Microsoft (R) DrWtsn32 Copyright (C) 1985-2001 Microsoft Corp. All rights reserved. Application exception occurred: App: C:\Program Files\DVD Shrink\DVD Shrink 3.2.exe (pid=2804) When: 3/27/2006 @ 08:14:49.734 Exception number: c0000094 (divide by zero) *----> System Information <----* Computer Name: MAGNUSSON User Name: Conny Terminal Session Id: 0 Number of Processors: 1 Processor Type: x86 Family 15 Model 15 Stepping 0 Windows Version: 5.1 Current Build: 2600 Service Pack: 2 Current Type: Uniprocessor Free Registered Organization: CoMa Corp. Registered Owner: CoMa *----> Task List <----* 0 System Process 4 System 760 smss.exe 832 csrss.exe 860 winlogon.exe 908 services.exe 920 lsass.exe 1076 Ati2evxx.exe 1088 svchost.exe 1172 svchost.exe 1272 svchost.exe 1320 svchost.exe 1428 svchost.exe 1632 Ati2evxx.exe 1736 Explorer.EXE 1828 spoolsv.exe 2004 nod32kui.exe 2012 StartupMonitor.exe 2020 fpdisp5a.exe 2028 fppdis2a.exe 2036 SOUNDMAN.EXE 2044 Error 0xD0000022 332 jusched.exe 348 ClipMate.exe 492 Buzzsaw.exe 504 K9.exe 572 Personal.exe 580 PopTray.exe 604 ProcessTamerTray.exe 620 Proxomitron.exe 648 Rainlendar.exe 708 SecureCRT.EXE 836 speedfan.exe 980 tclock.exe 1028 wswatch.exe 1260 Activator.exe 1592 CachemanXP.exe 1612 NMSAccess.exe 1712 nod32krn.exe 1468 DUC20.exe 2080 Daemon.exe 2300 ScsiAccess.exe 2328 StarWindService.exe 2344 svchost.exe 2364 wdfmgr.exe 2424 uphclean.exe 2444 Error 0xD0000022 3844 alg.exe 2172 wmiprvse.exe 3484 miranda32.exe 3608 Opera.exe 3540 agent.exe 2076 TOTALCMD.EXE 2804 DVD Shrink 3.2.exe 1628 drwtsn32.exe *----> Module List <----* (0000000000400000 - 0000000000598000: C:\Program Files\DVD Shrink\DVD Shrink 3.2.exe (00000000027e0000 - 0000000002826000: C:\WINDOWS\system32\SubtitDS.ax (0000000002940000 - 0000000002b95000: C:\Program Files\Matroska Pack\ffdshow\ffdshow.ax (0000000002ba0000 - 0000000002d09000: C:\Program Files\Common Files\Ahead\DSFilter\NeVideo.ax (0000000002f60000 - 000000000322f000: C:\Program Files\Common Files\Ahead\lib\AdvrCntr2.dll (0000000003b50000 - 0000000003c52000: C:\WINDOWS\system32\MFC71U.DLL (0000000006160000 - 000000000618c000: C:\WINDOWS\system32\ac3filter.ax (0000000006290000 - 00000000062ac000: C:\WINDOWS\system32\matrix_mixer.ax (0000000008c00000 - 0000000008c22000: C:\WINDOWS\system32\wmpasf.dll (00000000097e0000 - 0000000009821000: C:\WINDOWS\system32\DRMClien.DLL (0000000010000000 - 00000000100d0000: C:\Program Files\Matroska Pack\VSFilter.dll (000000001c400000 - 000000001c4f6000: C:\WINDOWS\system32\audxdshow.ax (000000001d1c0000 - 000000001d1d3000: C:\WINDOWS\system32\mmswitch.ax (0000000020000000 - 00000000202c5000: C:\WINDOWS\system32\xpsp2res.dll (000000005ad70000 - 000000005ada8000: C:\WINDOWS\system32\UxTheme.dll (000000005b860000 - 000000005b8b4000: C:\WINDOWS\system32\NETAPI32.dll (000000005cb70000 - 000000005cb96000: C:\WINDOWS\system32\ShimEng.dll (000000005d360000 - 000000005d36e000: C:\WINDOWS\system32\MFC71ENU.DLL (000000005df80000 - 000000005dfe0000: C:\WINDOWS\system32\qdvd.dll (000000005edd0000 - 000000005ede7000: C:\WINDOWS\system32\OLEPRO32.DLL (00000000629c0000 - 00000000629c9000: C:\WINDOWS\system32\LPK.DLL (0000000065000000 - 0000000065251000: D:\Grafik\PixVue.Com\PixVue\bin\PixVue.dll (0000000065260000 - 0000000065289000: D:\Grafik\PixVue.Com\PixVue\bin\CORE_RL_lcms_.dll (0000000065290000 - 00000000652b1000: D:\Grafik\PixVue.Com\PixVue\bin\CORE_RL_wand_.dll (00000000652c0000 - 0000000065482000: D:\Grafik\PixVue.Com\PixVue\bin\CORE_RL_magick_.dll (0000000065490000 - 00000000654f3000: D:\Grafik\PixVue.Com\PixVue\bin\CORE_RL_Magick++_.dll (0000000065500000 - 000000006555b000: D:\Grafik\PixVue.Com\PixVue\bin\CORE_RL_ttf_.dll (0000000065560000 - 000000006556a000: D:\Grafik\PixVue.Com\PixVue\bin\CORE_RL_xlib_.dll (0000000065570000 - 000000006565f000: D:\Grafik\PixVue.Com\PixVue\bin\CORE_RL_libxml_.dll (0000000065660000 - 000000006566f000: D:\Grafik\PixVue.Com\PixVue\bin\CORE_RL_bzlib_.dll (0000000065690000 - 00000000656d5000: D:\Grafik\PixVue.Com\PixVue\bin\CORE_RL_tiff_.dll (00000000656e0000 - 00000000656f2000: D:\Grafik\PixVue.Com\PixVue\bin\CORE_RL_zlib_.dll (000000006bf50000 - 000000006bfcd000: C:\WINDOWS\system32\dxmasf.dll (000000006f880000 - 000000006fa4a000: C:\WINDOWS\AppPatch\AcGenral.DLL (0000000071590000 - 0000000071604000: C:\WINDOWS\AppPatch\AcLayers.DLL (0000000071aa0000 - 0000000071aa8000: C:\WINDOWS\system32\WS2HELP.dll (0000000071ab0000 - 0000000071ac7000: C:\WINDOWS\system32\WS2_32.dll (0000000071ad0000 - 0000000071ad9000: C:\WINDOWS\system32\WSOCK32.dll (0000000071b20000 - 0000000071b32000: C:\WINDOWS\system32\MPR.dll (0000000072280000 - 00000000722aa000: C:\WINDOWS\system32\DINPUT.dll (0000000072d10000 - 0000000072d18000: C:\WINDOWS\system32\msacm32.drv (0000000072d20000 - 0000000072d29000: C:\WINDOWS\system32\wdmaud.drv (0000000073000000 - 0000000073026000: C:\WINDOWS\system32\WINSPOOL.DRV (0000000073760000 - 00000000737a9000: C:\WINDOWS\system32\DDRAW.dll (0000000073940000 - 0000000073a10000: C:\WINDOWS\system32\D3DIM700.DLL (0000000073bc0000 - 0000000073bc6000: C:\WINDOWS\system32\DCIMAN32.dll (0000000073ee0000 - 0000000073ee4000: C:\WINDOWS\system32\KsUser.dll (0000000073f10000 - 0000000073f6c000: C:\WINDOWS\system32\DSOUND.DLL (00000000746c0000 - 00000000746e7000: C:\WINDOWS\System32\msls31.dll (0000000074810000 - 000000007497c000: C:\WINDOWS\system32\quartz.dll (0000000074d30000 - 0000000074d50000: C:\WINDOWS\system32\oledlg.dll (0000000074d90000 - 0000000074dfb000: C:\WINDOWS\system32\USP10.dll (00000000754d0000 - 0000000075550000: C:\WINDOWS\system32\CRYPTUI.dll (00000000755c0000 - 00000000755ee000: C:\WINDOWS\system32\msctfime.ime (0000000075a70000 - 0000000075a91000: C:\WINDOWS\system32\MSVFW32.dll (0000000075f40000 - 0000000075f51000: C:\WINDOWS\system32\devenum.dll (0000000075f80000 - 000000007607d000: C:\WINDOWS\System32\browseui.dll (0000000076390000 - 00000000763ad000: C:\WINDOWS\system32\IMM32.DLL (00000000763b0000 - 00000000763f9000: C:\WINDOWS\system32\comdlg32.dll (0000000076600000 - 000000007661d000: C:\WINDOWS\System32\CSCDLL.dll (0000000076990000 - 00000000769b5000: C:\WINDOWS\system32\ntshrui.dll (00000000769c0000 - 0000000076a73000: C:\WINDOWS\system32\USERENV.dll (0000000076b20000 - 0000000076b31000: C:\WINDOWS\system32\ATL.DLL (0000000076b40000 - 0000000076b6d000: C:\WINDOWS\system32\WINMM.dll (0000000076c30000 - 0000000076c5e000: C:\WINDOWS\system32\WINTRUST.dll (0000000076c90000 - 0000000076cb8000: C:\WINDOWS\system32\IMAGEHLP.dll (0000000076f60000 - 0000000076f8c000: C:\WINDOWS\system32\WLDAP32.dll (0000000076fd0000 - 000000007704f000: C:\WINDOWS\system32\CLBCATQ.DLL (0000000077050000 - 0000000077115000: C:\WINDOWS\system32\COMRes.dll (0000000077120000 - 00000000771ac000: C:\WINDOWS\system32\OLEAUT32.dll (00000000771b0000 - 0000000077259000: C:\WINDOWS\system32\WININET.dll (0000000077260000 - 0000000077300000: C:\WINDOWS\system32\urlmon.dll (00000000773d0000 - 00000000774d2000: C:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.2600.2180_x-ww_a84f1ff9\comctl32.dll (00000000774e0000 - 000000007761d000: C:\WINDOWS\system32\ole32.dll (0000000077760000 - 00000000778cf000: C:\WINDOWS\system32\SHDOCVW.dll (0000000077920000 - 0000000077a13000: C:\WINDOWS\system32\SETUPAPI.dll (0000000077a20000 - 0000000077a74000: C:\WINDOWS\System32\cscui.dll (0000000077a80000 - 0000000077b14000: C:\WINDOWS\system32\CRYPT32.dll (0000000077b20000 - 0000000077b32000: C:\WINDOWS\system32\MSASN1.dll (0000000077b40000 - 0000000077b62000: C:\WINDOWS\system32\apphelp.dll (0000000077bd0000 - 0000000077bd7000: C:\WINDOWS\system32\midimap.dll (0000000077be0000 - 0000000077bf5000: C:\WINDOWS\system32\MSACM32.dll (0000000077c00000 - 0000000077c08000: C:\WINDOWS\system32\VERSION.dll (0000000077c10000 - 0000000077c68000: C:\WINDOWS\system32\msvcrt.dll (0000000077d40000 - 0000000077dd0000: C:\WINDOWS\system32\USER32.dll (0000000077dd0000 - 0000000077e6b000: C:\WINDOWS\system32\ADVAPI32.dll (0000000077e70000 - 0000000077f01000: C:\WINDOWS\system32\RPCRT4.dll (0000000077f10000 - 0000000077f57000: C:\WINDOWS\system32\GDI32.dll (0000000077f60000 - 0000000077fd6000: C:\WINDOWS\system32\SHLWAPI.dll (0000000077fe0000 - 0000000077ff1000: C:\WINDOWS\system32\Secur32.dll (000000007c140000 - 000000007c243000: C:\WINDOWS\system32\MFC71.DLL (000000007c340000 - 000000007c396000: D:\Grafik\PixVue.Com\PixVue\bin\MSVCR71.dll (000000007c3a0000 - 000000007c41b000: D:\Grafik\PixVue.Com\PixVue\bin\MSVCP71.dll (000000007c800000 - 000000007c8f4000: C:\WINDOWS\system32\kernel32.dll (000000007c900000 - 000000007c9b0000: C:\WINDOWS\system32\ntdll.dll (000000007c9c0000 - 000000007d1d5000: C:\WINDOWS\system32\SHELL32.dll (000000007dc30000 - 000000007df24000: C:\WINDOWS\System32\mshtml.dll *----> State Dump for Thread Id 0x4d8 <----* eax=0000bb80 ebx=00e43420 ecx=00000000 edx=00000000 esi=00e43534 edi=00e43598 eip=1c43092b esp=0013f210 ebp=0013f23c iopl=0 nv up ei pl nz na pe nc cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00200202 *** WARNING: Unable to verify checksum for C:\WINDOWS\system32\audxdshow.ax *** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\audxdshow.ax - function: audxdshow 1c430916 45 inc ebp 1c430917 e0c6 loopne audxdshow+0x308df (1c4308df) 1c430919 45 inc ebp 1c43091a ff01 inc dword ptr [ecx] 1c43091c 8b45f8 mov eax,[ebp-0x8] 1c43091f 83c001 add eax,0x1 1c430922 8945f8 mov [ebp-0x8],eax 1c430925 eb8b jmp audxdshow+0x308b2 (1c4308b2) 1c430927 8b4508 mov eax,[ebp+0x8] 1c43092a 99 cdq FAULT ->*** WARNING: Unable to verify checksum for C:\Program Files\DVD Shrink\DVD Shrink 3.2.exe *** ERROR: Module load completed but symbols could not be loaded for C:\Program Files\DVD Shrink\DVD Shrink 3.2.exe 1c43092b f77de0 idiv dword ptr [ebp-0x20] ss:0023:0013f21c=00000000 1c43092e 8b4ddc mov ecx,[ebp-0x24] 1c430931 894114 mov [ecx+0x14],eax 1c430934 8b450c mov eax,[ebp+0xc] 1c430937 99 cdq 1c430938 f77de0 idiv dword ptr [ebp-0x20] 1c43093b 8b55dc mov edx,[ebp-0x24] 1c43093e 894218 mov [edx+0x18],eax 1c430941 8be5 mov esp,ebp 1c430943 5d pop ebp 1c430944 c20800 ret 0x8 *----> Stack Back Trace <----* WARNING: Stack unwind information not available. Following frames may be wrong. *** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\quartz.dll - ChildEBP RetAddr Args to Child 0013f23c 1c430419 0000bb80 00000000 7c3416b8 audxdshow+0x3092b 0013f294 1c430249 00000001 00000000 0000bb80 audxdshow+0x30419 0013f2d0 1c410858 00000001 00000000 0000bb80 audxdshow+0x30249 0013f384 1c40f45a 00000000 0000bb80 0013f3cc audxdshow!DllUnregisterServer+0xc4d8 0013f3bc 1c402f29 04da6afc 01a674b0 01b0712c audxdshow!DllUnregisterServer+0xb0da 0013f3d0 1c42a411 00000000 01a67524 00000000 audxdshow+0x2f29 0013f3f4 7482cf6d 01a674bc 00000001 00d393e0 audxdshow+0x2a411 0013f414 7482ce97 00e4357c 00d39234 0013f438 quartz+0x1cf6d 0013f424 74847a38 01470150 00d393e0 00e4357c quartz+0x1ce97 0013f438 748479dc 00e4357c 01472ec0 0013f494 quartz!DllGetClassObject+0x143e1 0013f448 00431fab 00e4357c 01470150 01471c60 quartz!DllGetClassObject+0x14385 0013f494 0047bb14 00000000 0000020b 00000000 DVD Shrink 3.2+0x31fab 0013f608 004b9ef6 0013f858 01470150 00000000 DVD Shrink 3.2+0x7bb14 0013f634 004ba50c 0013f858 00000001 00514200 DVD Shrink 3.2+0xb9ef6 0013f964 004bd341 01364888 0047af34 01364888 DVD Shrink 3.2+0xba50c 0013fb98 004b260a 00514200 00000184 00000000 DVD Shrink 3.2+0xbd341 0013fbc8 004c2244 00000184 00000000 00000000 DVD Shrink 3.2+0xb260a 0013fc00 0047f02d 00000184 00000000 00000000 DVD Shrink 3.2+0xc2244 00000000 00000000 00000000 00000000 00000000 DVD Shrink 3.2+0x7f02d *----> Raw Stack Dump <----* 000000000013f210 f3 99 83 7c 14 00 00 00 - 10 a5 ca 05 00 00 00 00 ...|............ 000000000013f220 3f 00 00 00 e9 16 34 7c - 00 00 00 00 00 00 00 00 ?.....4|........ 000000000013f230 80 bb 00 00 01 00 00 00 - 4f 21 34 00 94 f2 13 00 ........O!4..... 000000000013f240 19 04 43 1c 80 bb 00 00 - 00 00 00 00 b8 16 34 7c ..C...........4| 000000000013f250 e9 16 34 7c 10 a5 ca 05 - ff ff ff ff 3f 00 00 00 ..4|........?... 000000000013f260 10 a5 ca 05 50 f2 13 00 - ff ff ff ff c4 f2 13 00 ....P........... 000000000013f270 0d 24 34 7c a8 a2 37 7c - ff ff ff ff b8 16 34 7c .$4|..7|......4| 000000000013f280 db 16 34 7c 24 00 00 00 - c4 f2 13 00 16 b6 47 1c ..4|$.........G. 000000000013f290 ff ff ff ff d0 f2 13 00 - 49 02 43 1c 01 00 00 00 ........I.C..... 000000000013f2a0 00 00 00 00 80 bb 00 00 - 0a 00 00 00 00 00 00 00 ................ 000000000013f2b0 00 00 1c 40 ff ff ff ff - 20 80 ca 05 10 a5 ca 05 ...@.... ....... 000000000013f2c0 04 00 00 00 78 f3 13 00 - eb b5 47 1c 00 00 00 00 ....x.....G..... 000000000013f2d0 84 f3 13 00 58 08 41 1c - 01 00 00 00 00 00 00 00 ....X.A......... 000000000013f2e0 80 bb 00 00 0a 00 00 00 - 00 00 00 00 00 00 1c 40 ...............@ 000000000013f2f0 34 35 e4 00 00 00 00 00 - 48 ec e4 00 80 eb e4 00 45......H....... 000000000013f300 3f 00 00 00 e9 16 34 7c - d4 00 00 00 ff ff ff ff ?.....4|........ 000000000013f310 ac f3 13 00 e0 00 00 00 - 4f 21 34 7c 90 b1 38 7c ........O!4|..8| 000000000013f320 30 80 ca 05 70 a5 ca 05 - 04 00 00 00 b8 16 34 7c 0...p.........4| 000000000013f330 e9 16 34 7c 34 35 e4 00 - ff ff ff ff 6c f3 13 00 ..4|45......l... 000000000013f340 70 a5 ca 05 30 f3 13 00 - 20 80 ca 05 b0 f3 13 00 p...0... ....... *----> State Dump for Thread Id 0x2b4 <----* eax=715aca9c ebx=00000000 ecx=7c9106eb edx=7c911596 esi=00000080 edi=00000000 eip=7c90eb94 esp=0135ff30 ebp=0135ff94 iopl=0 nv up ei pl zr na po nc cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246 *** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\ntdll.dll - function: ntdll!KiFastSystemCallRet 7c90eb89 90 nop 7c90eb8a 90 nop ntdll!KiFastSystemCall: 7c90eb8b 8bd4 mov edx,esp 7c90eb8d 0f34 sysenter 7c90eb8f 90 nop 7c90eb90 90 nop 7c90eb91 90 nop 7c90eb92 90 nop 7c90eb93 90 nop ntdll!KiFastSystemCallRet: 7c90eb94 c3 ret 7c90eb95 8da42400000000 lea esp,[esp] 7c90eb9c 8d642400 lea esp,[esp] 7c90eba0 90 nop 7c90eba1 90 nop 7c90eba2 90 nop 7c90eba3 90 nop 7c90eba4 90 nop ntdll!KiIntSystemCall: 7c90eba5 8d542408 lea edx,[esp+0x8] 7c90eba9 cd2e int 2e *----> Stack Back Trace <----* *** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\kernel32.dll - WARNING: Stack unwind information not available. Following frames may be wrong. *** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\AppPatch\AcLayers.DLL - ChildEBP RetAddr Args to Child 0135ff94 7c802542 00000080 ffffffff 00000000 ntdll!KiFastSystemCallRet 0135ffa8 715acaac 00000080 ffffffff 7c80b50b kernel32!WaitForSingleObject+0x12 0135ffec 00000000 715aca9c 00000000 00000000 AcLayers+0x1caac *----> Raw Stack Dump <----* 000000000135ff30 c0 e9 90 7c db 25 80 7c - 80 00 00 00 00 00 00 00 ...|.%.|........ 000000000135ff40 00 00 00 00 38 07 91 7c - ff ff ff ff 00 00 00 00 ....8..|........ 000000000135ff50 14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 ................ 000000000135ff60 10 00 00 00 00 00 00 00 - 00 00 00 00 00 50 fd 7f .............P.. 000000000135ff70 00 e0 fd 7f 00 00 00 00 - 00 00 00 00 44 ff 35 01 ............D.5. 000000000135ff80 02 f5 42 86 dc ff 35 01 - f3 99 83 7c 08 26 80 7c ..B...5....|.&.| 000000000135ff90 00 00 00 00 a8 ff 35 01 - 42 25 80 7c 80 00 00 00 ......5.B%.|.... 000000000135ffa0 ff ff ff ff 00 00 00 00 - ec ff 35 01 ac ca 5a 71 ..........5...Zq 000000000135ffb0 80 00 00 00 ff ff ff ff - 0b b5 80 7c 00 00 00 00 ...........|.... 000000000135ffc0 38 07 91 7c ff ff ff ff - 00 00 00 00 00 e0 fd 7f 8..|............ 000000000135ffd0 00 d6 7b 86 c0 ff 35 01 - 10 a3 59 84 ff ff ff ff ..{...5...Y..... 000000000135ffe0 f3 99 83 7c 18 b5 80 7c - 00 00 00 00 00 00 00 00 ...|...|........ 000000000135fff0 00 00 00 00 9c ca 5a 71 - 00 00 00 00 00 00 00 00 ......Zq........ 0000000001360000 00 10 10 00 00 00 00 00 - 20 00 00 00 01 00 00 a0 ........ ....... 0000000001360010 1c 00 36 01 e8 47 43 01 - 80 00 00 00 01 00 00 a0 ..6..GC......... 0000000001360020 2c 00 36 01 0c 00 36 01 - 00 02 00 00 01 00 00 a0 ,.6...6......... 0000000001360030 3c 00 36 01 1c 00 36 01 - ff ff ff ff 01 00 00 a0 <.6...6......... 0000000001360040 d4 0d 46 01 2c 00 36 01 - 00 00 05 01 50 00 36 01 ..F.,.6.....P.6. 0000000001360050 b8 58 16 00 ff ff ff ff - 00 00 00 00 00 00 00 00 .X.............. 0000000001360060 00 00 00 00 00 00 00 00 - 40 00 48 49 c8 41 00 a0 ........@.HI.A.. *----> State Dump for Thread Id 0xd10 <----* eax=016cff54 ebx=00000000 ecx=00168ad0 edx=7c90eb94 esi=00168ad0 edi=00000100 eip=7c90eb94 esp=016cfe1c ebp=016cff80 iopl=0 nv up ei pl zr na po nc cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246 function: ntdll!KiFastSystemCallRet 7c90eb89 90 nop 7c90eb8a 90 nop ntdll!KiFastSystemCall: 7c90eb8b 8bd4 mov edx,esp 7c90eb8d 0f34 sysenter 7c90eb8f 90 nop 7c90eb90 90 nop 7c90eb91 90 nop 7c90eb92 90 nop 7c90eb93 90 nop ntdll!KiFastSystemCallRet: 7c90eb94 c3 ret 7c90eb95 8da42400000000 lea esp,[esp] 7c90eb9c 8d642400 lea esp,[esp] 7c90eba0 90 nop 7c90eba1 90 nop 7c90eba2 90 nop 7c90eba3 90 nop 7c90eba4 90 nop ntdll!KiIntSystemCall: 7c90eba5 8d542408 lea edx,[esp+0x8] 7c90eba9 cd2e int 2e *----> Stack Back Trace <----* *** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\RPCRT4.dll - WARNING: Stack unwind information not available. Following frames may be wrong. ChildEBP RetAddr Args to Child 016cff80 77e76c22 016cffa8 77e76a3b 00168ad0 ntdll!KiFastSystemCallRet 016cff88 77e76a3b 00168ad0 00000000 00000000 RPCRT4!I_RpcBCacheFree+0x5ea 016cffa8 77e76c0a 00167fd8 016cffec 7c80b50b RPCRT4!I_RpcBCacheFree+0x403 016cffb4 7c80b50b 00168fb0 00000000 00000000 RPCRT4!I_RpcBCacheFree+0x5d2 016cffec 00000000 77e76bf0 00168fb0 00000000 kernel32!GetModuleFileNameA+0x1b4 *----> Raw Stack Dump <----* 00000000016cfe1c 99 e3 90 7c 03 67 e7 77 - d0 00 00 00 70 ff 6c 01 ...|.g.w....p.l. 00000000016cfe2c 00 00 00 00 c8 a0 16 00 - 54 ff 6c 01 d8 6c 51 81 ........T.l..lQ. 00000000016cfe3c 00 00 00 00 fc 3c 88 c0 - 70 af 36 86 40 01 00 00 .....<..p.6.@... 00000000016cfe4c 64 8b 0d b0 aa ec 51 80 - 40 01 00 00 70 af 36 86 d.....Q.@...p.6. 00000000016cfe5c 00 e0 fa 7f 90 8b 0d b0 - f8 1f 60 c0 6c 8b 0d b0 ..........`.l... 00000000016cfe6c 8c e9 51 80 00 e0 fa 7f - 01 00 00 00 00 00 00 00 ..Q............. 00000000016cfe7c 70 fd 3f c0 00 00 00 00 - 00 00 00 00 00 f0 fa 7f p.?............. 00000000016cfe8c 28 8c 0d b0 df f0 51 80 - 90 8b 0d b0 00 00 00 00 (.....Q......... 00000000016cfe9c 00 00 00 00 00 00 00 00 - f8 a7 00 86 78 ad 36 86 ............x.6. 00000000016cfeac 01 ae 36 86 00 00 00 00 - 70 fd 3f c0 00 00 00 00 ..6.....p.?..... 00000000016cfebc cb a5 73 f5 6c 88 00 00 - b5 8c 0d b0 04 00 00 00 ..s.l........... 00000000016cfecc e4 8c 0d b0 52 65 61 6c - 74 65 6b 20 52 54 4c 38 ....Realtek RTL8 00000000016cfedc 31 36 39 2f 38 31 31 30 - 20 46 61 6d 69 6c 79 20 169/8110 Family 00000000016cfeec 47 69 67 61 62 69 74 20 - 45 74 68 65 72 6e 65 74 Gigabit Ethernet 00000000016cfefc 20 4e 49 43 20 20 20 20 - 20 20 20 20 20 20 20 20 NIC 00000000016cff0c 20 20 20 20 20 20 20 20 - 14 e5 bb 84 24 8c 0d b0 ....$... 00000000016cff1c d9 9a 4f 80 e1 9a 4f 80 - e4 e4 bb 84 78 e3 bb 84 ..O...O.....x... 00000000016cff2c ac e3 bb 84 80 ff 6c 01 - 99 66 e7 77 4c ff 6c 01 ......l..f.wL.l. 00000000016cff3c a9 66 e7 77 ed 10 90 7c - 88 8f 16 00 b0 8f 16 00 .f.w...|........ 00000000016cff4c 00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff ../M.....]...... *----> State Dump for Thread Id 0xf54 <----* eax=774fe429 ebx=00007530 ecx=00160178 edx=00169fa8 esi=00000000 edi=017cff50 eip=7c90eb94 esp=017cff20 ebp=017cff78 iopl=0 nv up ei pl nz na po nc cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000206 function: ntdll!KiFastSystemCallRet 7c90eb89 90 nop 7c90eb8a 90 nop ntdll!KiFastSystemCall: 7c90eb8b 8bd4 mov edx,esp 7c90eb8d 0f34 sysenter 7c90eb8f 90 nop 7c90eb90 90 nop 7c90eb91 90 nop 7c90eb92 90 nop 7c90eb93 90 nop ntdll!KiFastSystemCallRet: 7c90eb94 c3 ret 7c90eb95 8da42400000000 lea esp,[esp] 7c90eb9c 8d642400 lea esp,[esp] 7c90eba0 90 nop 7c90eba1 90 nop 7c90eba2 90 nop 7c90eba3 90 nop 7c90eba4 90 nop ntdll!KiIntSystemCall: 7c90eba5 8d542408 lea edx,[esp+0x8] 7c90eba9 cd2e int 2e *----> Stack Back Trace <----* WARNING: Stack unwind information not available. Following frames may be wrong. *** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\ole32.dll - ChildEBP RetAddr Args to Child 017cff78 7c802451 0000ea60 00000000 017cffb4 ntdll!KiFastSystemCallRet 017cff88 774fe31d 0000ea60 0074a860 774fe3dc kernel32!Sleep+0xf 017cffb4 7c80b50b 0074a860 00000005 00000000 ole32!StringFromGUID2+0x51b 017cffec 00000000 774fe429 0074a860 00000000 kernel32!GetModuleFileNameA+0x1b4 *----> Raw Stack Dump <----* 00000000017cff20 5c d8 90 7c ed 23 80 7c - 00 00 00 00 50 ff 7c 01 \..|.#.|....P.|. 00000000017cff30 50 25 80 7c f8 6d 60 77 - 30 75 00 00 14 00 00 00 P%.|.m`w0u...... 00000000017cff40 01 00 00 00 00 00 00 00 - 00 00 00 00 10 00 00 00 ................ 00000000017cff50 00 ba 3c dc ff ff ff ff - 0c 00 00 00 50 ff 7c 01 ..<.........P.|. 00000000017cff60 30 ff 7c 01 97 aa 80 7c - dc ff 7c 01 f3 99 83 7c 0.|....|..|....| 00000000017cff70 58 24 80 7c 00 00 00 00 - 88 ff 7c 01 51 24 80 7c X$.|......|.Q$.| 00000000017cff80 60 ea 00 00 00 00 00 00 - b4 ff 7c 01 1d e3 4f 77 `.........|...Ow 00000000017cff90 60 ea 00 00 60 a8 74 00 - dc e3 4f 77 00 00 00 00 `...`.t...Ow.... 00000000017cffa0 05 00 00 00 60 a8 74 00 - 00 00 4e 77 44 e4 4f 77 ....`.t...NwD.Ow 00000000017cffb0 00 00 00 00 ec ff 7c 01 - 0b b5 80 7c 60 a8 74 00 ......|....|`.t. 00000000017cffc0 05 00 00 00 00 00 00 00 - 60 a8 74 00 00 c0 fd 7f ........`.t..... 00000000017cffd0 00 d6 7b 86 c0 ff 7c 01 - f0 48 52 86 ff ff ff ff ..{...|..HR..... 00000000017cffe0 f3 99 83 7c 18 b5 80 7c - 00 00 00 00 00 00 00 00 ...|...|........ 00000000017cfff0 00 00 00 00 29 e4 4f 77 - 60 a8 74 00 00 00 00 00 ....).Ow`.t..... 00000000017d0000 00 00 00 00 9f 40 13 00 - 10 00 90 01 17 00 b0 01 .....@.......... 00000000017d0010 ff ff ff 00 ff ff ff 00 - 00 00 00 00 00 00 00 00 ................ 00000000017d0020 ff ff ff 00 ff ff ff 00 - 00 00 00 00 00 00 00 00 ................ 00000000017d0030 00 00 00 00 01 00 00 00 - 0d 02 01 01 00 00 00 00 ................ 00000000017d0040 00 00 00 00 00 00 00 00 - 00 00 00 00 02 00 00 00 ................ 00000000017d0050 01 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 ................ *----> State Dump for Thread Id 0x7b8 <----* eax=00000000 ebx=00000000 ecx=00176578 edx=7c97c0a0 esi=024cff98 edi=7492374c eip=7c90eb94 esp=024cff58 ebp=024cff74 iopl=0 nv up ei pl zr na po nc cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00200246 function: ntdll!KiFastSystemCallRet 7c90eb89 90 nop 7c90eb8a 90 nop ntdll!KiFastSystemCall: 7c90eb8b 8bd4 mov edx,esp 7c90eb8d 0f34 sysenter 7c90eb8f 90 nop 7c90eb90 90 nop 7c90eb91 90 nop 7c90eb92 90 nop 7c90eb93 90 nop ntdll!KiFastSystemCallRet: 7c90eb94 c3 ret 7c90eb95 8da42400000000 lea esp,[esp] 7c90eb9c 8d642400 lea esp,[esp] 7c90eba0 90 nop 7c90eba1 90 nop 7c90eba2 90 nop 7c90eba3 90 nop 7c90eba4 90 nop ntdll!KiIntSystemCall: 7c90eba5 8d542408 lea edx,[esp+0x8] 7c90eba9 cd2e int 2e *----> Stack Back Trace <----* WARNING: Stack unwind information not available. Following frames may be wrong. ChildEBP RetAddr Args to Child 024cff74 7486e9c4 024cff98 00000000 00000000 ntdll!KiFastSystemCallRet 024cffb4 7c80b50b 00000000 7c913288 00000000 quartz+0x5e9c4 024cffec 00000000 7486e97d 00000214 00000000 kernel32!GetModuleFileNameA+0x1b4 *----> Raw Stack Dump <----* 00000000024cff58 be 91 d4 77 f1 91 d4 77 - 98 ff 4c 02 00 00 00 00 ...w...w..L..... 00000000024cff68 00 00 00 00 00 00 00 00 - 00 00 00 00 b4 ff 4c 02 ..............L. 00000000024cff78 c4 e9 86 74 98 ff 4c 02 - 00 00 00 00 00 00 00 00 ...t..L......... 00000000024cff88 00 00 00 00 88 32 91 7c - 00 00 00 00 14 02 00 00 .....2.|........ 00000000024cff98 aa 0a 05 00 00 02 00 00 - 00 00 00 00 ab 00 00 00 ................ 00000000024cffa8 fa bd 2c 00 06 01 00 00 - 11 02 00 00 ec ff 4c 02 ..,...........L. 00000000024cffb8 0b b5 80 7c 00 00 00 00 - 88 32 91 7c 00 00 00 00 ...|.....2.|.... 00000000024cffc8 14 02 00 00 00 b0 fd 7f - 00 d6 7b 86 c0 ff 4c 02 ..........{...L. 00000000024cffd8 f0 cd 38 85 ff ff ff ff - f3 99 83 7c 18 b5 80 7c ..8........|...| 00000000024cffe8 00 00 00 00 00 00 00 00 - 00 00 00 00 7d e9 86 74 ............}..t 00000000024cfff8 14 02 00 00 00 00 00 00 - 00 10 10 00 00 00 00 00 ................ 00000000024d0008 20 00 00 00 01 00 00 a0 - 1c 00 4d 02 38 4a 4d 02 .........M.8JM. 00000000024d0018 80 00 00 00 01 00 00 a0 - 2c 00 4d 02 0c 00 4d 02 ........,.M...M. 00000000024d0028 00 02 00 00 01 00 00 a0 - 3c 00 4d 02 1c 00 4d 02 ........<.M...M. 00000000024d0038 ff ff ff ff 01 00 00 a0 - 24 0d 5d 02 2c 00 4d 02 ........$.].,.M. 00000000024d0048 00 00 26 02 50 00 4d 02 - a8 fe 16 00 ff ff ff ff ..&.P.M......... 00000000024d0058 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 00000000024d0068 40 00 48 49 c8 41 00 a0 - 00 00 00 00 00 01 00 00 @.HI.A.......... 00000000024d0078 01 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 00000000024d0088 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ *----> State Dump for Thread Id 0xb2c <----* eax=1001add0 ebx=027dfa54 ecx=7c90fb71 edx=ffffffff esi=00000000 edi=7ffd5000 eip=7c90eb94 esp=027dfa2c ebp=027dfac8 iopl=0 nv up ei pl zr na po nc cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246 function: ntdll!KiFastSystemCallRet 7c90eb89 90 nop 7c90eb8a 90 nop ntdll!KiFastSystemCall: 7c90eb8b 8bd4 mov edx,esp 7c90eb8d 0f34 sysenter 7c90eb8f 90 nop 7c90eb90 90 nop 7c90eb91 90 nop 7c90eb92 90 nop 7c90eb93 90 nop ntdll!KiFastSystemCallRet: 7c90eb94 c3 ret 7c90eb95 8da42400000000 lea esp,[esp] 7c90eb9c 8d642400 lea esp,[esp] 7c90eba0 90 nop 7c90eba1 90 nop 7c90eba2 90 nop 7c90eba3 90 nop 7c90eba4 90 nop ntdll!KiIntSystemCall: 7c90eba5 8d542408 lea edx,[esp+0x8] 7c90eba9 cd2e int 2e *----> Stack Back Trace <----* WARNING: Stack unwind information not available. Following frames may be wrong. *** WARNING: Unable to verify checksum for C:\Program Files\Matroska Pack\VSFilter.dll *** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\Program Files\Matroska Pack\VSFilter.dll - ChildEBP RetAddr Args to Child 027dfac8 7c809c86 00000002 025e3510 00000000 ntdll!KiFastSystemCallRet 027dfae4 1000d74f 00000002 025e3510 00000000 kernel32!WaitForMultipleObjects+0x18 025e3a00 00000284 00000288 00000200 024d02ac VSFilter+0xd74f *----> Raw Stack Dump <----* 00000000027dfa2c ab e9 90 7c f2 94 80 7c - 02 00 00 00 54 fa 7d 02 ...|...|....T.}. 00000000027dfa3c 01 00 00 00 00 00 00 00 - 00 00 00 00 02 00 00 00 ................ 00000000027dfa4c 01 00 00 00 00 00 00 00 - 90 02 00 00 80 02 00 00 ................ 00000000027dfa5c 20 cc 97 7c 28 ce 97 7c - c2 d8 07 10 c2 d8 07 10 ..|(..|........ 00000000027dfa6c 76 02 2c 0b 00 00 00 00 - 14 00 00 00 01 00 00 00 v.,............. 00000000027dfa7c 00 00 00 00 00 00 00 00 - 10 00 00 00 78 01 6d 00 ............x.m. 00000000027dfa8c f8 fa 7d 02 18 ee 90 7c - 00 50 fd 7f 00 a0 fd 7f ..}....|.P...... 00000000027dfa9c 7e 65 91 7c 00 00 00 00 - 54 fa 7d 02 01 00 00 00 ~e.|....T.}..... 00000000027dfaac 02 00 00 00 48 fa 7d 02 - ec fa 7d 02 a0 ff 7d 02 ....H.}...}...}. 00000000027dfabc f3 99 83 7c 90 95 80 7c - 00 00 00 00 e4 fa 7d 02 ...|...|......}. 00000000027dfacc 86 9c 80 7c 02 00 00 00 - 10 35 5e 02 00 00 00 00 ...|.....5^..... 00000000027dfadc ff ff ff ff 00 00 00 00 - 00 3a 5e 02 4f d7 00 10 .........:^.O... 00000000027dfaec 02 00 00 00 10 35 5e 02 - 00 00 00 00 ff ff ff ff .....5^......... 00000000027dfafc 20 ef 4c 02 00 00 00 00 - ec ff 7d 02 00 3a 5e 02 .L.......}..:^. 00000000027dfb0c ab e7 80 7c 00 3a 5e 02 - 20 ef 4c 02 a4 ea 08 10 ...|.:^. .L..... 00000000027dfb1c 10 35 5e 02 02 00 00 00 - 05 00 00 00 00 00 00 00 .5^............. 00000000027dfb2c bc 45 08 10 00 00 00 00 - 00 00 00 00 00 00 00 00 .E.............. 00000000027dfb3c 00 00 00 00 b0 d8 07 10 - 00 00 08 02 68 fd 7d 02 ............h.}. 00000000027dfb4c 00 00 08 02 60 fb 7d 02 - 00 00 00 00 00 00 00 00 ....`.}......... 00000000027dfb5c 00 00 4e 77 40 00 00 00 - 29 30 5a 71 50 00 26 02 ..Nw@...)0ZqP.&. *----> State Dump for Thread Id 0x99c <----* eax=0072000c ebx=0628fa54 ecx=00000000 edx=0072003c esi=00000000 edi=7ffd5000 eip=7c90eb94 esp=0628fa2c ebp=0628fac8 iopl=0 nv up ei pl zr na po nc cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246 function: ntdll!KiFastSystemCallRet 7c90eb89 90 nop 7c90eb8a 90 nop ntdll!KiFastSystemCall: 7c90eb8b 8bd4 mov edx,esp 7c90eb8d 0f34 sysenter 7c90eb8f 90 nop 7c90eb90 90 nop 7c90eb91 90 nop 7c90eb92 90 nop 7c90eb93 90 nop ntdll!KiFastSystemCallRet: 7c90eb94 c3 ret 7c90eb95 8da42400000000 lea esp,[esp] 7c90eb9c 8d642400 lea esp,[esp] 7c90eba0 90 nop 7c90eba1 90 nop 7c90eba2 90 nop 7c90eba3 90 nop 7c90eba4 90 nop ntdll!KiIntSystemCall: 7c90eba5 8d542408 lea edx,[esp+0x8] 7c90eba9 cd2e int 2e *----> Stack Back Trace <----* WARNING: Stack unwind information not available. Following frames may be wrong. ChildEBP RetAddr Args to Child 0628fac8 7c809c86 00000002 025e3060 00000000 ntdll!KiFastSystemCallRet 0628fae4 1000d4c7 00000002 025e3060 00000000 kernel32!WaitForMultipleObjects+0x18 025e32a0 00000380 00000384 0073002e 00740072 VSFilter+0xd4c7 *----> Raw Stack Dump <----* 000000000628fa2c ab e9 90 7c f2 94 80 7c - 02 00 00 00 54 fa 28 06 ...|...|....T.(. 000000000628fa3c 01 00 00 00 00 00 00 00 - 00 00 00 00 02 00 00 00 ................ 000000000628fa4c 00 00 00 00 00 00 00 00 - 8c 03 00 00 74 03 00 00 ............t... 000000000628fa5c 20 cc 97 7c 28 ce 97 7c - c2 d8 07 10 c2 d8 07 10 ..|(..|........ 000000000628fa6c 51 04 9c 09 00 00 00 00 - 14 00 00 00 01 00 00 00 Q............... 000000000628fa7c 00 00 00 00 00 00 00 00 - 10 00 00 00 00 00 00 00 ................ 000000000628fa8c f8 fa 28 06 18 ee 90 7c - 00 50 fd 7f 00 90 fd 7f ..(....|.P...... 000000000628fa9c 7e 65 91 7c 00 00 00 00 - 54 fa 28 06 01 00 00 00 ~e.|....T.(..... 000000000628faac 02 00 00 00 48 fa 28 06 - ec fa 28 06 a0 ff 28 06 ....H.(...(...(. 000000000628fabc f3 99 83 7c 90 95 80 7c - 00 00 00 00 e4 fa 28 06 ...|...|......(. 000000000628facc 86 9c 80 7c 02 00 00 00 - 60 30 5e 02 00 00 00 00 ...|....`0^..... 000000000628fadc ff ff ff ff 00 00 00 00 - a0 32 5e 02 c7 d4 00 10 .........2^..... 000000000628faec 02 00 00 00 60 30 5e 02 - 00 00 00 00 ff ff ff ff ....`0^......... 000000000628fafc 4c fa 4c 02 00 00 00 00 - ec ff 28 06 a0 32 5e 02 L.L.......(..2^. 000000000628fb0c ab e7 80 7c a0 32 5e 02 - 4c fa 4c 02 a4 ea 08 10 ...|.2^.L.L..... 000000000628fb1c 60 30 5e 02 02 00 00 00 - 05 00 00 00 00 00 00 00 `0^............. 000000000628fb2c bc 45 08 10 00 00 00 00 - 00 00 00 00 00 00 00 00 .E.............. 000000000628fb3c 00 00 00 00 b0 d8 07 10 - 00 00 08 02 68 fd 28 06 ............h.(. 000000000628fb4c 00 00 08 02 60 fb 28 06 - 00 00 00 00 00 00 00 00 ....`.(......... 000000000628fb5c 00 00 4e 77 40 00 00 00 - 3f 00 00 00 00 00 00 00 ..Nw@...?....... *----> State Dump for Thread Id 0x710 <----* eax=72d230e8 ebx=065cfef8 ecx=001764c8 edx=72d200e8 esi=00000000 edi=7ffd5000 eip=7c90eb94 esp=065cfed0 ebp=065cff6c iopl=0 nv up ei pl zr na po nc cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246 function: ntdll!KiFastSystemCallRet 7c90eb89 90 nop 7c90eb8a 90 nop ntdll!KiFastSystemCall: 7c90eb8b 8bd4 mov edx,esp 7c90eb8d 0f34 sysenter 7c90eb8f 90 nop 7c90eb90 90 nop 7c90eb91 90 nop 7c90eb92 90 nop 7c90eb93 90 nop ntdll!KiFastSystemCallRet: 7c90eb94 c3 ret 7c90eb95 8da42400000000 lea esp,[esp] 7c90eb9c 8d642400 lea esp,[esp] 7c90eba0 90 nop 7c90eba1 90 nop 7c90eba2 90 nop 7c90eba3 90 nop 7c90eba4 90 nop ntdll!KiIntSystemCall: 7c90eba5 8d542408 lea edx,[esp+0x8] 7c90eba9 cd2e int 2e *----> Stack Back Trace <----* WARNING: Stack unwind information not available. Following frames may be wrong. *** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\wdmaud.drv - ChildEBP RetAddr Args to Child 065cff6c 7c809c86 00000002 065cffa4 00000000 ntdll!KiFastSystemCallRet 065cff88 72d2312a 00000002 065cffa4 00000000 kernel32!WaitForMultipleObjects+0x18 065cffb4 7c80b50b 00000000 00000000 00000000 wdmaud!midMessage+0x348 065cffec 00000000 72d230e8 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4 *----> Raw Stack Dump <----* 00000000065cfed0 ab e9 90 7c f2 94 80 7c - 02 00 00 00 f8 fe 5c 06 ...|...|......\. 00000000065cfee0 01 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 00000000065cfef0 00 00 00 00 00 00 00 00 - c4 03 00 00 b8 03 00 00 ................ 00000000065cff00 ff ff ff ff b8 7c 9b f2 - bc 7c 9b f2 00 80 00 00 .....|...|...... 00000000065cff10 14 7d 9b f2 bc a1 c6 84 - 14 00 00 00 01 00 00 00 .}.............. 00000000065cff20 00 00 00 00 00 00 00 00 - 10 00 00 00 54 a0 c6 84 ............T... 00000000065cff30 90 8c 3a 85 8e 83 63 80 - 00 50 fd 7f 00 80 fd 7f ..:...c..P...... 00000000065cff40 00 80 fd 7f 00 00 00 00 - f8 fe 5c 06 00 00 00 00 ..........\..... 00000000065cff50 02 00 00 00 ec fe 5c 06 - 00 00 00 00 dc ff 5c 06 ......\.......\. 00000000065cff60 f3 99 83 7c 90 95 80 7c - 00 00 00 00 88 ff 5c 06 ...|...|......\. 00000000065cff70 86 9c 80 7c 02 00 00 00 - a4 ff 5c 06 00 00 00 00 ...|......\..... 00000000065cff80 ff ff ff ff 00 00 00 00 - b4 ff 5c 06 2a 31 d2 72 ..........\.*1.r 00000000065cff90 02 00 00 00 a4 ff 5c 06 - 00 00 00 00 ff ff ff ff ......\......... 00000000065cffa0 00 00 00 00 c4 03 00 00 - b8 03 00 00 00 00 00 00 ................ 00000000065cffb0 dc e2 90 7c ec ff 5c 06 - 0b b5 80 7c 00 00 00 00 ...|..\....|.... 00000000065cffc0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 80 fd 7f ................ 00000000065cffd0 00 d6 7b 86 c0 ff 5c 06 - 20 18 bf 84 ff ff ff ff ..{...\. ....... 00000000065cffe0 f3 99 83 7c 18 b5 80 7c - 00 00 00 00 00 00 00 00 ...|...|........ 00000000065cfff0 00 00 00 00 e8 30 d2 72 - 00 00 00 00 00 00 00 00 .....0.r........ 00000000065d0000 c8 00 00 00 fd 01 00 00 - ff ee ff ee 02 10 00 00 ................ *----> State Dump for Thread Id 0x970 <----* eax=7c92798d ebx=00000000 ecx=00000000 edx=7ffdfc00 esi=00000000 edi=00000000 eip=7c90eb94 esp=068dff9c ebp=068dffb4 iopl=0 nv up ei pl zr na po nc cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246 function: ntdll!KiFastSystemCallRet 7c90eb89 90 nop 7c90eb8a 90 nop ntdll!KiFastSystemCall: 7c90eb8b 8bd4 mov edx,esp 7c90eb8d 0f34 sysenter 7c90eb8f 90 nop 7c90eb90 90 nop 7c90eb91 90 nop 7c90eb92 90 nop 7c90eb93 90 nop ntdll!KiFastSystemCallRet: 7c90eb94 c3 ret 7c90eb95 8da42400000000 lea esp,[esp] 7c90eb9c 8d642400 lea esp,[esp] 7c90eba0 90 nop 7c90eba1 90 nop 7c90eba2 90 nop 7c90eba3 90 nop 7c90eba4 90 nop ntdll!KiIntSystemCall: 7c90eba5 8d542408 lea edx,[esp+0x8] 7c90eba9 cd2e int 2e *----> Stack Back Trace <----* WARNING: Stack unwind information not available. Following frames may be wrong. ChildEBP RetAddr Args to Child 068dffb4 7c80b50b 00000000 00000000 00000000 ntdll!KiFastSystemCallRet 068dffec 00000000 7c92798d 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4 *----> Raw Stack Dump <----* 00000000068dff9c 5c d8 90 7c d4 79 92 7c - 01 00 00 00 ac ff 8d 06 \..|.y.|........ 00000000068dffac 00 00 00 00 00 00 00 80 - ec ff 8d 06 0b b5 80 7c ...............| 00000000068dffbc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 00000000068dffcc 00 70 fd 7f 00 d6 7b 86 - c0 ff 8d 06 30 c6 34 85 .p....{.....0.4. 00000000068dffdc ff ff ff ff f3 99 83 7c - 18 b5 80 7c 00 00 00 00 .......|...|.... 00000000068dffec 00 00 00 00 00 00 00 00 - 8d 79 92 7c 00 00 00 00 .........y.|.... 00000000068dfffc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 00000000068e000c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 00000000068e001c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 00000000068e002c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 00000000068e003c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 00000000068e004c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 00000000068e005c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 00000000068e006c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 00000000068e007c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 00000000068e008c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 00000000068e009c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 00000000068e00ac 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 00000000068e00bc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 00000000068e00cc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ *----> State Dump for Thread Id 0xe78 <----* eax=7c910760 ebx=00000000 ecx=7c91056d edx=00000020 esi=7c97c380 edi=7c97c3a0 eip=7c90eb94 esp=069dff70 ebp=069dffb4 iopl=0 nv up ei ng nz na po nc cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000286 function: ntdll!KiFastSystemCallRet 7c90eb89 90 nop 7c90eb8a 90 nop ntdll!KiFastSystemCall: 7c90eb8b 8bd4 mov edx,esp 7c90eb8d 0f34 sysenter 7c90eb8f 90 nop 7c90eb90 90 nop 7c90eb91 90 nop 7c90eb92 90 nop 7c90eb93 90 nop ntdll!KiFastSystemCallRet: 7c90eb94 c3 ret 7c90eb95 8da42400000000 lea esp,[esp] 7c90eb9c 8d642400 lea esp,[esp] 7c90eba0 90 nop 7c90eba1 90 nop 7c90eba2 90 nop 7c90eba3 90 nop 7c90eba4 90 nop ntdll!KiIntSystemCall: 7c90eba5 8d542408 lea edx,[esp+0x8] 7c90eba9 cd2e int 2e *----> Stack Back Trace <----* WARNING: Stack unwind information not available. Following frames may be wrong. ChildEBP RetAddr Args to Child 069dffb4 7c80b50b 00000000 0013da84 0013da84 ntdll!KiFastSystemCallRet 069dffec 00000000 7c910760 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4 *----> Raw Stack Dump <----* 00000000069dff70 1b e3 90 7c 9d 07 91 7c - f4 04 00 00 ac ff 9d 06 ...|...|........ 00000000069dff80 b0 ff 9d 06 98 ff 9d 06 - a0 ff 9d 06 84 da 13 00 ................ 00000000069dff90 84 da 13 00 00 00 00 00 - 00 00 00 00 d8 0c 79 00 ..............y. 00000000069dffa0 00 7c 28 e8 ff ff ff ff - 35 0c 6d 80 69 75 92 7c .|(.....5.m.iu.| 00000000069dffb0 68 56 17 00 ec ff 9d 06 - 0b b5 80 7c 00 00 00 00 hV.........|.... 00000000069dffc0 84 da 13 00 84 da 13 00 - 00 00 00 00 00 60 fd 7f .............`.. 00000000069dffd0 00 d6 7b 86 c0 ff 9d 06 - 30 c6 34 85 ff ff ff ff ..{.....0.4..... 00000000069dffe0 f3 99 83 7c 18 b5 80 7c - 00 00 00 00 00 00 00 00 ...|...|........ 00000000069dfff0 00 00 00 00 60 07 91 7c - 00 00 00 00 00 00 00 00 ....`..|........ 00000000069e0000 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 00000000069e0010 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 00000000069e0020 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 00000000069e0030 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 00000000069e0040 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 00000000069e0050 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 00000000069e0060 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 00000000069e0070 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 00000000069e0080 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 00000000069e0090 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 00000000069e00a0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ *----> State Dump for Thread Id 0xb58 <----* eax=7c910760 ebx=00000000 ecx=7c9c5118 edx=00000020 esi=7c97c380 edi=7c97c3a0 eip=7c90eb94 esp=06adff70 ebp=06adffb4 iopl=0 nv up ei ng nz na po nc cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000286 function: ntdll!KiFastSystemCallRet 7c90eb89 90 nop 7c90eb8a 90 nop ntdll!KiFastSystemCall: 7c90eb8b 8bd4 mov edx,esp 7c90eb8d 0f34 sysenter 7c90eb8f 90 nop 7c90eb90 90 nop 7c90eb91 90 nop 7c90eb92 90 nop 7c90eb93 90 nop ntdll!KiFastSystemCallRet: 7c90eb94 c3 ret 7c90eb95 8da42400000000 lea esp,[esp] 7c90eb9c 8d642400 lea esp,[esp] 7c90eba0 90 nop 7c90eba1 90 nop 7c90eba2 90 nop 7c90eba3 90 nop 7c90eba4 90 nop ntdll!KiIntSystemCall: 7c90eba5 8d542408 lea edx,[esp+0x8] 7c90eba9 cd2e int 2e *----> Stack Back Trace <----* WARNING: Stack unwind information not available. Following frames may be wrong. ChildEBP RetAddr Args to Child 06adffb4 7c80b50b 00000000 0013d3b0 0013d3b0 ntdll!KiFastSystemCallRet 06adffec 00000000 7c910760 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4 *----> Raw Stack Dump <----* 0000000006adff70 1b e3 90 7c 9d 07 91 7c - f4 04 00 00 ac ff ad 06 ...|...|........ 0000000006adff80 b0 ff ad 06 98 ff ad 06 - a0 ff ad 06 b0 d3 13 00 ................ 0000000006adff90 b0 d3 13 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 0000000006adffa0 00 7c 28 e8 ff ff ff ff - 35 0c 6d 80 00 00 00 00 .|(.....5.m..... 0000000006adffb0 dc e2 90 7c ec ff ad 06 - 0b b5 80 7c 00 00 00 00 ...|.......|.... 0000000006adffc0 b0 d3 13 00 b0 d3 13 00 - 00 00 00 00 00 40 fd 7f .............@.. 0000000006adffd0 00 d6 7b 86 c0 ff ad 06 - 30 c6 34 85 ff ff ff ff ..{.....0.4..... 0000000006adffe0 f3 99 83 7c 18 b5 80 7c - 00 00 00 00 00 00 00 00 ...|...|........ 0000000006adfff0 00 00 00 00 60 07 91 7c - 00 00 00 00 00 00 00 00 ....`..|........ 0000000006ae0000 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 0000000006ae0010 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 0000000006ae0020 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 0000000006ae0030 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 0000000006ae0040 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 0000000006ae0050 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 0000000006ae0060 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 0000000006ae0070 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 0000000006ae0080 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 0000000006ae0090 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 0000000006ae00a0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ *----> State Dump for Thread Id 0xe4c <----* eax=00000000 ebx=00000000 ecx=00150674 edx=7f672eff esi=7c97c380 edi=7c97c3a0 eip=7c90eb94 esp=06bdff70 ebp=06bdffb4 iopl=0 nv up ei ng nz na po nc cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000286 function: ntdll!KiFastSystemCallRet 7c90eb89 90 nop 7c90eb8a 90 nop ntdll!KiFastSystemCall: 7c90eb8b 8bd4 mov edx,esp 7c90eb8d 0f34 sysenter 7c90eb8f 90 nop 7c90eb90 90 nop 7c90eb91 90 nop 7c90eb92 90 nop 7c90eb93 90 nop ntdll!KiFastSystemCallRet: 7c90eb94 c3 ret 7c90eb95 8da42400000000 lea esp,[esp] 7c90eb9c 8d642400 lea esp,[esp] 7c90eba0 90 nop 7c90eba1 90 nop 7c90eba2 90 nop 7c90eba3 90 nop 7c90eba4 90 nop ntdll!KiIntSystemCall: 7c90eba5 8d542408 lea edx,[esp+0x8] 7c90eba9 cd2e int 2e *----> Stack Back Trace <----* WARNING: Stack unwind information not available. Following frames may be wrong. ChildEBP RetAddr Args to Child 06bdffb4 7c80b50b 00000000 0013ca7c 0013ca7c ntdll!KiFastSystemCallRet 06bdffec 00000000 7c910760 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4 *----> Raw Stack Dump <----* 0000000006bdff70 1b e3 90 7c 9d 07 91 7c - f4 04 00 00 ac ff bd 06 ...|...|........ 0000000006bdff80 b0 ff bd 06 98 ff bd 06 - a0 ff bd 06 7c ca 13 00 ............|... 0000000006bdff90 7c ca 13 00 00 00 00 00 - 00 00 00 00 1c b9 7a 00 |.............z. 0000000006bdffa0 00 7c 28 e8 ff ff ff ff - 35 0c 6d 80 69 75 92 7c .|(.....5.m.iu.| 0000000006bdffb0 a8 7d 17 00 ec ff bd 06 - 0b b5 80 7c 00 00 00 00 .}.........|.... 0000000006bdffc0 7c ca 13 00 7c ca 13 00 - 00 00 00 00 00 f0 fa 7f |...|........... 0000000006bdffd0 00 d6 7b 86 c0 ff bd 06 - c8 a6 63 84 ff ff ff ff ..{.......c..... 0000000006bdffe0 f3 99 83 7c 18 b5 80 7c - 00 00 00 00 00 00 00 00 ...|...|........ 0000000006bdfff0 00 00 00 00 60 07 91 7c - 00 00 00 00 00 00 00 00 ....`..|........ 0000000006be0000 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 0000000006be0010 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 0000000006be0020 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 0000000006be0030 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 0000000006be0040 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 0000000006be0050 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 0000000006be0060 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 0000000006be0070 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 0000000006be0080 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 0000000006be0090 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 0000000006be00a0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ *----> State Dump for Thread Id 0x9b8 <----* eax=00000000 ebx=06cdfed4 ecx=00e4eca4 edx=7c90eb94 esi=00000000 edi=7ffd5000 eip=7c90eb94 esp=06cdfeac ebp=06cdff48 iopl=0 nv up ei pl zr na po nc cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246 function: ntdll!KiFastSystemCallRet 7c90eb89 90 nop 7c90eb8a 90 nop ntdll!KiFastSystemCall: 7c90eb8b 8bd4 mov edx,esp 7c90eb8d 0f34 sysenter 7c90eb8f 90 nop 7c90eb90 90 nop 7c90eb91 90 nop 7c90eb92 90 nop 7c90eb93 90 nop ntdll!KiFastSystemCallRet: 7c90eb94 c3 ret 7c90eb95 8da42400000000 lea esp,[esp] 7c90eb9c 8d642400 lea esp,[esp] 7c90eba0 90 nop 7c90eba1 90 nop 7c90eba2 90 nop 7c90eba3 90 nop 7c90eba4 90 nop ntdll!KiIntSystemCall: 7c90eba5 8d542408 lea edx,[esp+0x8] 7c90eba9 cd2e int 2e *----> Stack Back Trace <----* WARNING: Stack unwind information not available. Following frames may be wrong. ChildEBP RetAddr Args to Child 06cdff48 7c809c86 00000003 06cdff88 00000000 ntdll!KiFastSystemCallRet 06cdff64 7484b5a6 00000003 06cdff88 00000000 kernel32!WaitForMultipleObjects+0x18 06cdffac 7484c534 06cdffec 7c80b50b 00e4eca4 quartz!DllCanUnloadNow+0x28c6 06cdffb4 7c80b50b 00e4eca4 7ffd5000 7c901005 quartz!DllCanUnloadNow+0x3854 06cdffec 00000000 7484c527 00e4eca4 00000000 kernel32!GetModuleFileNameA+0x1b4 *----> Raw Stack Dump <----* 0000000006cdfeac ab e9 90 7c f2 94 80 7c - 03 00 00 00 d4 fe cd 06 ...|...|........ 0000000006cdfebc 01 00 00 00 00 00 00 00 - 08 ff cd 06 88 d1 2c 00 ..............,. 0000000006cdfecc a4 ec e4 00 00 00 00 00 - ec 03 00 00 f0 03 00 00 ................ 0000000006cdfedc f8 03 00 00 00 00 00 00 - 40 c3 b5 d6 a0 ff cd 06 ........@....... 0000000006cdfeec 00 00 00 00 62 69 74 20 - 14 00 00 00 01 00 00 00 ....bit ........ 0000000006cdfefc 00 00 00 00 00 00 00 00 - 10 00 00 00 c0 bd f0 ff ................ 0000000006cdff0c ff ff ff ff 20 20 20 20 - 00 50 fd 7f 00 e0 fa 7f .... .P...... 0000000006cdff1c d9 9a 4f 80 08 ff cd 06 - d4 fe cd 06 00 00 00 00 ..O............. 0000000006cdff2c 03 00 00 00 c8 fe cd 06 - 87 4e b4 76 dc ff cd 06 .........N.v.... 0000000006cdff3c f3 99 83 7c 90 95 80 7c - 00 00 00 00 64 ff cd 06 ...|...|....d... 0000000006cdff4c 86 9c 80 7c 03 00 00 00 - 88 ff cd 06 00 00 00 00 ...|............ 0000000006cdff5c 64 00 00 00 00 00 00 00 - ac ff cd 06 a6 b5 84 74 d..............t 0000000006cdff6c 03 00 00 00 88 ff cd 06 - 00 00 00 00 64 00 00 00 ............d... 0000000006cdff7c 00 50 fd 7f 05 10 90 7c - a4 ec e4 00 ec 03 00 00 .P.....|........ 0000000006cdff8c f0 03 00 00 f8 03 00 00 - 00 00 00 00 00 00 00 00 ................ 0000000006cdff9c 00 00 00 00 f8 eb e4 00 - 64 00 00 00 03 00 00 00 ........d....... 0000000006cdffac b4 ff cd 06 34 c5 84 74 - ec ff cd 06 0b b5 80 7c ....4..t.......| 0000000006cdffbc a4 ec e4 00 00 50 fd 7f - 05 10 90 7c a4 ec e4 00 .....P.....|.... 0000000006cdffcc 00 e0 fa 7f 00 d6 7b 86 - c0 ff cd 06 10 e7 32 86 ......{.......2. 0000000006cdffdc ff ff ff ff f3 99 83 7c - 18 b5 80 7c 00 00 00 00 .......|...|.... *----> State Dump for Thread Id 0x180 <----* eax=73f1b94b ebx=00177bb8 ecx=ffffffff edx=7c916928 esi=00000000 edi=7ffd5000 eip=7c90eb94 esp=06ddfd88 ebp=06ddfe24 iopl=0 nv up ei pl zr na po nc cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246 function: ntdll!KiFastSystemCallRet 7c90eb89 90 nop 7c90eb8a 90 nop ntdll!KiFastSystemCall: 7c90eb8b 8bd4 mov edx,esp 7c90eb8d 0f34 sysenter 7c90eb8f 90 nop 7c90eb90 90 nop 7c90eb91 90 nop 7c90eb92 90 nop 7c90eb93 90 nop ntdll!KiFastSystemCallRet: 7c90eb94 c3 ret 7c90eb95 8da42400000000 lea esp,[esp] 7c90eb9c 8d642400 lea esp,[esp] 7c90eba0 90 nop 7c90eba1 90 nop 7c90eba2 90 nop 7c90eba3 90 nop 7c90eba4 90 nop ntdll!KiIntSystemCall: 7c90eba5 8d542408 lea edx,[esp+0x8] 7c90eba9 cd2e int 2e *----> Stack Back Trace <----* WARNING: Stack unwind information not available. Following frames may be wrong. *** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\DSOUND.DLL - ChildEBP RetAddr Args to Child 06ddfe24 7c809c86 00000040 06ddfe78 00000000 ntdll!KiFastSystemCallRet 06ddfe40 73f114a2 00000040 06ddfe78 00000000 kernel32!WaitForMultipleObjects+0x18 06ddfe58 73f1294a 00000040 ffffffff 00000000 DSOUND+0x14a2 06ddff78 73f19fbf ffffffff 0000003f 065d7ed0 DSOUND+0x294a 06ddff98 73f1297e 065d75a8 065d7e84 73f1b993 DSOUND!DirectSoundCreate+0x537c 06ddffb4 7c80b50b 065d7e84 065d75a8 0013f0f4 DSOUND+0x297e 06ddffec 00000000 73f1b94b 065d7e84 00000000 kernel32!GetModuleFileNameA+0x1b4 *----> Raw Stack Dump <----* 0000000006ddfd88 ab e9 90 7c f2 94 80 7c - 40 00 00 00 b8 7b 17 00 ...|...|@....{.. 0000000006ddfd98 01 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 0000000006ddfda8 40 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 @............... 0000000006ddfdb8 00 00 00 00 00 00 00 00 - 38 00 00 00 23 00 00 00 ........8...#... 0000000006ddfdc8 23 00 00 00 a8 75 5d 06 - 14 00 00 00 01 00 00 00 #....u]......... 0000000006ddfdd8 00 00 00 00 00 00 00 00 - 10 00 00 00 a6 68 91 7c .............h.| 0000000006ddfde8 56 08 81 7c 1b 00 00 00 - 00 50 fd 7f 00 d0 fa 7f V..|.....P...... 0000000006ddfdf8 00 d0 fa 7f 00 00 00 00 - b8 7b 17 00 00 00 00 00 .........{...... 0000000006ddfe08 40 00 00 00 a4 fd dd 06 - 00 00 00 00 dc ff dd 06 @............... 0000000006ddfe18 f3 99 83 7c 90 95 80 7c - 00 00 00 00 40 fe dd 06 ...|...|....@... 0000000006ddfe28 86 9c 80 7c 40 00 00 00 - 78 fe dd 06 00 00 00 00 ...|@...x....... 0000000006ddfe38 ff ff ff ff 00 00 00 00 - 58 fe dd 06 a2 14 f1 73 ........X......s 0000000006ddfe48 40 00 00 00 78 fe dd 06 - 00 00 00 00 ff ff ff ff @...x........... 0000000006ddfe58 78 ff dd 06 4a 29 f1 73 - 40 00 00 00 ff ff ff ff x...J).s@....... 0000000006ddfe68 00 00 00 00 78 fe dd 06 - 84 7e 5d 06 84 7e 5d 06 ....x....~]..~]. 0000000006ddfe78 78 05 00 00 0c 00 00 00 - d4 04 00 00 b0 04 00 00 x............... 0000000006ddfe88 b4 04 00 00 ac 04 00 00 - a8 04 00 00 a4 04 00 00 ................ 0000000006ddfe98 a0 04 00 00 9c 04 00 00 - 98 04 00 00 94 04 00 00 ................ 0000000006ddfea8 90 04 00 00 8c 04 00 00 - 88 04 00 00 84 04 00 00 ................ 0000000006ddfeb8 80 04 00 00 7c 04 00 00 - 78 04 00 00 74 04 00 00 ....|...x...t... *----> State Dump for Thread Id 0x294 <----* eax=73f1b94b ebx=06edfdb8 ecx=73f13de0 edx=7c9106eb esi=00000000 edi=7ffd5000 eip=7c90eb94 esp=06edfd90 ebp=06edfe2c iopl=0 nv up ei pl zr na po nc cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246 function: ntdll!KiFastSystemCallRet 7c90eb89 90 nop 7c90eb8a 90 nop ntdll!KiFastSystemCall: 7c90eb8b 8bd4 mov edx,esp 7c90eb8d 0f34 sysenter 7c90eb8f 90 nop 7c90eb90 90 nop 7c90eb91 90 nop 7c90eb92 90 nop 7c90eb93 90 nop ntdll!KiFastSystemCallRet: 7c90eb94 c3 ret 7c90eb95 8da42400000000 lea esp,[esp] 7c90eb9c 8d642400 lea esp,[esp] 7c90eba0 90 nop 7c90eba1 90 nop 7c90eba2 90 nop 7c90eba3 90 nop 7c90eba4 90 nop ntdll!KiIntSystemCall: 7c90eba5 8d542408 lea edx,[esp+0x8] 7c90eba9 cd2e int 2e *----> Stack Back Trace <----* WARNING: Stack unwind information not available. Following frames may be wrong. ChildEBP RetAddr Args to Child 06edfe2c 7c809c86 00000001 06edfe80 00000000 ntdll!KiFastSystemCallRet 06edfe48 73f114a2 00000001 06edfe80 00000000 kernel32!WaitForMultipleObjects+0x18 06edfe60 73f1294a 00000001 000001f4 00000000 DSOUND+0x14a2 06edff80 73f12a13 000001f4 00000000 00000000 DSOUND+0x294a 06edffb4 7c80b50b 065d1efc 00000000 7c911538 DSOUND+0x2a13 06edffec 00000000 73f1b94b 065d1efc 00000000 kernel32!GetModuleFileNameA+0x1b4 *----> Raw Stack Dump <----* 0000000006edfd90 ab e9 90 7c f2 94 80 7c - 01 00 00 00 b8 fd ed 06 ...|...|........ 0000000006edfda0 01 00 00 00 00 00 00 00 - ec fd ed 06 00 00 00 00 ................ 0000000006edfdb0 01 00 00 00 01 00 00 00 - 8c 05 00 00 00 00 00 00 ................ 0000000006edfdc0 38 00 00 00 23 00 00 00 - 23 00 00 00 00 00 00 00 8...#...#....... 0000000006edfdd0 38 15 91 7c fc 1e 5d 06 - 14 00 00 00 01 00 00 00 8..|..]......... 0000000006edfde0 00 00 00 00 00 00 00 00 - 10 00 00 00 c0 b4 b3 ff ................ 0000000006edfdf0 ff ff ff ff fc ff ed 06 - 00 50 fd 7f 00 c0 fa 7f .........P...... 0000000006edfe00 5f 3e 4f 80 ec fd ed 06 - b8 fd ed 06 00 e0 58 84 _>O...........X. 0000000006edfe10 01 00 00 00 ac fd ed 06 - 98 00 00 00 dc ff ed 06 ................ 0000000006edfe20 f3 99 83 7c 90 95 80 7c - 00 00 00 00 48 fe ed 06 ...|...|....H... 0000000006edfe30 86 9c 80 7c 01 00 00 00 - 80 fe ed 06 00 00 00 00 ...|............ 0000000006edfe40 f4 01 00 00 00 00 00 00 - 60 fe ed 06 a2 14 f1 73 ........`......s 0000000006edfe50 01 00 00 00 80 fe ed 06 - 00 00 00 00 f4 01 00 00 ................ 0000000006edfe60 80 ff ed 06 4a 29 f1 73 - 01 00 00 00 f4 01 00 00 ....J).s........ 0000000006edfe70 00 00 00 00 80 fe ed 06 - fc 1e 5d 06 fc 1e 5d 06 ..........]...]. 0000000006edfe80 8c 05 00 00 78 df 58 84 - 80 6b 80 f2 47 05 5b 80 ....x.X..k..G.[. 0000000006edfe90 e0 63 7c 86 58 1c 00 e1 - 80 66 55 86 30 f7 7a 86 .c|.X....fU.0.z. 0000000006edfea0 c8 6b 80 f2 dd 05 5b 80 - ab e9 90 7c f2 94 80 7c .k....[....|...| 0000000006edfeb0 00 c0 fa 7f 44 ff ed 06 - ab 95 80 7c f0 fe ed 06 ....D......|.... 0000000006edfec0 22 95 80 7c 00 00 00 00 - fc 1e 5d 06 fc 1e 5d 06 "..|......]...].