32\NETAPI32.dll
(000000005ba60000 - 000000005bad1000: C:\WINDOWS\System32\themeui.dll
(000000005c2c0000 - 000000005c300000: C:\WINDOWS\ime\sptip.dll
(000000005cb00000 - 000000005cb6e000: C:\WINDOWS\system32\shimgvw.dll
(000000005cb70000 - 000000005cb96000: C:\WINDOWS\system32\ShimEng.dll
(000000005d090000 - 000000005d12a000: C:\WINDOWS\system32\comctl32.dll
(000000005fc10000 - 000000005fc43000: C:\WINDOWS\System32\msutb.dll
(00000000605d0000 - 00000000605d9000: C:\WINDOWS\system32\mslbui.dll
(0000000062c30000 - 0000000062c3d000: C:\WINDOWS\System32\twext.dll
(0000000066900000 - 000000006691b000: C:\Program Files\McAfee\Common
Framework\JrMac.dll
(000000006a400000 - 000000006a41b000:
C:\WINDOWS\system32\NLS\ENGLISH\MAPBASER.DLL
(000000006c1b0000 - 000000006c1fd000: C:\WINDOWS\system32\DUSER.dll
(000000006f880000 - 000000006fa4a000: C:\WINDOWS\AppPatch\AcGenral.DLL
(0000000071aa0000 - 0000000071aa8000: C:\WINDOWS\system32\WS2HELP.dll
(0000000071ab0000 - 0000000071ac7000: C:\WINDOWS\system32\WS2_32.dll
(0000000071ad0000 - 0000000071ad9000: C:\WINDOWS\system32\WSOCK32.dll
(0000000071b20000 - 0000000071b32000: C:\WINDOWS\system32\MPR.dll
(0000000071bf0000 - 0000000071c03000: C:\WINDOWS\System32\SAMLIB.dll
(0000000071c10000 - 0000000071c1e000: C:\WINDOWS\System32\ntlanman.dll
(0000000071c80000 - 0000000071c87000: C:\WINDOWS\System32\NETRAP.dll
(0000000071c90000 - 0000000071cd0000: C:\WINDOWS\System32\NETUI1.dll
(0000000071cd0000 - 0000000071ce7000: C:\WINDOWS\System32\NETUI0.dll
(0000000071d40000 - 0000000071d5c000: C:\WINDOWS\System32\actxprxy.dll
(00000000722b0000 - 00000000722b5000: C:\WINDOWS\system32\sensapi.dll
(00000000746c0000 - 00000000746e7000: C:\WINDOWS\System32\msls31.dll
(00000000746f0000 - 000000007471a000: C:\WINDOWS\System32\msimtf.dll
(0000000074720000 - 000000007476b000: C:\WINDOWS\System32\MSCTF.dll
(0000000074ad0000 - 0000000074ad8000: C:\WINDOWS\System32\POWRPROF.dll
(0000000074af0000 - 0000000074afa000: C:\WINDOWS\System32\BatMeter.dll
(0000000074b30000 - 0000000074b76000: C:\WINDOWS\System32\webcheck.dll
(0000000074c80000 - 0000000074cac000: C:\WINDOWS\system32\OLEACC.dll
(00000000754d0000 - 0000000075550000: C:\WINDOWS\system32\CRYPTUI.dll
(0000000075cf0000 - 0000000075d81000: C:\WINDOWS\system32\mlang.dll
(0000000075e90000 - 0000000075f40000: C:\WINDOWS\system32\SXS.DLL
(0000000075f60000 - 0000000075f67000: C:\WINDOWS\System32\drprov.dll
(0000000075f70000 - 0000000075f79000: C:\WINDOWS\System32\davclnt.dll
(0000000075f80000 - 000000007607d000: C:\WINDOWS\system32\BROWSEUI.dll
(0000000076080000 - 00000000760e5000: C:\WINDOWS\system32\MSVCP60.dll
(0000000076280000 - 00000000762a1000: C:\WINDOWS\System32\stobject.dll
(0000000076360000 - 0000000076370000: C:\WINDOWS\system32\WINSTA.dll
(0000000076380000 - 0000000076385000: C:\WINDOWS\System32\MSIMG32.dll
(0000000076400000 - 00000000765a6000: C:\WINDOWS\system32\NETSHELL.dll
(0000000076600000 - 000000007661d000: C:\WINDOWS\System32\CSCDLL.dll
(0000000076980000 - 0000000076988000: C:\WINDOWS\system32\LINKINFO.dll
(0000000076990000 - 00000000769b5000: C:\WINDOWS\system32\ntshrui.dll
(00000000769c0000 - 0000000076a73000: C:\WINDOWS\system32\USERENV.dll
(0000000076b20000 - 0000000076b31000: C:\WINDOWS\system32\ATL.DLL
(0000000076b40000 - 0000000076b6d000: C:\WINDOWS\system32\WINMM.dll
(0000000076bf0000 - 0000000076bfb000: C:\WINDOWS\system32\PSAPI.DLL
(0000000076c00000 - 0000000076c2e000: C:\WINDOWS\system32\credui.dll
(0000000076c30000 - 0000000076c5e000: C:\WINDOWS\system32\WINTRUST.dll
(0000000076c90000 - 0000000076cb8000: C:\WINDOWS\system32\IMAGEHLP.dll
(0000000076d60000 - 0000000076d79000: C:\WINDOWS\system32\iphlpapi.dll
(0000000076e80000 - 0000000076e8e000: C:\WINDOWS\system32\rtutils.dll
(0000000076e90000 - 0000000076ea2000: C:\WINDOWS\system32\rasman.dll
(0000000076eb0000 - 0000000076edf000: C:\WINDOWS\system32\TAPI32.dll
(0000000076ee0000 - 0000000076f1c000: C:\WINDOWS\system32\RASAPI32.DLL
(0000000076f50000 - 0000000076f58000: C:\WINDOWS\System32\WTSAPI32.dll
(0000000076f60000 - 0000000076f8c000: C:\WINDOWS\system32\WLDAP32.dll
(0000000076fd0000 - 000000007704f000: C:\WINDOWS\system32\CLBCATQ.DLL
(0000000077050000 - 0000000077115000: C:\WINDOWS\system32\COMRes.dll
(0000000077120000 - 00000000771ab000: C:\WINDOWS\system32\OLEAUT32.dll
(00000000771b0000 - 0000000077256000: C:\WINDOWS\system32\WININET.dll
(00000000773d0000 - 00000000774d3000:
C:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.2600.2982_x-ww_ac3f9c03\comctl32.dll
(00000000774e0000 - 000000007761d000: C:\WINDOWS\system32\ole32.dll
(0000000077920000 - 0000000077a13000: C:\WINDOWS\system32\SETUPAPI.dll
(0000000077a20000 - 0000000077a74000: C:\WINDOWS\System32\cscui.dll
(0000000077a80000 - 0000000077b14000: C:\WINDOWS\system32\CRYPT32.dll
(0000000077b20000 - 0000000077b32000: C:\WINDOWS\system32\MSASN1.dll
(0000000077b40000 - 0000000077b62000: C:\WINDOWS\system32\appHelp.dll
(0000000077be0000 - 0000000077bf5000: C:\WINDOWS\system32\MSACM32.dll
(0000000077c00000 - 0000000077c08000: C:\WINDOWS\system32\VERSION.dll
(0000000077c10000 - 0000000077c68000: C:\WINDOWS\system32\msvcrt.dll
(0000000077c70000 - 0000000077c93000: C:\WINDOWS\system32\msv1_0.dll
(0000000077dd0000 - 0000000077e6b000: C:\WINDOWS\system32\ADVAPI32.dll
(0000000077e70000 - 0000000077f02000: C:\WINDOWS\system32\RPCRT4.dll
(0000000077f10000 - 0000000077f57000: C:\WINDOWS\system32\GDI32.dll
(0000000077f60000 - 0000000077fd6000: C:\WINDOWS\system32\SHLWAPI.dll
(0000000077fe0000 - 0000000077ff1000: C:\WINDOWS\system32\Secur32.dll
(000000007c340000 - 000000007c396000: C:\WINDOWS\system32\MSVCR71.dll
(000000007c800000 - 000000007c8f5000: C:\WINDOWS\system32\kernel32.dll
(000000007c900000 - 000000007c9b0000: C:\WINDOWS\system32\ntdll.dll
(000000007c9c0000 - 000000007d1d5000: C:\WINDOWS\system32\SHELL32.dll
(000000007d1e0000 - 000000007d49e000: C:\WINDOWS\system32\msi.dll
(000000007dc30000 - 000000007df21000: C:\WINDOWS\System32\mshtml.dll
(000000007e1e0000 - 000000007e280000: C:\WINDOWS\system32\urlmon.dll
(000000007e290000 - 000000007e3ff000: C:\WINDOWS\system32\SHDOCVW.dll
(000000007e410000 - 000000007e4a0000: C:\WINDOWS\system32\USER32.dll
*----> State Dump for Thread Id 0xcb4 <----*
eax=0007fed4 ebx=00000003 ecx=0007fed4 edx=7c90eb94 esi=000a2f70 edi=00000000
eip=7c90eb94 esp=0007fef0 ebp=0007ff08 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202
*** ERROR: Symbol file could not be found. Defaulted to export symbols for
C:\WINDOWS\system32\ntdll.dll -
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for
C:\WINDOWS\system32\SHELL32.dll -
WARNING: Stack unwind information not available. Following frames may be
wrong.
*** ERROR: Module load completed but symbols could not be loaded for
C:\WINDOWS\Explorer.EXE
*** ERROR: Symbol file could not be found. Defaulted to export symbols for
C:\WINDOWS\system32\kernel32.dll -
ChildEBP RetAddr Args to Child
0007ff08 7ca0be9c 00000000 0007ff5c 01016e95 ntdll!KiFastSystemCallRet
0007ff14 01016e95 000a2f70 7ffdf000 0007ffc0 SHELL32!Ordinal201+0x28
0007ff5c 0101e2b6 00000000 00000000 00020876 Explorer+0x16e95
0007ffc0 7c816fd7 00000002 5d094598 7ffdf000 Explorer+0x1e2b6
0007fff0 00000000 0101e24e 00000000 78746341
kernel32!RegisterWaitForInputIdle+0x49
*----> Raw Stack Dump <----*
000000000007fef0 18 94 41 7e 02 3c a2 7c - 9c 92 80 7c 70 2f 0a 00
...A~.<.|...|p/..
000000000007ff00 70 2f 0a 00 14 ff 07 00 - 14 ff 07 00 9c be a0 7c
p/.............|
000000000007ff10 00 00 00 00 5c ff 07 00 - 95 6e 01 01 70 2f 0a 00
.....\....n..p/..
000000000007ff20 00 f0 fd 7f c0 ff 07 00 - 00 00 00 00 24 fd 07 00
.............$...
000000000007ff30 50 ff 07 00 e0 ff 07 00 - 27 e0 90 7c 65 ac 80 7c
P.......'..|e..|
000000000007ff40 ff ff ff ff 0c 00 00 00 - 00 00 00 00 b4 03 01 00
.................
000000000007ff50 a8 00 00 00 01 00 00 00 - 70 2f 0a 00 c0 ff 07 00
.........p/......
000000000007ff60 b6 e2 01 01 00 00 00 00 - 00 00 00 00 76 08 02 00
.............v...
000000000007ff70 01 00 00 00 02 00 00 00 - 98 45 09 5d 44 00 00 00
..........E.]D...
000000000007ff80 c8 08 02 00 a8 08 02 00 - 78 08 02 00 00 00 00 00
.........x.......
000000000007ff90 00 00 00 00 00 00 00 00 - 00 00 00 00 4e 09 91 7c
.............N..|
000000000007ffa0 e8 f2 07 00 24 00 02 00 - 01 00 00 00 01 00 00 00
.....$...........
000000000007ffb0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
000000000007ffc0 f0 ff 07 00 d7 6f 81 7c - 02 00 00 00 98 45 09 5d
......o.|.....E.]
000000000007ffd0 00 f0 fd 7f ed a6 54 80 - c8 ff 07 00 90 34 e0 85
.......T......4..
000000000007ffe0 ff ff ff ff a8 9a 83 7c - e0 6f 81 7c 00 00 00 00
........|.o.|....
000000000007fff0 00 00 00 00 00 00 00 00 - 4e e2 01 01 00 00 00 00
.........N.......
0000000000080000 41 63 74 78 20 00 00 00 - 01 00 00 00 98 24 00 00 Actx
.........$..
0000000000080010 c4 00 00 00 00 00 00 00 - 20 00 00 00 00 00 00 00
......... .......
0000000000080020 14 00 00 00 01 00 00 00 - 06 00 00 00 34 00 00 00
.............4...
*----> State Dump for Thread Id 0x43c <----*
eax=0000001d ebx=00000102 ecx=00000002 edx=7c90eb94 esi=00ceff28 edi=00000000
eip=7c90eb94 esp=00cefeac ebp=00cefed4 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for
C:\WINDOWS\system32\USER32.dll -
WARNING: Stack unwind information not available. Following frames may be
wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for
C:\WINDOWS\system32\SHLWAPI.dll -
ChildEBP RetAddr Args to Child
00cefed4 7e419402 00ceff28 00000000 00000000 ntdll!KiFastSystemCallRet
00ceff00 010019c1 00ceff28 00000000 00000000 USER32!PeekMessageW+0x167
00ceff44 01011e8b 00000000 00ceffb4 77f7429a Explorer+0x19c1
00ceff50 77f7429a 010460d8 0000005c 00860044 Explorer+0x11e8b
00ceffb4 7c80b683 00000000 0000005c 00860044 SHLWAPI!Ordinal505+0x3e9
00ceffec 00000000 77f7422b 0007fdbc 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
0000000000cefeac e9 93 41 7e a8 93 41 7e - 28 ff ce 00 00 00 00 00
...A~..A~(.......
0000000000cefebc 00 00 00 00 00 00 00 00 - 01 00 00 00 c8 38 55 00
..............8U.
0000000000cefecc 00 b0 fd 7f ba b8 41 7e - 00 ff ce 00 02 94 41 7e
.......A~......A~
0000000000cefedc 28 ff ce 00 00 00 00 00 - 00 00 00 00 00 00 00 00
(...............
0000000000cefeec 01 00 00 00 00 00 00 00 - 00 00 00 00 d8 60 04 01
..............`..
0000000000cefefc ba b8 41 7e 44 ff ce 00 - c1 19 00 01 28 ff ce 00
...A~D.......(...
0000000000ceff0c 00 00 00 00 00 00 00 00 - 00 00 00 00 01 00 00 00
.................
0000000000ceff1c 00 00 00 00 d8 60 04 01 - 00 00 00 00 00 00 00 00
......`..........
0000000000ceff2c ae c0 00 00 00 00 00 00 - c4 09 00 00 22 67 5d 00
............."g].
0000000000ceff3c 44 02 00 00 da 01 00 00 - 50 ff ce 00 8b 1e 01 01
D.......P.......
0000000000ceff4c 00 00 00 00 b4 ff ce 00 - 9a 42 f7 77 d8 60 04 01
..........B.w.`..
0000000000ceff5c 5c 00 00 00 44 00 86 00 - bc fd 07 00 62 1e 01 01
\...D.......b...
0000000000ceff6c b1 79 01 01 64 01 00 00 - d8 60 04 01 08 00 00 00
..y..d....`......
0000000000ceff7c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000ceff8c 00 00 00 00 d0 7b e0 85 - 42 24 50 80 00 00 00 00
......{..B$P.....
0000000000ceff9c 00 00 00 00 00 00 00 00 - 4a 24 50 80 00 00 00 00
.........J$P.....
0000000000ceffac f2 4e 6e 80 dc e2 90 7c - ec ff ce 00 83 b6 80 7c
..Nn....|.......|
0000000000ceffbc 00 00 00 00 5c 00 00 00 - 44 00 86 00 bc fd 07 00
.....\...D.......
0000000000ceffcc 00 b0 fd 7f 00 e6 5b 86 - c0 ff ce 00 c8 a5 df 85
.......[.........
0000000000ceffdc ff ff ff ff a8 9a 83 7c - 90 b6 80 7c 00 00 00 00
........|...|....
*----> State Dump for Thread Id 0x8d8 <----*
eax=7c92798d ebx=00000000 ecx=000a0000 edx=77dd6a51 esi=7c90fb71 edi=ffffffff
eip=7c90eb94 esp=00d2ff9c ebp=00d2ffb4 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be
wrong.
ChildEBP RetAddr Args to Child
00d2ffb4 7c80b683 00000000 ffffffff 7c90fb71 ntdll!KiFastSystemCallRet
00d2ffec 00000000 7c92798d 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
0000000000d2ff9c 5c d8 90 7c d4 79 92 7c - 01 00 00 00 ac ff d2 00
\..|.y.|........
0000000000d2ffac 00 00 00 00 00 00 00 80 - ec ff d2 00 83 b6 80 7c
................|
0000000000d2ffbc 00 00 00 00 ff ff ff ff - 71 fb 90 7c 00 00 00 00
.........q..|....
0000000000d2ffcc 00 a0 fd 7f 00 c6 5b 86 - c0 ff d2 00 88 14 de 85
.......[.........
0000000000d2ffdc ff ff ff ff a8 9a 83 7c - 90 b6 80 7c 00 00 00 00
........|...|....
0000000000d2ffec 00 00 00 00 00 00 00 00 - 8d 79 92 7c 00 00 00 00
..........y.|....
0000000000d2fffc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000d3000c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000d3001c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000d3002c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000d3003c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000d3004c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000d3005c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000d3006c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000d3007c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000d3008c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000d3009c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000d300ac 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000d300bc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000d300cc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
*----> State Dump for Thread Id 0x8f0 <----*
eax=000000c0 ebx=00000000 ecx=7c910992 edx=00000000 esi=00000000 edi=00000001
eip=7c90eb94 esp=00dafcec ebp=00daffb4 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be
wrong.
ChildEBP RetAddr Args to Child
00daffb4 7c80b683 00000000 00000020 00cefce4 ntdll!KiFastSystemCallRet
00daffec 00000000 7c929fae 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
0000000000dafcec ab e9 90 7c d5 a0 92 7c - 03 00 00 00 30 fd da 00
....|...|....0...
0000000000dafcfc 01 00 00 00 01 00 00 00 - 00 00 00 00 20 00 00 00
............. ...
0000000000dafd0c e4 fc ce 00 00 00 00 00 - 08 e5 97 7c 08 e5 97 7c
............|...|
0000000000dafd1c d0 01 00 00 f0 08 00 00 - 03 00 00 00 03 00 00 00
.................
0000000000dafd2c 02 00 00 00 cc 01 00 00 - b4 01 00 00 18 06 00 00
.................
0000000000dafd3c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000dafd4c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000dafd5c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000dafd6c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000dafd7c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000dafd8c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000dafd9c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000dafdac 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000dafdbc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000dafdcc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000dafddc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000dafdec 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000dafdfc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000dafe0c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000dafe1c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
*----> State Dump for Thread Id 0x918 <----*
eax=02eaacf0 ebx=00e4fd58 ecx=e9110002 edx=e9110003 esi=00000000 edi=7ffdf000
eip=7c90eb94 esp=00e4fd30 ebp=00e4fdcc iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be
wrong.
ChildEBP RetAddr Args to Child
00e4fdcc 7e4195f9 00000008 00e4fdf4 00000000 ntdll!KiFastSystemCallRet
00e4fe28 7c9f4e7f 00000007 00e4fe50 ffffffff USER32!GetLastInputInfo+0x105
00e4ff4c 7ca0a398 77f7429a 00000000 000600f4 SHELL32!Ordinal646+0x21da
00e4ffb4 7c80b683 00000000 000600f4 00ceefc4 SHELL32!Ordinal753+0x133
00e4ffec 00000000 77f7422b 00cef324 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
0000000000e4fd30 ab e9 90 7c e2 94 80 7c - 08 00 00 00 58 fd e4 00
....|...|....X...
0000000000e4fd40 01 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000e4fd50 08 00 00 00 02 00 00 00 - 94 09 00 00 98 05 00 00
.................
0000000000e4fd60 24 06 00 00 2c 04 00 00 - 78 03 00 00 14 02 00 00
$...,...x.......
0000000000e4fd70 28 02 00 00 fc 01 00 00 - 14 00 00 00 01 00 00 00
(...............
0000000000e4fd80 80 62 0d 00 00 00 00 00 - 00 00 00 00 ec fd e4 00
..b..............
0000000000e4fd90 57 04 44 7e 30 88 41 7e - 00 f0 fd 7f 00 70 fd 7f
W.D~0.A~.....p..
0000000000e4fda0 cd 89 41 7e 00 00 00 00 - 58 fd e4 00 8c 00 04 00
...A~....X.......
0000000000e4fdb0 08 00 00 00 4c fd e4 00 - 00 00 00 00 dc ff e4 00
.....L...........
0000000000e4fdc0 a8 9a 83 7c d8 95 80 7c - 00 00 00 00 28 fe e4 00
....|...|....(...
0000000000e4fdd0 f9 95 41 7e 08 00 00 00 - f4 fd e4 00 00 00 00 00
...A~............
0000000000e4fde0 ff ff ff ff 01 00 00 00 - 98 98 0f 00 07 00 00 00
.................
0000000000e4fdf0 00 00 00 00 94 09 00 00 - 98 05 00 00 24 06 00 00
.............$...
0000000000e4fe00 2c 04 00 00 78 03 00 00 - 14 02 00 00 28 02 00 00
,...x.......(...
0000000000e4fe10 fc 01 00 00 74 bd 00 00 - 00 00 00 00 01 00 00 00
.....t...........
0000000000e4fe20 00 70 fd 7f fc 01 00 00 - 4c ff e4 00 7f 4e 9f 7c
..p......L....N.|
0000000000e4fe30 07 00 00 00 50 fe e4 00 - ff ff ff ff ff 04 00 00
.....P...........
0000000000e4fe40 f4 fd e4 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0000000000e4fe50 94 09 00 00 98 05 00 00 - 24 06 00 00 2c 04 00 00
.........$...,...
0000000000e4fe60 78 03 00 00 14 02 00 00 - 28 02 00 00 28 02 00 00
x.......(...(...
*----> State Dump for Thread Id 0xeec <----*
rest to follow