Microsoft (R) DrWtsn32 Copyright (C) 1985-2001 Microsoft Corp. Alle Rechte vorbehalten. Anwendungsausnahme aufgetreten: Anwendung: C:\WINDOWS\explorer.exe (pid=1260) Wann: 16.07.2008 @ 21:28:22.684 Ausnahmenummer: c0000005 (Zugriffsverletzung) *----> Systeminformationen <----* Computername: FLORIAN Benutzername: Flo Terminalsitzungskennung: 0 Prozessoranzahl: 2 Prozessortyp: x86 Family 6 Model 15 Stepping 6 Windows-Version: 5.1 Aktuelles Build: 2600 Service Pack: 2 Aktueller Typ: Multiprocessor Free Firma: Besitzer: Florian *----> Taskliste <----* 0 System Process 4 System 860 smss.exe 924 csrss.exe 948 winlogon.exe 992 services.exe 1004 lsass.exe 1180 svchost.exe 1268 svchost.exe 1392 svchost.exe 1536 svchost.exe 1640 svchost.exe 1848 spoolsv.exe 1912 sched.exe 404 kentbcli.exe 452 CTDVDDET.EXE 464 DLLML.exe 500 VolPanlu.exe 516 CTHELPER.EXE 568 CTXFIHLP.EXE 612 avgnt.exe 652 CTXFISPI.EXE 660 RUNDLL32.EXE 672 shwicon2k.exe 680 itype.exe 716 ctfmon.exe 752 EAXLoadr.exe 1204 NotiMan.exe 1348 avfwsvc.exe 1372 avguard.exe 1384 avesvc.exe 1432 CTsvcCDA.exe 1520 KENCLI.EXE 1596 nvsvc32.exe 1684 PnkBstrA.exe 448 avmailc.exe 436 AVWEBGRD.EXE 2648 alg.exe 3752 wuauclt.exe 2404 wscntfy.exe 392 firefox.exe 2932 ICQ.exe 3136 svchost.exe 200 rundll32.exe 3364 Alcohol.exe 3700 msiexec.exe 3388 svchost.exe 1260 explorer.exe 3996 drwtsn32.exe *----> Modulliste <----* (0000000001000000 - 00000000010ff000: C:\WINDOWS\explorer.exe (0000000001840000 - 0000000001853000: C:\WINDOWS\system32\browselc.dll (0000000001e90000 - 0000000001ea9000: C:\WINDOWS\system32\odbcint.dll (0000000002000000 - 0000000002006000: C:\WINDOWS\system32\ctagent.dll (0000000010930000 - 0000000010979000: C:\WINDOWS\system32\PortableDeviceApi.dll (00000000109c0000 - 00000000109ec000: C:\WINDOWS\system32\PortableDeviceTypes.dll (00000000164a0000 - 00000000164c3000: C:\WINDOWS\system32\WPDShServiceObj.dll (0000000020000000 - 00000000202d9000: C:\WINDOWS\system32\xpsp2res.dll (000000004d5c0000 - 000000004d618000: C:\WINDOWS\system32\WINHTTP.dll (00000000597d0000 - 0000000059824000: C:\WINDOWS\system32\NETAPI32.dll (000000005b0f0000 - 000000005b128000: C:\WINDOWS\system32\UxTheme.dll (000000005b9b0000 - 000000005ba22000: C:\WINDOWS\system32\themeui.dll (000000005cf00000 - 000000005cf26000: C:\WINDOWS\system32\ShimEng.dll (000000005d450000 - 000000005d4e7000: C:\WINDOWS\system32\comctl32.dll (0000000060010000 - 0000000060043000: C:\WINDOWS\system32\msutb.dll (000000006c670000 - 000000006c6bd000: C:\WINDOWS\system32\DUSER.dll (000000006fd90000 - 000000006ff5a000: C:\WINDOWS\AppPatch\AcGenral.DLL (0000000071a00000 - 0000000071a08000: C:\WINDOWS\system32\WS2HELP.dll (0000000071a10000 - 0000000071a27000: C:\WINDOWS\system32\WS2_32.dll (0000000071a30000 - 0000000071a3a000: C:\WINDOWS\system32\WSOCK32.dll (0000000071a80000 - 0000000071a92000: C:\WINDOWS\system32\MPR.dll (0000000071b70000 - 0000000071b83000: C:\WINDOWS\system32\SAMLIB.dll (0000000071b90000 - 0000000071b9e000: C:\WINDOWS\System32\ntlanman.dll (0000000071c00000 - 0000000071c07000: C:\WINDOWS\System32\NETRAP.dll (0000000071c10000 - 0000000071c50000: C:\WINDOWS\System32\NETUI1.dll (0000000071c50000 - 0000000071c67000: C:\WINDOWS\System32\NETUI0.dll (0000000071cc0000 - 0000000071cdc000: C:\WINDOWS\system32\actxprxy.dll (00000000723a0000 - 00000000723ba000: C:\WINDOWS\system32\mydocs.dll (0000000072c80000 - 0000000072c88000: C:\WINDOWS\system32\msacm32.drv (0000000072c90000 - 0000000072c99000: C:\WINDOWS\system32\wdmaud.drv (00000000745d0000 - 000000007460d000: C:\WINDOWS\system32\ODBC32.dll (00000000746a0000 - 00000000746eb000: C:\WINDOWS\system32\MSCTF.dll (0000000074a50000 - 0000000074a58000: C:\WINDOWS\system32\POWRPROF.dll (0000000074a70000 - 0000000074a7a000: C:\WINDOWS\system32\BatMeter.dll (0000000074ab0000 - 0000000074af8000: C:\WINDOWS\system32\webcheck.dll (0000000075910000 - 0000000075a09000: C:\WINDOWS\system32\MSGINA.dll (0000000075dc0000 - 0000000075e51000: C:\WINDOWS\system32\MLANG.dll (0000000075f00000 - 0000000075f07000: C:\WINDOWS\System32\drprov.dll (0000000075f10000 - 0000000075f19000: C:\WINDOWS\System32\davclnt.dll (0000000075f20000 - 000000007601c000: C:\WINDOWS\system32\BROWSEUI.dll (0000000076300000 - 0000000076310000: C:\WINDOWS\system32\WINSTA.dll (0000000076320000 - 0000000076325000: C:\WINDOWS\system32\MSIMG32.dll (0000000076350000 - 000000007639a000: C:\WINDOWS\system32\comdlg32.dll (00000000763a0000 - 000000007654b000: C:\WINDOWS\system32\NETSHELL.dll (00000000765a0000 - 00000000765bd000: C:\WINDOWS\System32\CSCDLL.dll (00000000765c0000 - 00000000765e1000: C:\WINDOWS\system32\stobject.dll (0000000076620000 - 00000000766d5000: C:\WINDOWS\system32\USERENV.dll (0000000076880000 - 0000000076905000: C:\WINDOWS\system32\CRYPTUI.dll (0000000076930000 - 0000000076938000: C:\WINDOWS\system32\LINKINFO.dll (0000000076940000 - 0000000076966000: C:\WINDOWS\system32\ntshrui.dll (0000000076ad0000 - 0000000076ae1000: C:\WINDOWS\system32\ATL.DLL (0000000076af0000 - 0000000076b1e000: C:\WINDOWS\system32\WINMM.dll (0000000076bc0000 - 0000000076bef000: C:\WINDOWS\system32\credui.dll (0000000076bf0000 - 0000000076c1e000: C:\WINDOWS\system32\WINTRUST.dll (0000000076c50000 - 0000000076c78000: C:\WINDOWS\system32\IMAGEHLP.dll (0000000076d20000 - 0000000076d39000: C:\WINDOWS\system32\iphlpapi.dll (0000000076e40000 - 0000000076e4e000: C:\WINDOWS\system32\rtutils.dll (0000000076f10000 - 0000000076f18000: C:\WINDOWS\system32\WTSAPI32.dll (0000000076f20000 - 0000000076f4d000: C:\WINDOWS\system32\WLDAP32.dll (0000000076f90000 - 000000007700f000: C:\WINDOWS\system32\CLBCATQ.DLL (0000000077010000 - 00000000770e3000: C:\WINDOWS\system32\COMRes.dll (00000000770f0000 - 000000007717c000: C:\WINDOWS\system32\OLEAUT32.dll (0000000077180000 - 0000000077227000: C:\WINDOWS\system32\WININET.dll (0000000077230000 - 00000000772cd000: C:\WINDOWS\system32\urlmon.dll (00000000773a0000 - 00000000774a2000: C:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.2600.2180_x-ww_a84f1ff9\comctl32.dll (00000000774b0000 - 00000000775ec000: C:\WINDOWS\system32\ole32.dll (0000000077660000 - 0000000077681000: C:\WINDOWS\system32\NTMARTA.DLL (0000000077730000 - 000000007789c000: C:\WINDOWS\system32\SHDOCVW.dll (00000000778f0000 - 00000000779e4000: C:\WINDOWS\system32\SETUPAPI.dll (00000000779f0000 - 0000000077a46000: C:\WINDOWS\System32\cscui.dll (0000000077a50000 - 0000000077ae5000: C:\WINDOWS\system32\CRYPT32.dll (0000000077af0000 - 0000000077b02000: C:\WINDOWS\system32\MSASN1.dll (0000000077b10000 - 0000000077b32000: C:\WINDOWS\system32\appHelp.dll (0000000077ba0000 - 0000000077ba7000: C:\WINDOWS\system32\midimap.dll (0000000077bb0000 - 0000000077bc5000: C:\WINDOWS\system32\MSACM32.dll (0000000077bd0000 - 0000000077bd8000: C:\WINDOWS\system32\VERSION.dll (0000000077be0000 - 0000000077c38000: C:\WINDOWS\system32\msvcrt.dll (0000000077d10000 - 0000000077da0000: C:\WINDOWS\system32\USER32.dll (0000000077da0000 - 0000000077e4a000: C:\WINDOWS\system32\ADVAPI32.dll (0000000077e50000 - 0000000077ee1000: C:\WINDOWS\system32\RPCRT4.dll (0000000077ef0000 - 0000000077f36000: C:\WINDOWS\system32\GDI32.dll (0000000077f40000 - 0000000077fb6000: C:\WINDOWS\system32\SHLWAPI.dll (0000000077fc0000 - 0000000077fd1000: C:\WINDOWS\system32\Secur32.dll (000000007c800000 - 000000007c906000: C:\WINDOWS\system32\kernel32.dll (000000007c910000 - 000000007c9c7000: C:\WINDOWS\system32\ntdll.dll (000000007c9d0000 - 000000007d1ee000: C:\WINDOWS\system32\SHELL32.dll *----> Statusabbild für Threadkennung 0x960 <----* eax=00000001 ebx=00000003 ecx=0007fc44 edx=7c91eb94 esi=000e6768 edi=00000000 eip=7c91eb94 esp=0007fef0 ebp=0007ff08 iopl=0 nv up ei pl nz na pe nc cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202 *** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\ntdll.dll - Funktion: ntdll!KiFastSystemCallRet 7c91eb89 90 nop 7c91eb8a 90 nop ntdll!KiFastSystemCall: 7c91eb8b 8bd4 mov edx,esp 7c91eb8d 0f34 sysenter 7c91eb8f 90 nop 7c91eb90 90 nop 7c91eb91 90 nop 7c91eb92 90 nop 7c91eb93 90 nop ntdll!KiFastSystemCallRet: 7c91eb94 c3 ret 7c91eb95 8da42400000000 lea esp,[esp] 7c91eb9c 8d642400 lea esp,[esp] 7c91eba0 90 nop 7c91eba1 90 nop 7c91eba2 90 nop 7c91eba3 90 nop 7c91eba4 90 nop ntdll!KiIntSystemCall: 7c91eba5 8d542408 lea edx,[esp+0x8] 7c91eba9 cd2e int 2e *----> Stack Back Trace <----* *** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\SHELL32.dll - WARNING: Stack unwind information not available. Following frames may be wrong. *** ERROR: Module load completed but symbols could not be loaded for C:\WINDOWS\explorer.exe *** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\kernel32.dll - ChildEBP RetAddr Args to Child 0007ff08 7ca42c57 00000000 0007ff5c 01016e95 ntdll!KiFastSystemCallRet 0007ff14 01016e95 000e6768 7ffdf000 0007ffc0 SHELL32!Ordinal201+0x28 0007ff5c 0101e2b6 00000000 00000000 000205e2 explorer+0x16e95 0007ffc0 7c816d4f 00e67068 0006e890 7ffdf000 explorer+0x1e2b6 0007fff0 00000000 0101e24e 00000000 78746341 kernel32!RegisterWaitForInputIdle+0x49 *----> Raw Stack Dump <----* 000000000007fef0 f5 93 d1 77 ee 95 a4 7c - ac 92 80 7c 68 67 0e 00 ...w...|...|hg.. 000000000007ff00 68 67 0e 00 14 ff 07 00 - 14 ff 07 00 57 2c a4 7c hg..........W,.| 000000000007ff10 00 00 00 00 5c ff 07 00 - 95 6e 01 01 68 67 0e 00 ....\....n..hg.. 000000000007ff20 00 f0 fd 7f c0 ff 07 00 - 00 00 00 00 24 fd 07 00 ............$... 000000000007ff30 50 ff 07 00 e0 ff 07 00 - 27 e0 91 7c ed aa 80 7c P.......'..|...| 000000000007ff40 ff ff ff ff 0c 00 00 00 - 00 00 00 00 ac 1a e3 00 ................ 000000000007ff50 a8 00 00 00 01 00 00 00 - 68 67 0e 00 c0 ff 07 00 ........hg...... 000000000007ff60 b6 e2 01 01 00 00 00 00 - 00 00 00 00 e2 05 02 00 ................ 000000000007ff70 05 00 00 00 68 70 e6 00 - 90 e8 06 00 44 00 00 00 ....hp......D... 000000000007ff80 34 06 02 00 14 06 02 00 - e4 05 02 00 00 00 00 00 4............... 000000000007ff90 00 00 00 00 00 00 00 00 - 00 00 00 00 2e 00 00 00 ................ 000000000007ffa0 00 00 00 00 3a ef 06 00 - 01 00 00 00 05 00 00 00 ....:........... 000000000007ffb0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 000000000007ffc0 f0 ff 07 00 4f 6d 81 7c - 68 70 e6 00 90 e8 06 00 ....Om.|hp...... 000000000007ffd0 00 f0 fd 7f ed a6 54 80 - c8 ff 07 00 20 30 66 87 ......T..... 0f. 000000000007ffe0 ff ff ff ff f3 99 83 7c - 58 6d 81 7c 00 00 00 00 .......|Xm.|.... 000000000007fff0 00 00 00 00 00 00 00 00 - 4e e2 01 01 00 00 00 00 ........N....... 0000000000080000 41 63 74 78 20 00 00 00 - 01 00 00 00 98 24 00 00 Actx ........$.. 0000000000080010 c4 00 00 00 00 00 00 00 - 20 00 00 00 00 00 00 00 ........ ....... 0000000000080020 14 00 00 00 01 00 00 00 - 06 00 00 00 34 00 00 00 ............4... *----> Statusabbild für Threadkennung 0x7f0 <----* eax=00000001 ebx=000f5588 ecx=00000001 edx=000b81e4 esi=000002b0 edi=000f5550 eip=7c91eb94 esp=00d9fd50 ebp=00d9fd5c iopl=0 nv up ei ng nz ac pe cy cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000293 Funktion: ntdll!KiFastSystemCallRet 7c91eb89 90 nop 7c91eb8a 90 nop ntdll!KiFastSystemCall: 7c91eb8b 8bd4 mov edx,esp 7c91eb8d 0f34 sysenter 7c91eb8f 90 nop 7c91eb90 90 nop 7c91eb91 90 nop 7c91eb92 90 nop 7c91eb93 90 nop ntdll!KiFastSystemCallRet: 7c91eb94 c3 ret 7c91eb95 8da42400000000 lea esp,[esp] 7c91eb9c 8d642400 lea esp,[esp] 7c91eba0 90 nop 7c91eba1 90 nop 7c91eba2 90 nop 7c91eba3 90 nop 7c91eba4 90 nop ntdll!KiIntSystemCall: 7c91eba5 8d542408 lea edx,[esp+0x8] 7c91eba9 cd2e int 2e *----> Stack Back Trace <----* *** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\RPCRT4.dll - WARNING: Stack unwind information not available. Following frames may be wrong. ChildEBP RetAddr Args to Child 00d9fd5c 77e680bc 000002b0 00095598 00d9fd80 ntdll!KiFastSystemCallRet 00d9fd6c 77e6804e 00095598 00000000 00095418 RPCRT4!RpcBindingSetAuthInfoExW+0x6ac 00d9fd80 77e67d07 00095598 00000000 000f5550 RPCRT4!RpcBindingSetAuthInfoExW+0x63e 00d9fdbc 77e67d76 00095418 77e67d36 00095418 RPCRT4!RpcBindingSetAuthInfoExW+0x2f7 00d9fdd0 77e56fcd 00000001 77e68032 000f5550 RPCRT4!RpcBindingSetAuthInfoExW+0x366 00d9fdf4 77e685ad 000006bf 00000000 00000000 RPCRT4!I_RpcBCacheFree+0x995 00d9fe18 77e56cf7 00090007 000b81a8 00d9ff80 RPCRT4!I_RpcLogEvent+0x4cb 00d9fe28 77e56956 000b81a8 00000000 8060f886 RPCRT4!I_RpcBCacheFree+0x6bf 00d9ff80 77e56c22 00d9ffa8 77e56a3b 000b81a8 RPCRT4!I_RpcBCacheFree+0x31e 00d9ff88 77e56a3b 000b81a8 00000000 0007f88c RPCRT4!I_RpcBCacheFree+0x5ea 00d9ffa8 77e56c0a 000b8060 00d9ffec 7c80b50b RPCRT4!I_RpcBCacheFree+0x403 00d9ffb4 7c80b50b 000c2610 00000000 0007f88c RPCRT4!I_RpcBCacheFree+0x5d2 00d9ffec 00000000 77e56bf0 000c2610 00000000 kernel32!GetModuleFileNameA+0x1b4 *----> Raw Stack Dump <----* 0000000000d9fd50 92 d5 91 7c bb 9b 80 7c - b0 02 00 00 6c fd d9 00 ...|...|....l... 0000000000d9fd60 bc 80 e6 77 b0 02 00 00 - 98 55 09 00 80 fd d9 00 ...w.....U...... 0000000000d9fd70 4e 80 e6 77 98 55 09 00 - 00 00 00 00 18 54 09 00 N..w.U.......T.. 0000000000d9fd80 bc fd d9 00 07 7d e6 77 - 98 55 09 00 00 00 00 00 .....}.w.U...... 0000000000d9fd90 50 55 0f 00 18 54 09 00 - 88 55 0f 00 a8 fd d9 00 PU...T...U...... 0000000000d9fda0 18 54 09 00 90 fd d9 00 - b8 fd d9 00 dc ff d9 00 .T.............. 0000000000d9fdb0 2d 39 e8 77 18 7d e6 77 - 00 00 00 00 d0 fd d9 00 -9.w.}.w........ 0000000000d9fdc0 76 7d e6 77 18 54 09 00 - 36 7d e6 77 18 54 09 00 v}.w.T..6}.w.T.. 0000000000d9fdd0 f4 fd d9 00 cd 6f e5 77 - 01 00 00 00 32 80 e6 77 .....o.w....2..w 0000000000d9fde0 50 55 0f 00 c4 55 0f 00 - ed 10 91 7c c4 55 0f 00 PU...U.....|.U.. 0000000000d9fdf0 01 00 00 00 18 fe d9 00 - ad 85 e6 77 bf 06 00 00 ...........w.... 0000000000d9fe00 00 00 00 00 00 00 00 00 - ac 92 80 7c 00 00 00 00 ...........|.... 0000000000d9fe10 00 00 00 00 00 00 00 00 - 28 fe d9 00 f7 6c e5 77 ........(....l.w 0000000000d9fe20 07 00 09 00 a8 81 0b 00 - 80 ff d9 00 56 69 e5 77 ............Vi.w 0000000000d9fe30 a8 81 0b 00 00 00 00 00 - 86 f8 60 80 53 06 61 80 ..........`.S.a. 0000000000d9fe40 64 ed f4 b0 78 f4 07 00 - e0 f7 60 80 65 ba 5b 80 d...x.....`.e.[. 0000000000d9fe50 e8 89 1f 89 20 30 66 87 - b8 54 e3 89 28 f9 07 00 .... 0f..T..(... 0000000000d9fe60 48 ed f4 b0 cf b7 5c 80 - 05 00 00 00 00 00 00 00 H.....\......... 0000000000d9fe70 00 00 00 00 64 ed f4 b0 - 70 eb f4 b0 f8 00 00 00 ....d...p....... 0000000000d9fe80 05 00 00 00 05 00 00 00 - 70 31 ef e2 08 70 03 e1 ........p1...p.. *----> Statusabbild für Threadkennung 0x2b0 <----* eax=774c319a ebx=00007530 ecx=7ffdf000 edx=00000000 esi=00000000 edi=00dfff50 eip=7c91eb94 esp=00dfff20 ebp=00dfff78 iopl=0 nv up ei pl nz na po nc cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000206 Funktion: ntdll!KiFastSystemCallRet 7c91eb89 90 nop 7c91eb8a 90 nop ntdll!KiFastSystemCall: 7c91eb8b 8bd4 mov edx,esp 7c91eb8d 0f34 sysenter 7c91eb8f 90 nop 7c91eb90 90 nop 7c91eb91 90 nop 7c91eb92 90 nop 7c91eb93 90 nop ntdll!KiFastSystemCallRet: 7c91eb94 c3 ret 7c91eb95 8da42400000000 lea esp,[esp] 7c91eb9c 8d642400 lea esp,[esp] 7c91eba0 90 nop 7c91eba1 90 nop 7c91eba2 90 nop 7c91eba3 90 nop 7c91eba4 90 nop ntdll!KiIntSystemCall: 7c91eba5 8d542408 lea edx,[esp+0x8] 7c91eba9 cd2e int 2e *----> Stack Back Trace <----* WARNING: Stack unwind information not available. Following frames may be wrong. *** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\ole32.dll - ChildEBP RetAddr Args to Child 00dfff78 7c802451 0000ea60 00000000 00dfffb4 ntdll!KiFastSystemCallRet 00dfff88 774c2fcb 0000ea60 000c4df8 774c314d kernel32!Sleep+0xf 00dfffb4 7c80b50b 000c4df8 7c920945 7c92094e ole32!StringFromGUID2+0x2d1 00dfffec 00000000 774c319a 000c4df8 00000000 kernel32!GetModuleFileNameA+0x1b4 *----> Raw Stack Dump <----* 0000000000dfff20 5c d8 91 7c ed 23 80 7c - 00 00 00 00 50 ff df 00 \..|.#.|....P... 0000000000dfff30 50 25 80 7c f0 56 5d 77 - 30 75 00 00 14 00 00 00 P%.|.V]w0u...... 0000000000dfff40 01 00 00 00 00 00 00 00 - 00 00 00 00 10 00 00 00 ................ 0000000000dfff50 00 ba 3c dc ff ff ff ff - 08 4f 4b 77 50 ff df 00 ..<......OKwP... 0000000000dfff60 30 ff df 00 20 7f 0b 00 - dc ff df 00 f3 99 83 7c 0... ..........| 0000000000dfff70 58 24 80 7c 00 00 00 00 - 88 ff df 00 51 24 80 7c X$.|........Q$.| 0000000000dfff80 60 ea 00 00 00 00 00 00 - b4 ff df 00 cb 2f 4c 77 `............/Lw 0000000000dfff90 60 ea 00 00 f8 4d 0c 00 - 4d 31 4c 77 00 00 00 00 `....M..M1Lw.... 0000000000dfffa0 45 09 92 7c f8 4d 0c 00 - 00 00 4b 77 b5 31 4c 77 E..|.M....Kw.1Lw 0000000000dfffb0 4e 09 92 7c ec ff df 00 - 0b b5 80 7c f8 4d 0c 00 N..|.......|.M.. 0000000000dfffc0 45 09 92 7c 4e 09 92 7c - f8 4d 0c 00 00 c0 fd 7f E..|N..|.M...... 0000000000dfffd0 00 76 e3 89 c0 ff df 00 - 68 1d 3d 87 ff ff ff ff .v......h.=..... 0000000000dfffe0 f3 99 83 7c 18 b5 80 7c - 00 00 00 00 00 00 00 00 ...|...|........ 0000000000dffff0 00 00 00 00 9a 31 4c 77 - f8 4d 0c 00 00 00 00 00 .....1Lw.M...... 0000000000e00000 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 0000000000e00010 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 0000000000e00020 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 0000000000e00030 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 0000000000e00040 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 0000000000e00050 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ *----> Statusabbild für Threadkennung 0xffc <----* eax=77f49408 ebx=00090000 ecx=00000098 edx=043a0005 esi=77f494d0 edi=77f494c8 eip=7c9206c3 esp=00e3f2b4 ebp=00e3f4d4 iopl=0 nv up ei pl nz ac pe nc cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000212 Funktion: ntdll!RtlAllocateHeap 7c9206a5 56 push esi 7c9206a6 e856000000 call ntdll!RtlAllocateHeap+0x12d (7c920701) 7c9206ab 8bf0 mov esi,eax 7c9206ad 8975d0 mov [ebp-0x30],esi 7c9206b0 85f6 test esi,esi 7c9206b2 0f845d0f0000 je ntdll!wcsncpy+0xb86 (7c921615) 7c9206b8 8d7ef8 lea edi,[esi-0x8] 7c9206bb 8a45dc mov al,[ebp-0x24] 7c9206be 8b4d10 mov ecx,[ebp+0x10] 7c9206c1 2ac1 sub al,cl FEHLER ->7c9206c3 884706 mov [edi+0x6],al ds:0023:77f494ce=f4 7c9206c6 8bc7 mov eax,edi 7c9206c8 c1e803 shr eax,0x3 7c9206cb 324304 xor al,[ebx+0x4] 7c9206ce 884704 mov [edi+0x4],al 7c9206d1 f6450c08 test byte ptr [ebp+0xc],0x8 7c9206d5 756d jnz ntdll!RtlAllocateHeap+0x170 (7c920744) 7c9206d7 f605f002fe7f02 test byte ptr [7ffe02f0],0x2 7c9206de 0f851fb20200 jne ntdll!RtlInitializeSListHead+0x28f3 (7c94b903) 7c9206e4 8bc6 mov eax,esi 7c9206e6 e817e7ffff call ntdll!strchr+0x101 (7c91ee02) *----> Stack Back Trace <----*