Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- 1806.504:0009:trace:virtual:VIRTUAL_DumpView 0x7e3d1000 - 0x7e3f2fff c-r-x
- 1806.504:0009:trace:virtual:VIRTUAL_DumpView 0x7e3f3000 - 0x7e3f3fff c-rw-
- 1806.504:0009:trace:virtual:VIRTUAL_DumpView 0x7e3f4000 - 0x7e3f4fff c-rW-
- 1806.504:0009:trace:virtual:VIRTUAL_DumpView 0x7e3f5000 - 0x7e3f5fff c-rw-
- 1806.504:0009:trace:imports:import_dll --- CloseHandle kernel32.dll.172 = 0x7b85c800
- 1806.504:0009:trace:imports:import_dll --- CopyFileW kernel32.dll.195 = 0x7b858460
- 1806.504:0009:trace:imports:import_dll --- CreateDirectoryW kernel32.dll.203 = 0x7b859620
- 1806.504:0009:trace:imports:import_dll --- CreateFileW kernel32.dll.213 = 0x7b83cd30
- 1806.504:0009:trace:imports:import_dll --- DelayLoadFailureHook kernel32.dll.257 = 0x7b854e50
- 1806.504:0009:trace:imports:import_dll --- DeleteFileW kernel32.dll.262 = 0x7b83d640
- 1806.504:0009:trace:imports:import_dll --- DisableThreadLibraryCalls kernel32.dll.269 = 0x7b8534d0
- 1806.504:0009:trace:imports:import_dll --- FileTimeToSystemTime kernel32.dll.340 = 0x7b873dd0
- 1806.504:0009:trace:imports:import_dll --- FindClose kernel32.dll.349 = 0x7b83e640
- 1806.504:0009:trace:imports:import_dll --- FindFirstFileW kernel32.dll.356 = 0x7b83f100
- 1806.504:0009:trace:imports:import_dll --- FindNextFileW kernel32.dll.363 = 0x7b83dfa0
- 1806.504:0009:trace:imports:import_dll --- FreeLibrary kernel32.dll.391 = 0x7b854ce0
- 1806.504:0009:trace:imports:import_dll --- GetDateFormatA kernel32.dll.471 = 0x7b845fb0
- 1806.504:0009:trace:imports:import_dll --- GetFileSize kernel32.dll.503 = 0x7b83c2a0
- 1806.504:0009:trace:imports:import_dll --- GetFileSizeEx kernel32.dll.504 = 0x7b83c210
- 1806.504:0009:trace:imports:import_dll --- GetFileTime kernel32.dll.505 = 0x7b83c810
- 1806.504:0009:trace:imports:import_dll --- GetLocaleInfoA kernel32.dll.519 = 0x7b84c970
- 1806.504:0009:trace:imports:import_dll --- GetProcAddress kernel32.dll.563 = 0x7b854d90
- 1806.504:0009:trace:imports:import_dll --- GetSystemDirectoryW kernel32.dll.603 = 0x7b85a130
- 1806.504:0009:trace:imports:import_dll --- GetSystemTime kernel32.dll.607 = 0x7b874710
- 1806.504:0009:trace:imports:import_dll --- HeapAlloc kernel32.dll.684 = 0x7bc48560
- 1806.504:0009:trace:imports:import_dll --- HeapFree kernel32.dll.690 = 0x7bc47c50
- 1806.504:0009:trace:imports:import_dll --- HeapReAlloc kernel32.dll.694 = 0x7bc48910
- 1806.504:0009:trace:imports:import_dll --- LoadLibraryA kernel32.dll.790 = 0x7b854c40
- 1806.504:0009:trace:imports:import_dll --- LoadLibraryW kernel32.dll.793 = 0x7b854c90
- 1806.504:0009:trace:imports:import_dll --- LocalFree kernel32.dll.800 = 0x7b843a10
- 1806.504:0009:trace:imports:import_dll --- MultiByteToWideChar kernel32.dll.834 = 0x7b84c160
- 1806.504:0009:trace:imports:import_dll --- RaiseException kernel32.dll.893 = 0x7b839650
- 1806.504:0009:trace:imports:import_dll --- ReadFile kernel32.dll.906 = 0x7b83b4e0
- 1806.504:0009:trace:imports:import_dll --- RtlUnwind kernel32.dll.981 = 0x7bc72dfc
- 1806.504:0009:trace:imports:import_dll --- SetFileAttributesW kernel32.dll.1065 = 0x7b83f3d0
- 1806.504:0009:trace:imports:import_dll --- SetFilePointer kernel32.dll.1067 = 0x7b83c680
- 1806.504:0009:trace:imports:import_dll --- SystemTimeToFileTime kernel32.dll.1126 = 0x7b874160
- 1806.504:0009:trace:virtual:NtProtectVirtualMemory 0xffffffff 0x7e3f4000 00001000 00000008
- 1806.504:0009:trace:virtual:VIRTUAL_SetProt 0x7e3f4000-0x7e3f4fff c-rW-
- 1806.504:0009:trace:virtual:VIRTUAL_DumpView View: 0x7e3d0000 - 0x7e3f5fff (system)
- 1806.504:0009:trace:virtual:VIRTUAL_DumpView 0x7e3d0000 - 0x7e3d0fff c-r--
- 1806.504:0009:trace:virtual:VIRTUAL_DumpView 0x7e3d1000 - 0x7e3f2fff c-r-x
- 1806.504:0009:trace:virtual:VIRTUAL_DumpView 0x7e3f3000 - 0x7e3f3fff c-rw-
- 1806.504:0009:trace:virtual:VIRTUAL_DumpView 0x7e3f4000 - 0x7e3f4fff c-rW-
- 1806.504:0009:trace:virtual:VIRTUAL_DumpView 0x7e3f5000 - 0x7e3f5fff c-rw-
- 1806.504:0009:trace:module:load_dll looking for L"ntdll.dll" in L"Z:\\home\\yozz\\\0414\043e\043a\0443\043c\0435\043d\0442\044b;.;C:\\windows\\system32;C:\\windows\\system;C:\\windows;"
- 1806.504:0009:trace:module:load_dll Found L"C:\\windows\\system32\\ntdll.dll" for L"ntdll.dll" at 0x7bc10000, count=11
- 1806.504:0009:trace:virtual:NtProtectVirtualMemory 0xffffffff 0x7e3f4560 00000008 00000004
- 1806.504:0009:trace:virtual:VIRTUAL_SetProt 0x7e3f4000-0x7e3f4fff c-rW-
- 1806.504:0009:trace:virtual:VIRTUAL_DumpView View: 0x7e3d0000 - 0x7e3f5fff (system)
- 1806.504:0009:trace:virtual:VIRTUAL_DumpView 0x7e3d0000 - 0x7e3d0fff c-r--
- 1806.504:0009:trace:virtual:VIRTUAL_DumpView 0x7e3d1000 - 0x7e3f2fff c-r-x
- 1806.504:0009:trace:virtual:VIRTUAL_DumpView 0x7e3f3000 - 0x7e3f3fff c-rw-
- 1806.504:0009:trace:virtual:VIRTUAL_DumpView 0x7e3f4000 - 0x7e3f4fff c-rW-
- 1806.504:0009:trace:virtual:VIRTUAL_DumpView 0x7e3f5000 - 0x7e3f5fff c-rw-
- 1806.504:0009:trace:imports:import_dll --- RtlGUIDFromString ntdll.dll.486 = 0x7bc6a640
- 1806.504:0009:trace:imports:import_dll --- RtlInitUnicodeString ntdll.dll.525 = 0x7bc67f70
- 1806.504:0009:trace:virtual:NtProtectVirtualMemory 0xffffffff 0x7e3f4000 00001000 00000008
- 1806.504:0009:trace:virtual:VIRTUAL_SetProt 0x7e3f4000-0x7e3f4fff c-rW-
- 1806.504:0009:trace:virtual:VIRTUAL_DumpView View: 0x7e3d0000 - 0x7e3f5fff (system)
- 1806.504:0009:trace:virtual:VIRTUAL_DumpView 0x7e3d0000 - 0x7e3d0fff c-r--
- 1806.504:0009:trace:virtual:VIRTUAL_DumpView 0x7e3d1000 - 0x7e3f2fff c-r-x
- 1806.504:0009:trace:virtual:VIRTUAL_DumpView 0x7e3f3000 - 0x7e3f3fff c-rw-
- 1806.504:0009:trace:virtual:VIRTUAL_DumpView 0x7e3f4000 - 0x7e3f4fff c-rW-
- 1806.504:0009:trace:virtual:VIRTUAL_DumpView 0x7e3f5000 - 0x7e3f5fff c-rw-
- 1806.504:0009:trace:module:load_builtin_callback loaded wintrust.dll 0x1216a8 0x7e3d0000
- 0009: load_dll( mapping=0000, base=7e3d0000, name=001216d0, size=155648, dbg_offset=0, dbg_size=0, filename=L"C:\\windows\\system32\\wintrust.dll" )
- 0009: load_dll() = 0
- 1806.504:0009:trace:loaddll:load_builtin_dll Loaded L"C:\\windows\\system32\\wintrust.dll" at 0x7e3d0000: builtin
- 1806.504:0009:trace:module:load_dll Loaded module L"C:\\windows\\system32\\WINTRUST.dll" (builtin) at 0x7e3d0000
- 1806.504:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x1209e0): returning TRUE
- 1806.504:0009:trace:virtual:NtProtectVirtualMemory 0xffffffff 0x4bd4c0 00000004 00000004
- 1806.505:0009:trace:virtual:VIRTUAL_SetProt 0x4bd000-0x4bdfff c-rW-
- 1806.505:0009:trace:virtual:VIRTUAL_DumpView View: 0x400000 - 0x1e4afff 0x18
- 1806.505:0009:trace:virtual:VIRTUAL_DumpView 0x400000 - 0x400fff c-r--
- 1806.505:0009:trace:virtual:VIRTUAL_DumpView 0x401000 - 0x4bcfff c-r-x
- 1806.505:0009:trace:virtual:VIRTUAL_DumpView 0x4bd000 - 0x4bdfff c-rW-
- 1806.505:0009:trace:virtual:VIRTUAL_DumpView 0x4be000 - 0x553fff c-r--
- 1806.505:0009:trace:virtual:VIRTUAL_DumpView 0x554000 - 0x55efff c-rW-
- 1806.505:0009:trace:virtual:VIRTUAL_DumpView 0x55f000 - 0x1e4afff c-r--
- 1806.505:0009:trace:imports:import_dll --- WinVerifyTrust WINTRUST.dll.115 = 0x7e3e7ce0
- 1806.505:0009:trace:virtual:NtProtectVirtualMemory 0xffffffff 0x4bd000 00001000 00000002
- 1806.505:0009:trace:virtual:VIRTUAL_SetProt 0x4bd000-0x4bdfff c-r--
- 1806.505:0009:trace:virtual:VIRTUAL_DumpView View: 0x400000 - 0x1e4afff 0x18
- 1806.505:0009:trace:virtual:VIRTUAL_DumpView 0x400000 - 0x400fff c-r--
- 1806.505:0009:trace:virtual:VIRTUAL_DumpView 0x401000 - 0x4bcfff c-r-x
- 1806.505:0009:trace:virtual:VIRTUAL_DumpView 0x4bd000 - 0x553fff c-r--
- 1806.505:0009:trace:virtual:VIRTUAL_DumpView 0x554000 - 0x55efff c-rW-
- 1806.505:0009:trace:virtual:VIRTUAL_DumpView 0x55f000 - 0x1e4afff c-r--
- 1806.505:0009:trace:module:load_dll looking for L"WINHTTP.dll" in L"Z:\\home\\yozz\\\0414\043e\043a\0443\043c\0435\043d\0442\044b;.;C:\\windows\\system32;C:\\windows\\system;C:\\windows;"
- 1806.505:0009:trace:actctx:RtlFindActivationContextSectionString 00000001 (null) 2 L"WINHTTP.dll" 0xfffd7ddc
- 1806.505:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,00000046): returning 0x122048
- 1806.505:0009:trace:file:RtlDosPathNameToNtPathName_U (L"Z:\\home\\yozz\\\0414\043e\043a\0443\043c\0435\043d\0442\044b\\WINHTTP.dll",0xfffd7c80,(nil),(nil))
- 1806.505:0009:trace:file:RtlGetFullPathName_U (L"Z:\\home\\yozz\\\0414\043e\043a\0443\043c\0435\043d\0442\044b\\WINHTTP.dll" 520 0xfffd7a34 (nil))
- 1806.505:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,00000056): returning 0x1220a0
- 1806.505:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,00000145): returning 0x122108
- 1806.505:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,00000048): returning 0x122260
- 1806.505:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x122260): returning TRUE
- 1806.505:0009:trace:file:wine_nt_to_unix_file_name L"\\home\\yozz\\\0414\043e\043a\0443\043c\0435\043d\0442\044b\\WINHTTP.dll" not found in /root/.wine/dosdevices/z:/home/yozz/Документы
- 1806.505:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x122108): returning TRUE
- 1806.505:0009:warn:ntdll:NtQueryAttributesFile L"\\??\\Z:\\home\\yozz\\\0414\043e\043a\0443\043c\0435\043d\0442\044b\\WINHTTP.dll" not found (c0000034)
- 1806.506:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x1220a0): returning TRUE
- 1806.506:0009:trace:file:RtlDosPathNameToNtPathName_U (L".\\WINHTTP.dll",0xfffd7c80,(nil),(nil))
- 1806.506:0009:trace:file:RtlGetFullPathName_U (L".\\WINHTTP.dll" 520 0xfffd7a34 (nil))
- 1806.506:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,0000003e): returning 0x1222b8
- 1806.506:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,00000130): returning 0x122308
- 1806.506:0009:trace:file:wine_nt_to_unix_file_name L"\\var\\log\\WINHTTP.dll" not found in /root/.wine/dosdevices/z:/var/log
- 1806.506:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x122308): returning TRUE
- 1806.506:0009:warn:ntdll:NtQueryAttributesFile L"\\??\\Z:\\var\\log\\WINHTTP.dll" not found (c0000034)
- 1806.506:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x1222b8): returning TRUE
- 1806.506:0009:trace:file:RtlDosPathNameToNtPathName_U (L"C:\\windows\\system32\\WINHTTP.dll",0xfffd7c80,(nil),(nil))
- 1806.506:0009:trace:file:RtlGetFullPathName_U (L"C:\\windows\\system32\\WINHTTP.dll" 520 0xfffd7a34 (nil))
- 1806.506:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,00000050): returning 0x122448
- 1806.506:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,00000139): returning 0x1224a8
- 1806.506:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,00000050): returning 0x1225f8
- 1806.506:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x1225f8): returning TRUE
- 1806.506:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,0000004c): returning 0x122658
- 1806.506:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x122658): returning TRUE
- 1806.507:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,0000004e): returning 0x1226b8
- 1806.507:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x1226b8): returning TRUE
- 1806.507:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,00000050): returning 0x122718
- 1806.507:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x122718): returning TRUE
- 1806.507:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,00000046): returning 0x122778
- 1806.507:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x122778): returning TRUE
- 1806.507:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,0000004c): returning 0x1227d0
- 1806.507:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x1227d0): returning TRUE
- 1806.507:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,0000004e): returning 0x122830
- 1806.507:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x122830): returning TRUE
- 1806.507:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,0000004e): returning 0x122890
- 1806.507:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x122890): returning TRUE
- 1806.507:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,0000004a): returning 0x1228f0
- 1806.507:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x1228f0): returning TRUE
- 1806.508:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,00000052): returning 0x122950
- 1806.508:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x122950): returning TRUE
- 1806.508:0009:trace:file:wine_nt_to_unix_file_name L"\\??\\C:\\windows\\system32\\WINHTTP.dll" -> "/root/.wine/dosdevices/c:/windows/system32/winhttp.dll"
- 1806.508:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x1224a8): returning TRUE
- 1806.508:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x122448): returning TRUE
- 1806.508:0009:trace:file:RtlGetFullPathName_U (L"C:\\windows\\system32\\WINHTTP.dll" 64 0xfffd7e96 0xfffd7dc8)
- 1806.508:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x122048): returning TRUE
- 1806.508:0009:trace:file:RtlDosPathNameToNtPathName_U (L"C:\\windows\\system32\\WINHTTP.dll",0xfffd7dcc,(nil),(nil))
- 1806.508:0009:trace:file:RtlGetFullPathName_U (L"C:\\windows\\system32\\WINHTTP.dll" 520 0xfffd7b44 (nil))
- 1806.508:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,00000050): returning 0x1229b8
- 1806.508:0009:trace:ntdll:FILE_CreateFile handle=0xfffd7e7c access=80000000 name=L"\\??\\C:\\windows\\system32\\WINHTTP.dll" objattr=00000040 root=(nil) sec=(nil) io=0xfffd7dd4 alloc_size=(nil) attr=00000000 sharing=00000005 disp=1 options=00000000 ea=(nil).0x00000000
- 1806.508:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,00000139): returning 0x122a18
- 1806.508:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,00000050): returning 0x122b68
- 1806.508:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x122b68): returning TRUE
- 1806.508:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,0000004c): returning 0x122bc8
- 1806.508:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x122bc8): returning TRUE
- 1806.509:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,0000004e): returning 0x122c28
- 1806.509:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x122c28): returning TRUE
- 1806.509:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,00000050): returning 0x122c88
- 1806.509:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x122c88): returning TRUE
- 1806.509:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,00000046): returning 0x122ce8
- 1806.509:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x122ce8): returning TRUE
- 1806.509:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,0000004c): returning 0x122d40
- 1806.509:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x122d40): returning TRUE
- 1806.509:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,0000004e): returning 0x122da0
- 1806.509:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x122da0): returning TRUE
- 1806.509:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,0000004e): returning 0x122e00
- 1806.509:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x122e00): returning TRUE
- 1806.509:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,0000004a): returning 0x122e60
- 1806.509:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x122e60): returning TRUE
- 1806.510:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,00000052): returning 0x122ec0
- 1806.510:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x122ec0): returning TRUE
- 1806.510:0009:trace:file:wine_nt_to_unix_file_name L"\\??\\C:\\windows\\system32\\WINHTTP.dll" -> "/root/.wine/dosdevices/c:/windows/system32/winhttp.dll"
- 0009: create_file( access=80000000, attributes=00000040, sharing=00000005, create=1, options=00000000, attrs=00000000, objattr={rootdir=0000,sd={},name=L""}, filename="/root/.wine/dosdevices/c:/windows/system32/winhttp.dll" )
- 0009: create_file() = 0 { handle=0010 }
- 1806.510:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x122a18): returning TRUE
- 1806.510:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x1229b8): returning TRUE
- 1806.510:0009:trace:module:get_load_order looking for L"C:\\windows\\system32\\WINHTTP.dll"
- 1806.510:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,0000001a): returning 0x122f28
- 1806.510:0009:trace:module:get_load_order got hardcoded default for L"WINHTTP.dll"
- 1806.510:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x122f28): returning TRUE
- 1806.510:0009:trace:ntdll:NtReadFile (0x10,(nil),(nil),(nil),0xfffd7e8c,0xfffd7ed7,0x00000055,0xfffd7e80,(nil)),partial stub!
- 0009: get_handle_fd( handle=0010 )
- 0009: *fd* 0010 -> 23
- 0009: get_handle_fd() = 0 { type=1, cacheable=1, access=00120089, options=00000000 }
- 1806.510:0009:trace:ntdll:NtReadFile = SUCCESS (85)
- 1806.510:0009:trace:module:load_dll L"C:\\windows\\system32\\WINHTTP.dll" is a fake Wine dll
- 0009: close_handle( handle=0010 )
- 0009: close_handle() = 0
- 1806.510:0009:trace:module:load_builtin_dll Trying built-in L"WINHTTP.dll"
- 1806.512:0009:trace:heap:RtlAllocateHeap (0xffbb0000,70000061,00000054): returning 0xffbb3400
- 1806.512:0009:trace:virtual:VIRTUAL_DumpView View: 0x7e2c0000 - 0x7e2f4fff (system)
- 1806.512:0009:trace:virtual:VIRTUAL_DumpView 0x7e2c0000 - 0x7e2f4fff c-rWx
- 1806.512:0009:trace:virtual:virtual_create_builtin_view created 0x7e2c0000-0x7e2f5000
- 1806.512:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,00000040): returning 0x122f58
- 1806.513:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,00000054): returning 0x122fa8
- 1806.513:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,00000040): returning 0x123010
- 1806.513:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x122f58): returning TRUE
- 1806.513:0009:trace:resource:LdrFindResource_U module 0x7e2c0000 type #0018 name #0002 lang 0000 level 3
- 1806.513:0009:trace:resource:find_entry_by_id root 0x7e2f0e9c dir 0x7e2f0e9c id 0018 not found
- 1806.513:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,0000000c): returning 0x123060
- 1806.513:0009:trace:module:load_dll looking for L"user32.dll" in L"Z:\\home\\yozz\\\0414\043e\043a\0443\043c\0435\043d\0442\044b;.;C:\\windows\\system32;C:\\windows\\system;C:\\windows;"
- 1806.513:0009:trace:module:load_dll Found L"C:\\windows\\system32\\user32.dll" for L"user32.dll" at 0x7ecc0000, count=11
- 1806.513:0009:trace:virtual:NtProtectVirtualMemory 0xffffffff 0x7e2f0634 00000010 00000004
- 1806.513:0009:trace:virtual:VIRTUAL_SetProt 0x7e2f0000-0x7e2f0fff c-rW-
- 1806.513:0009:trace:virtual:VIRTUAL_DumpView View: 0x7e2c0000 - 0x7e2f4fff (system)
- 1806.513:0009:trace:virtual:VIRTUAL_DumpView 0x7e2c0000 - 0x7e2c0fff c-r--
- 1806.513:0009:trace:virtual:VIRTUAL_DumpView 0x7e2c1000 - 0x7e2effff c-r-x
- 1806.513:0009:trace:virtual:VIRTUAL_DumpView 0x7e2f0000 - 0x7e2f0fff c-rW-
- 1806.513:0009:trace:virtual:VIRTUAL_DumpView 0x7e2f1000 - 0x7e2f4fff c-rw-
- 1806.513:0009:trace:imports:import_dll --- DispatchMessageW user32.dll.160 = 0x7ed180b0
- 1806.513:0009:trace:imports:import_dll --- MsgWaitForMultipleObjects user32.dll.477 = 0x7ed183d0
- 1806.513:0009:trace:imports:import_dll --- PeekMessageW user32.dll.496 = 0x7ed1c3b0
- 1806.513:0009:trace:imports:import_dll --- TranslateMessage user32.dll.663 = 0x7ed1f1d0
- 1806.513:0009:trace:virtual:NtProtectVirtualMemory 0xffffffff 0x7e2f0000 00001000 00000004
- 1806.513:0009:trace:virtual:VIRTUAL_SetProt 0x7e2f0000-0x7e2f0fff c-rW-
- 1806.513:0009:trace:virtual:VIRTUAL_DumpView View: 0x7e2c0000 - 0x7e2f4fff (system)
- 1806.513:0009:trace:virtual:VIRTUAL_DumpView 0x7e2c0000 - 0x7e2c0fff c-r--
- 1806.513:0009:trace:virtual:VIRTUAL_DumpView 0x7e2c1000 - 0x7e2effff c-r-x
- 1806.513:0009:trace:virtual:VIRTUAL_DumpView 0x7e2f0000 - 0x7e2f0fff c-rW-
- 1806.513:0009:trace:virtual:VIRTUAL_DumpView 0x7e2f1000 - 0x7e2f4fff c-rw-
- 1806.513:0009:trace:module:load_dll looking for L"advapi32.dll" in L"Z:\\home\\yozz\\\0414\043e\043a\0443\043c\0435\043d\0442\044b;.;C:\\windows\\system32;C:\\windows\\system;C:\\windows;"
- 1806.513:0009:trace:module:load_dll Found L"C:\\windows\\system32\\advapi32.dll" for L"advapi32.dll" at 0x7eb30000, count=12
- 1806.513:0009:trace:virtual:NtProtectVirtualMemory 0xffffffff 0x7e2f0648 00000014 00000004
- 1806.513:0009:trace:virtual:VIRTUAL_SetProt 0x7e2f0000-0x7e2f0fff c-rW-
- 1806.513:0009:trace:virtual:VIRTUAL_DumpView View: 0x7e2c0000 - 0x7e2f4fff (system)
- 1806.513:0009:trace:virtual:VIRTUAL_DumpView 0x7e2c0000 - 0x7e2c0fff c-r--
- 1806.513:0009:trace:virtual:VIRTUAL_DumpView 0x7e2c1000 - 0x7e2effff c-r-x
- 1806.513:0009:trace:virtual:VIRTUAL_DumpView 0x7e2f0000 - 0x7e2f0fff c-rW-
- 1806.513:0009:trace:virtual:VIRTUAL_DumpView 0x7e2f1000 - 0x7e2f4fff c-rw-
- 1806.513:0009:trace:imports:import_dll --- RegCloseKey advapi32.dll.348 = 0x7eb502c0
- 1806.513:0009:trace:imports:import_dll --- RegCreateKeyExW advapi32.dll.353 = 0x7eb4e5f0
- 1806.513:0009:trace:imports:import_dll --- RegOpenKeyExW advapi32.dll.383 = 0x7eb4ed70
- 1806.513:0009:trace:imports:import_dll --- RegQueryValueExW advapi32.dll.393 = 0x7eb51430
- 1806.513:0009:trace:imports:import_dll --- RegSetValueExW advapi32.dll.405 = 0x7eb50b00
- 1806.513:0009:trace:virtual:NtProtectVirtualMemory 0xffffffff 0x7e2f0000 00001000 00000008
- 1806.513:0009:trace:virtual:VIRTUAL_SetProt 0x7e2f0000-0x7e2f0fff c-rW-
- 1806.513:0009:trace:virtual:VIRTUAL_DumpView View: 0x7e2c0000 - 0x7e2f4fff (system)
- 1806.513:0009:trace:virtual:VIRTUAL_DumpView 0x7e2c0000 - 0x7e2c0fff c-r--
- 1806.513:0009:trace:virtual:VIRTUAL_DumpView 0x7e2c1000 - 0x7e2effff c-r-x
- 1806.513:0009:trace:virtual:VIRTUAL_DumpView 0x7e2f0000 - 0x7e2f0fff c-rW-
- 1806.513:0009:trace:virtual:VIRTUAL_DumpView 0x7e2f1000 - 0x7e2f4fff c-rw-
- 1806.513:0009:trace:module:load_dll looking for L"kernel32.dll" in L"Z:\\home\\yozz\\\0414\043e\043a\0443\043c\0435\043d\0442\044b;.;C:\\windows\\system32;C:\\windows\\system;C:\\windows;"
- 1806.513:0009:trace:module:load_dll Found L"C:\\windows\\system32\\KERNEL32.dll" for L"kernel32.dll" at 0x7b810000, count=17
- 1806.513:0009:trace:virtual:NtProtectVirtualMemory 0xffffffff 0x7e2f0660 00000088 00000004
- 1806.513:0009:trace:virtual:VIRTUAL_SetProt 0x7e2f0000-0x7e2f0fff c-rW-
- 1806.513:0009:trace:virtual:VIRTUAL_DumpView View: 0x7e2c0000 - 0x7e2f4fff (system)
- 1806.513:0009:trace:virtual:VIRTUAL_DumpView 0x7e2c0000 - 0x7e2c0fff c-r--
- 1806.513:0009:trace:virtual:VIRTUAL_DumpView 0x7e2c1000 - 0x7e2effff c-r-x
- 1806.513:0009:trace:virtual:VIRTUAL_DumpView 0x7e2f0000 - 0x7e2f0fff c-rW-
- 1806.513:0009:trace:virtual:VIRTUAL_DumpView 0x7e2f1000 - 0x7e2f4fff c-rw-
- 1806.513:0009:trace:imports:import_dll --- CloseHandle kernel32.dll.172 = 0x7b85c800
- 1806.513:0009:trace:imports:import_dll --- CreateEventW kernel32.dll.207 = 0x7b86cdd0
- 1806.513:0009:trace:imports:import_dll --- CreateThread kernel32.dll.239 = 0x7b872030
- 1806.513:0009:trace:imports:import_dll --- DelayLoadFailureHook kernel32.dll.257 = 0x7b854e50
- 1806.513:0009:trace:imports:import_dll --- DeleteCriticalSection kernel32.dll.259 = 0x7bc359f0
- 1806.513:0009:trace:imports:import_dll --- DisableThreadLibraryCalls kernel32.dll.269 = 0x7b8534d0
- 1806.513:0009:trace:imports:import_dll --- EnterCriticalSection kernel32.dll.279 = 0x7bc364f0
- 1806.513:0009:trace:imports:import_dll --- EnumResourceNamesW kernel32.dll.293 = 0x7b86a5e0
- 1806.513:0009:trace:imports:import_dll --- FindResourceW kernel32.dll.371 = 0x7b869d10
- 1806.513:0009:trace:imports:import_dll --- FreeLibrary kernel32.dll.391 = 0x7b854ce0
- 1806.513:0009:trace:imports:import_dll --- GetComputerNameExA kernel32.dll.421 = 0x7b82bc30
- 1806.513:0009:trace:imports:import_dll --- GetExitCodeThread kernel32.dll.494 = 0x7b8721e0
- 1806.513:0009:trace:imports:import_dll --- GetModuleFileNameW kernel32.dll.531 = 0x7b8540c0
- 1806.513:0009:trace:imports:import_dll --- GetModuleHandleA kernel32.dll.532 = 0x7b854000
- 1806.513:0009:trace:imports:import_dll --- GetProcAddress kernel32.dll.563 = 0x7b854d90
- 1806.513:0009:trace:imports:import_dll --- GetSystemTime kernel32.dll.607 = 0x7b874710
- 1806.513:0009:trace:imports:import_dll --- GlobalAlloc kernel32.dll.660 = 0x7b842a60
- 1806.513:0009:trace:imports:import_dll --- GlobalFree kernel32.dll.667 = 0x7b843190
- 1806.513:0009:trace:imports:import_dll --- HeapAlloc kernel32.dll.684 = 0x7bc48560
- 1806.513:0009:trace:imports:import_dll --- HeapFree kernel32.dll.690 = 0x7bc47c50
- 1806.513:0009:trace:imports:import_dll --- HeapReAlloc kernel32.dll.694 = 0x7bc48910
- 1806.513:0009:trace:imports:import_dll --- InitializeCriticalSection kernel32.dll.711 = 0x7b86ca70
- 1806.513:0009:trace:imports:import_dll --- LeaveCriticalSection kernel32.dll.789 = 0x7bc365e0
- 1806.513:0009:trace:imports:import_dll --- LoadLibraryA kernel32.dll.790 = 0x7b854c40
- 1806.513:0009:trace:imports:import_dll --- LoadLibraryW kernel32.dll.793 = 0x7b854c90
- 1806.513:0009:trace:imports:import_dll --- LoadResource kernel32.dll.795 = 0x7b86b0d0
- 1806.513:0009:trace:imports:import_dll --- LocalAlloc kernel32.dll.796 = 0x7b843990
- 1806.513:0009:trace:imports:import_dll --- MultiByteToWideChar kernel32.dll.834 = 0x7b84c160
- 1806.513:0009:trace:imports:import_dll --- QueueUserWorkItem kernel32.dll.892 = 0x7b872790
- 1806.513:0009:trace:imports:import_dll --- SetEvent kernel32.dll.1061 = 0x7b86d1d0
- 1806.513:0009:trace:imports:import_dll --- SizeofResource kernel32.dll.1120 = 0x7b86b1e0
- 1806.513:0009:trace:imports:import_dll --- WaitForMultipleObjects kernel32.dll.1184 = 0x7b86c630
- 1806.513:0009:trace:imports:import_dll --- WaitForSingleObject kernel32.dll.1186 = 0x7b86c5b0
- 1806.513:0009:trace:imports:import_dll --- WideCharToMultiByte kernel32.dll.1194 = 0x7b84c620
- 1806.513:0009:trace:virtual:NtProtectVirtualMemory 0xffffffff 0x7e2f0000 00001000 00000008
- 1806.513:0009:trace:virtual:VIRTUAL_SetProt 0x7e2f0000-0x7e2f0fff c-rW-
- 1806.513:0009:trace:virtual:VIRTUAL_DumpView View: 0x7e2c0000 - 0x7e2f4fff (system)
- 1806.513:0009:trace:virtual:VIRTUAL_DumpView 0x7e2c0000 - 0x7e2c0fff c-r--
- 1806.513:0009:trace:virtual:VIRTUAL_DumpView 0x7e2c1000 - 0x7e2effff c-r-x
- 1806.513:0009:trace:virtual:VIRTUAL_DumpView 0x7e2f0000 - 0x7e2f0fff c-rW-
- 1806.513:0009:trace:virtual:VIRTUAL_DumpView 0x7e2f1000 - 0x7e2f4fff c-rw-
- 1806.513:0009:trace:module:load_builtin_callback loaded winhttp.dll 0x122fa8 0x7e2c0000
- 0009: load_dll( mapping=0000, base=7e2c0000, name=00122fd0, size=217088, dbg_offset=0, dbg_size=0, filename=L"C:\\windows\\system32\\winhttp.dll" )
- 0009: load_dll() = 0
- 1806.514:0009:trace:loaddll:load_builtin_dll Loaded L"C:\\windows\\system32\\winhttp.dll" at 0x7e2c0000: builtin
- 1806.514:0009:trace:module:load_dll Loaded module L"C:\\windows\\system32\\WINHTTP.dll" (builtin) at 0x7e2c0000
- 1806.514:0009:trace:virtual:NtProtectVirtualMemory 0xffffffff 0x4bd484 00000038 00000004
- 1806.514:0009:trace:virtual:VIRTUAL_SetProt 0x4bd000-0x4bdfff c-rW-
- 1806.514:0009:trace:virtual:VIRTUAL_DumpView View: 0x400000 - 0x1e4afff 0x18
- 1806.514:0009:trace:virtual:VIRTUAL_DumpView 0x400000 - 0x400fff c-r--
- 1806.514:0009:trace:virtual:VIRTUAL_DumpView 0x401000 - 0x4bcfff c-r-x
- 1806.514:0009:trace:virtual:VIRTUAL_DumpView 0x4bd000 - 0x4bdfff c-rW-
- 1806.514:0009:trace:virtual:VIRTUAL_DumpView 0x4be000 - 0x553fff c-r--
- 1806.514:0009:trace:virtual:VIRTUAL_DumpView 0x554000 - 0x55efff c-rW-
- 1806.514:0009:trace:virtual:VIRTUAL_DumpView 0x55f000 - 0x1e4afff c-r--
- 1806.514:0009:trace:imports:import_dll --- WinHttpOpenRequest WINHTTP.dll.16 = 0x7e2ddb30
- 1806.514:0009:trace:imports:import_dll --- WinHttpCloseHandle WINHTTP.dll.7 = 0x7e2de2b0
- 1806.514:0009:trace:imports:import_dll --- WinHttpReceiveResponse WINHTTP.dll.22 = 0x7e2da970
- 1806.514:0009:trace:imports:import_dll --- WinHttpSetTimeouts WINHTTP.dll.28 = 0x7e2e0810
- 1806.514:0009:trace:imports:import_dll --- WinHttpReadData WINHTTP.dll.21 = 0x7e2dac20
- 1806.514:0009:trace:imports:import_dll --- WinHttpQueryDataAvailable WINHTTP.dll.18 = 0x7e2daac0
- 1806.514:0009:trace:imports:import_dll --- WinHttpQueryHeaders WINHTTP.dll.19 = 0x7e2d73b0
- 1806.514:0009:trace:imports:import_dll --- WinHttpCrackUrl WINHTTP.dll.9 = 0x7e2e1420
- 1806.514:0009:trace:imports:import_dll --- WinHttpSetOption WINHTTP.dll.26 = 0x7e2de510
- 1806.514:0009:trace:imports:import_dll --- WinHttpSetStatusCallback WINHTTP.dll.27 = 0x7e2e0740
- 1806.514:0009:trace:imports:import_dll --- WinHttpOpen WINHTTP.dll.15 = 0x7e2dee60
- 1806.514:0009:trace:imports:import_dll --- WinHttpSendRequest WINHTTP.dll.23 = 0x7e2d82f0
- 1806.514:0009:trace:imports:import_dll --- WinHttpQueryOption WINHTTP.dll.20 = 0x7e2de360
- 1806.514:0009:trace:imports:import_dll --- WinHttpConnect WINHTTP.dll.8 = 0x7e2dd840
- 1806.514:0009:trace:virtual:NtProtectVirtualMemory 0xffffffff 0x4bd000 00001000 00000002
- 1806.514:0009:trace:virtual:VIRTUAL_SetProt 0x4bd000-0x4bdfff c-r--
- 1806.514:0009:trace:virtual:VIRTUAL_DumpView View: 0x400000 - 0x1e4afff 0x18
- 1806.514:0009:trace:virtual:VIRTUAL_DumpView 0x400000 - 0x400fff c-r--
- 1806.514:0009:trace:virtual:VIRTUAL_DumpView 0x401000 - 0x4bcfff c-r-x
- 1806.514:0009:trace:virtual:VIRTUAL_DumpView 0x4bd000 - 0x553fff c-r--
- 1806.514:0009:trace:virtual:VIRTUAL_DumpView 0x554000 - 0x55efff c-rW-
- 1806.514:0009:trace:virtual:VIRTUAL_DumpView 0x55f000 - 0x1e4afff c-r--
- 1806.514:0009:trace:module:load_dll looking for L"CRYPT32.dll" in L"Z:\\home\\yozz\\\0414\043e\043a\0443\043c\0435\043d\0442\044b;.;C:\\windows\\system32;C:\\windows\\system;C:\\windows;"
- 1806.514:0009:trace:module:load_dll Found L"C:\\windows\\system32\\crypt32.dll" for L"CRYPT32.dll" at 0x7e300000, count=2
- 1806.514:0009:trace:virtual:NtProtectVirtualMemory 0xffffffff 0x4bd008 00000018 00000004
- 1806.514:0009:trace:virtual:VIRTUAL_SetProt 0x4bd000-0x4bdfff c-rW-
- 1806.514:0009:trace:virtual:VIRTUAL_DumpView View: 0x400000 - 0x1e4afff 0x18
- 1806.514:0009:trace:virtual:VIRTUAL_DumpView 0x400000 - 0x400fff c-r--
- 1806.514:0009:trace:virtual:VIRTUAL_DumpView 0x401000 - 0x4bcfff c-r-x
- 1806.514:0009:trace:virtual:VIRTUAL_DumpView 0x4bd000 - 0x4bdfff c-rW-
- 1806.514:0009:trace:virtual:VIRTUAL_DumpView 0x4be000 - 0x553fff c-r--
- 1806.514:0009:trace:virtual:VIRTUAL_DumpView 0x554000 - 0x55efff c-rW-
- 1806.514:0009:trace:virtual:VIRTUAL_DumpView 0x55f000 - 0x1e4afff c-r--
- 1806.514:0009:trace:imports:import_dll --- CertGetCertificateChain CRYPT32.dll.69 = 0x7e31be40
- 1806.514:0009:trace:imports:import_dll --- CertCreateCertificateChainEngine CRYPT32.dll.27 = 0x7e31b9a0
- 1806.514:0009:trace:imports:import_dll --- CertNameToStrW CRYPT32.dll.84 = 0x7e35cd90
- 1806.514:0009:trace:imports:import_dll --- CertFreeCertificateChainEngine CRYPT32.dll.62 = 0x7e31bb70
- 1806.514:0009:trace:imports:import_dll --- CertFreeCertificateContext CRYPT32.dll.64 = 0x7e30fdf0
- 1806.514:0009:trace:imports:import_dll --- CertFreeCertificateChain CRYPT32.dll.61 = 0x7e31bcd0
- 1806.514:0009:trace:virtual:NtProtectVirtualMemory 0xffffffff 0x4bd000 00001000 00000002
- 1806.514:0009:trace:virtual:VIRTUAL_SetProt 0x4bd000-0x4bdfff c-r--
- 1806.514:0009:trace:virtual:VIRTUAL_DumpView View: 0x400000 - 0x1e4afff 0x18
- 1806.514:0009:trace:virtual:VIRTUAL_DumpView 0x400000 - 0x400fff c-r--
- 1806.514:0009:trace:virtual:VIRTUAL_DumpView 0x401000 - 0x4bcfff c-r-x
- 1806.514:0009:trace:virtual:VIRTUAL_DumpView 0x4bd000 - 0x553fff c-r--
- 1806.514:0009:trace:virtual:VIRTUAL_DumpView 0x554000 - 0x55efff c-rW-
- 1806.514:0009:trace:virtual:VIRTUAL_DumpView 0x55f000 - 0x1e4afff c-r--
- 1806.514:0009:trace:seh:raise_exception code=c000013a flags=0 addr=0xf7736d70 ip=f7736d70 tid=0009
- 1806.514:0009:trace:seh:raise_exception eax=00000000 ebx=00000001 ecx=7bcd4cc0 edx=00000000 esi=00000008 edi=7bcb8c90
- 1806.514:0009:trace:seh:raise_exception ebp=0033ffe8 esp=0033ff14 cs=0023 ds=002b es=002b fs=0063 gs=006b flags=00000296
- 1806.514:0009:err:seh:raise_exception Unhandled exception code c000013a flags 0 addr 0xf7736d70
- 0009: terminate_process( handle=ffffffff, exit_code=-1073741510 )
- 0009: terminate_process() = 0 { self=1 }
- 0009: *killed* exit_code=-1073741510
- 0008: *process killed*
- root@zzz:/var/log# 0015: *wakeup* signaled=0
- 1807.359:0015:trace:heap:RtlAllocateHeap (0x110000,70000062,00000100): returning 0x111b00
- 0015: get_message( flags=04ff0001, get_win=00000000, get_first=00000000, get_last=ffffffff, hw_id=00000000, wake_mask=00000040, changed_mask=000004ff )
- 0015: get_message() = 0 { win=0001002e, msg=00000010, wparam=00000000, lparam=00000000, type=6, time=001b93ff, active_hooks=80000000, total=0, data={} }
- 1807.359:0015:trace:msg:peek_message got type 6 msg 10 (WM_CLOSE) hwnd 0x1002e wp 0 lp 0
- 1807.360:0015:trace:heap:RtlFreeHeap (0x110000,70000062,0x111b00): returning TRUE
- 1807.360:0015:trace:hook:HOOK_CallHooks skipping hook WH_GETMESSAGE mask 80000000
- 1807.360:0015:trace:class:GetClassNameW 0x1002e 0x34ef44 60
- 1807.360:0015:trace:message:SPY_EnterMessage (0x1002e) L"{#32769}" [0010] WM_CLOSE dispatched wp=00000000 lp=00000000
- 1807.360:0015:trace:explorer:desktop_wnd_proc got msg 0010 wp 0 lp 0
- 0015: post_quit_message( exit_code=0 )
- 0015: post_quit_message() = 0
- 1807.360:0015:trace:class:GetClassNameW 0x1002e 0x34f344 60
- 1807.360:0015:trace:message:SPY_ExitMessage (0x1002e) L"{#32769}" [0010] WM_CLOSE returned 00000000
- 1807.360:0015:trace:heap:RtlAllocateHeap (0x110000,70000062,00000100): returning 0x111cb8
- 0015: get_message( flags=04ff0001, get_win=00000000, get_first=00000000, get_last=ffffffff, hw_id=00000000, wake_mask=00000040, changed_mask=000004ff )
- 0015: get_message() = 0 { win=00000000, msg=00000012, wparam=00000000, lparam=00000000, type=6, time=001b9400, active_hooks=80000000, total=0, data={} }
- 1807.360:0015:trace:msg:peek_message got type 6 msg 12 (WM_QUIT) hwnd (nil) wp 0 lp 0
- 1807.361:0015:trace:heap:RtlFreeHeap (0x110000,70000062,0x111cb8): returning TRUE
- 1807.361:0015:trace:hook:HOOK_CallHooks skipping hook WH_GETMESSAGE mask 80000000
- 1807.361:0015:trace:explorer:manage_desktop desktop message loop exiting for hwnd 0x1002e
- 0015: terminate_process( handle=0000, exit_code=0 )
- 0015: terminate_process() = 0 { self=1 }
- 1807.361:0015:trace:module:LdrShutdownProcess ()
- 1807.361:0015:trace:module:MODULE_InitDLL (0x7e4f0000 L"shell32.dll",PROCESS_DETACH,0x1) - CALL
- 1807.361:0015:trace:shell:DllMain 0x7e4f0000 0x0 0x1
- 1807.361:0015:trace:module:MODULE_InitDLL (0x7e4f0000,PROCESS_DETACH,0x1) - RETURN 1
- 1807.361:0015:trace:module:MODULE_InitDLL (0x7e2a0000 L"ole32.dll",PROCESS_DETACH,0x1) - CALL
- 1807.361:0015:trace:ole:DllMain 0x7e2a0000 0x0 0x1
- 1807.361:0015:trace:module:MODULE_InitDLL (0x7e2a0000,PROCESS_DETACH,0x1) - RETURN 1
- 1807.361:0015:trace:module:MODULE_InitDLL (0x7e3f0000 L"comctl32.dll",PROCESS_DETACH,0x1) - CALL
- 1807.361:0015:trace:commctrl:DllMain 0x7e3f0000,0,0x1
- 1807.361:0015:trace:module:MODULE_InitDLL (0x7e3f0000,PROCESS_DETACH,0x1) - RETURN 1
- 1807.361:0015:trace:module:MODULE_InitDLL (0x7e3c0000 L"uxtheme.dll",PROCESS_DETACH,0x1) - CALL
- 1807.361:0015:trace:uxtheme:DllMain 0x7e3c0000 0x0 0x1: stub
- 1807.361:0015:trace:module:MODULE_InitDLL (0x7e3c0000,PROCESS_DETACH,0x1) - RETURN 1
- 1807.361:0015:trace:module:MODULE_InitDLL (0x7e8c0000 L"shlwapi.dll",PROCESS_DETACH,0x1) - CALL
- 1807.361:0015:trace:shell:DllMain 0x7e8c0000 0x0 0x1
- 1807.361:0015:trace:module:MODULE_InitDLL (0x7e8c0000,PROCESS_DETACH,0x1) - RETURN 1
- 1807.361:0015:trace:module:MODULE_InitDLL (0x7eba0000 L"user32.dll",PROCESS_DETACH,0x1) - CALL
- 1807.362:0015:trace:heap:RtlFreeHeap (0x110000,70000062,0x11d478): returning TRUE
- 1807.362:0015:trace:module:MODULE_InitDLL (0x7eba0000,PROCESS_DETACH,0x1) - RETURN 1
- 1807.362:0015:trace:module:MODULE_InitDLL (0x7eff0000 L"version.dll",PROCESS_DETACH,0x1) - CALL
- 1807.362:0015:trace:module:MODULE_InitDLL (0x7eff0000,PROCESS_DETACH,0x1) - RETURN 1
- 1807.362:0015:trace:module:MODULE_InitDLL (0x7ea80000 L"gdi32.dll",PROCESS_DETACH,0x1) - CALL
- 1807.362:0015:trace:module:MODULE_InitDLL (0x7ea80000,PROCESS_DETACH,0x1) - RETURN 1
- 1807.362:0015:trace:module:MODULE_InitDLL (0x7ed50000 L"rpcrt4.dll",PROCESS_DETACH,0x1) - CALL
- 1807.362:0015:trace:module:MODULE_InitDLL (0x7ed50000,PROCESS_DETACH,0x1) - RETURN 1
- 1807.362:0015:trace:module:MODULE_InitDLL (0x7ece0000 L"advapi32.dll",PROCESS_DETACH,0x1) - CALL
- 1807.362:0015:trace:module:MODULE_InitDLL (0x7ece0000,PROCESS_DETACH,0x1) - RETURN 1
- 1807.362:0015:trace:module:MODULE_InitDLL (0x7b810000 L"KERNEL32.dll",PROCESS_DETACH,0x1) - CALL
- 1807.362:0015:trace:module:MODULE_InitDLL (0x7b810000,PROCESS_DETACH,0x1) - RETURN 1
- 1807.362:0015:trace:module:MODULE_InitDLL (0x7bc10000 L"ntdll.dll",PROCESS_DETACH,0x1) - CALL
- 1807.362:0015:trace:module:MODULE_InitDLL (0x7bc10000,PROCESS_DETACH,0x1) - RETURN 1
- 0015: terminate_process( handle=ffffffff, exit_code=0 )
- 0015: terminate_process() = 0 { self=1 }
- 1807.362:0015:trace:module:LdrUnloadDll (0x7e2a0000)
- 1807.362:0015:trace:module:LdrUnloadDll (0x7e3c0000)
- 0015: *killed* exit_code=0
- 0014: *process killed*
- wineserver: shutting down
- 000d: *wakeup* signaled=0
- 0029: *wakeup* signaled=0
- 1810.367:0029:trace:service:QueryServiceStatus 0x114308 0x34fb50
- 1810.367:000d:trace:service:events_loop Wait returned 0
- 1810.367:000d:trace:service:events_loop Object signaled - wine shutdown
- 1810.367:0029:trace:service:QueryServiceStatusEx 0x114308 0 0x34fac8 36 0x34fac4
- 1810.367:0029:trace:rpc:NdrClientInitializeNew (pRpcMessage == ^0x34f78c, pStubMsg == ^0x34f86c, pStubDesc == ^0x7ede7e00, ProcNum == 40)
- 1810.367:0029:trace:ole:NDRCContextBinding 0x114308
- 1810.367:0029:trace:rpc:NdrGetBuffer (stubmsg == ^0x34f86c, buflen == 38, handle == 0x114340)
- 000d: close_handle( handle=0038 )
- 1810.367:0029:trace:rpc:I_RpcGetBuffer (0x34f78c): BufferLength=38
- 000d: close_handle() = 0
- 000d: close_handle( handle=003c )
- 000d: close_handle() = 0
- 000d: select( flags=2, cookie=0034f8c8, timeout=infinite, prev_apc=0000, result={}, data={WAIT,handles={007c}} )
- 000d: select() = PENDING { timeout=infinite, call={APC_NONE}, apc_handle=0000 }
- 1810.367:0029:trace:heap:RtlAllocateHeap (0x110000,70000062,00000026): returning 0x12aae8
- 1810.367:0029:trace:rpc:I_RpcGetBuffer Buffer=0x12aae8
- 1810.367:0029:trace:rpc:I_RpcNegotiateTransferSyntax (0x34f78c)
- 1810.367:0029:trace:rpc:RPCRT4_OpenBinding (Binding == ^0x114340)
- 1810.367:0029:trace:rpc:RpcAssoc_GetIdleConnection got connection from pool 0x1136f8
- 1810.367:0029:trace:ole:NdrClientContextMarshall (0x34f86c, 0x114308, 0)
- 1810.367:0029:trace:ole:NDRCContextMarshall 0x114308 0x12aae8
- 1810.367:0029:trace:ole:NdrBaseTypeMarshall pStubMsg 0x34f86c, pMemory 0x34f984, type 0x0d
- 1810.367:0029:trace:ole:NdrBaseTypeMarshall value: 0x0000
- 1810.367:0029:trace:rpc:NdrSendReceive (stubmsg == ^0x34f86c, buffer == ^0x12ab04)
- 1810.367:0029:trace:rpc:I_RpcSendReceive (0x34f78c)
- 1810.367:0029:trace:rpc:I_RpcSend (0x34f78c)
- 1810.367:0029:trace:rpc:UuidIsNil ({00000000-0000-0000-0000-000000000000})
- 1810.367:0029:trace:rpc:UuidCompare ({00000000-0000-0000-0000-000000000000},{00000000-0000-0000-0000-000000000000})
- 1810.367:0029:trace:heap:RtlAllocateHeap (0x110000,7000006a,00000018): returning 0x12ab20
- 1810.368:0029:trace:heap:RtlAllocateHeap (0x110000,7000006a,00000034): returning 0x12ab48
- 1810.368:0029:trace:file:WriteFile 0x10 0x12ab48 52 0x34f5a8 (nil)
- 1810.368:0029:trace:ntdll:NtWriteFile (0x10,(nil),(nil),(nil),0x34f534,0x12ab48,0x00000034,(nil),(nil))!
- 1810.368:0029:trace:ntdll:NtWriteFile = SUCCESS (52)
- 1810.368:002a:trace:ntdll:NtReadFile = SUCCESS (16)
- 1810.368:0029:trace:heap:RtlFreeHeap (0x110000,70000062,0x12ab48): returning TRUE
- 1810.368:002a:trace:heap:RtlAllocateHeap (0x110000,70000062,00000018): returning 0x11eb30
- 1810.368:002a:trace:file:ReadFile 0x34 0x11eb40 8 0x54e888 (nil)
- 1810.368:002a:trace:ntdll:NtReadFile (0x34,(nil),(nil),(nil),0x54e814,0x11eb40,0x00000008,(nil),(nil)),partial stub!
- 1810.368:0029:trace:heap:RtlFreeHeap (0x110000,70000062,0x12ab20): returning TRUE
- 1810.368:002a:trace:ntdll:NtReadFile = SUCCESS (8)
- 1810.368:0029:trace:rpc:I_RpcReceive (0x34f78c)
- 1810.368:0029:trace:rpc:RPCRT4_ReceiveWithAuth (0x1136f8, 0x34f698, 0x34f78c, (nil))
- 1810.368:0029:trace:rpc:RPCRT4_default_receive_fragment (0x1136f8, 0x34f698, 0x34f638)
- 1810.368:0029:trace:file:ReadFile 0x10 0x34f5ac 16 0x34f568 (nil)
- 1810.368:0029:trace:ntdll:NtReadFile (0x10,(nil),(nil),(nil),0x34f4f4,0x34f5ac,0x00000010,(nil),(nil)),partial stub!
- 1810.368:002a:trace:heap:RtlAllocateHeap (0x110000,70000062,0000001c): returning 0x11eb58
- 1810.368:002a:trace:file:ReadFile 0x34 0x11eb58 28 0x54e888 (nil)
- 1810.368:002a:trace:ntdll:NtReadFile (0x34,(nil),(nil),(nil),0x54e814,0x11eb58,0x0000001c,(nil),(nil)),partial stub!
- 1810.368:002a:trace:ntdll:NtReadFile = SUCCESS (28)
- 1810.368:002a:trace:rpc:RPCRT4_ReceiveWithAuth buffer length = 28
- 1810.368:002a:trace:heap:RtlAllocateHeap (0x110000,70000062,0000001c): returning 0x11eb88
- 1810.368:002a:trace:heap:RtlFreeHeap (0x110000,70000062,0x11eb58): returning TRUE
- 1810.368:002a:trace:rpc:RPCRT4_io_thread got request packet
- 1810.368:002a:trace:heap:RtlAllocateHeap (0x110000,70000062,00000014): returning 0x11ebb8
- 1810.368:002a:trace:thread:QueueUserWorkItem (0x7ed853f0,0x11ebb8,0x00000010)
- 1810.368:002a:trace:heap:RtlAllocateHeap (0x110000,70000062,00000010): returning 0x11ebe0
- 002a: release_semaphore( handle=0048, count=00000001 )
- 0027: *wakeup* signaled=0
- 002a: release_semaphore() = 0 { prev_count=00000000 }
- 1810.368:0027:trace:heap:RtlFreeHeap (0x110000,70000062,0x11ebe0): returning TRUE
- 1810.368:0027:trace:threadpool:worker_thread_proc executing 0x7ed853f0(0x11ebb8)
- 1810.368:0027:trace:rpc:RPCRT4_process_packet got request packet
- 1810.368:0027:trace:rpc:UuidIsNil ({367abb81-9844-35f1-ad32-98f038001003})
- 1810.368:0027:trace:rpc:UuidCompare ({367abb81-9844-35f1-ad32-98f038001003},{00000000-0000-0000-0000-000000000000})
- 1810.368:0027:trace:rpc:UuidEqual ({00000000-0000-0000-0000-000000000000},{00000000-0000-0000-0000-000000000000})
- 1810.368:0027:trace:rpc:UuidCompare ({00000000-0000-0000-0000-000000000000},{00000000-0000-0000-0000-000000000000})
- 1810.368:0027:trace:rpc:RPCRT4_find_interface returning 0x114c18 for object (null), if_id { 2.0 {367abb81-9844-35f1-ad32-98f038001003} }
- 1810.368:0027:trace:rpc:NdrServerInitializeNew (pRpcMsg == ^0x11b2e8, pStubMsg == ^0x84e704, pStubDesc == ^0x7eddfe40)
- 1810.368:002a:trace:heap:RtlAllocateHeap (0x110000,7000006a,0000002c): returning 0x11ec00
- 1810.368:0027:trace:ole:NdrServerContextNewUnmarshall (0x84e704, 0x7eddbc52)
- 1810.368:002a:trace:rpc:RPCRT4_ReceiveWithAuth (0x119728, 0x54e9b0, 0x11ec00, 0x54e9b4)
- 1810.368:0027:trace:ole:NDRSContextUnmarshall2 (0x1199c8 0x11eb88 00000010 (nil) 0)
- 1810.368:002a:trace:rpc:RPCRT4_default_receive_fragment (0x119728, 0x54e9b0, 0x54e958)
- 1810.368:002a:trace:file:ReadFile 0x34 0x54e8cc 16 0x54e888 (nil)
- 1810.368:0027:trace:rpc:UuidIsNil ({2f97d3b0-3dc8-4881-a3ec-a2198f379253})
- 1810.368:002a:trace:ntdll:NtReadFile (0x34,(nil),(nil),(nil),0x54e814,0x54e8cc,0x00000010,(nil),(nil)),partial stub!
- 1810.368:0027:trace:rpc:UuidCompare ({2f97d3b0-3dc8-4881-a3ec-a2198f379253},{00000000-0000-0000-0000-000000000000})
- 1810.368:0027:trace:rpc:RpcServerAssoc_FindContextHandle found 0x11a3a8
- 1810.369:0027:trace:heap:RtlAllocateHeap (0x110000,70000062,00000008): returning 0x11ec40
- 1810.369:0027:trace:ole:NdrSimpleTypeUnmarshall pMemory: 0x84e7e8
- 1810.369:0027:trace:ole:NdrSimpleTypeUnmarshall value: 0x00000000
- 1810.369:0027:trace:heap:RtlAllocateHeap (0x110000,70000062,00000038): returning 0x11ec58
- 1810.369:0027:trace:ole:NdrAllocate -- 0x11ec58
- 1810.369:0027:trace:ole:NdrConformantArrayBufferSize (0x84e704,0x11ec58,0x7eddbc56)
- 1810.369:0027:trace:ole:ComputeConformanceOrVariance toplevel conformance, ofs=12
- 1810.369:0027:trace:ole:ComputeConformanceOrVariance resulting conformance is 36
- 1810.369:0027:trace:ole:EmbeddedPointerBufferSize (0x84e704,0x11ec58,0x7eddbc5e)
- 1810.369:0027:trace:rpc:I_RpcGetBuffer (0x11b2e8): BufferLength=56
- 1810.369:0027:trace:heap:RtlAllocateHeap (0x110000,70000062,00000038): returning 0x11eca0
- 1810.369:0027:trace:rpc:I_RpcGetBuffer Buffer=0x11eca0
- 1810.369:0027:trace:ole:NdrConformantArrayMarshall (0x84e704,0x11ec58,0x7eddbc56)
- 1810.369:0027:trace:ole:ComputeConformanceOrVariance toplevel conformance, ofs=12
- 1810.369:0027:trace:ole:ComputeConformanceOrVariance resulting conformance is 36
- 1810.369:0027:trace:ole:EmbeddedPointerMarshall (0x84e704,0x11ec58,0x7eddbc5e)
- 1810.369:0027:trace:ole:NdrPointerFree (0x84e704,0x11ec58,0x7eddbc60)
- 1810.369:0027:trace:ole:PointerFree (0x84e704,0x11ec58,0x7eddbc60)
- 1810.369:0027:trace:ole:PointerFree type=0x11, attr=
- 1810.369:0027:trace:ole:NdrConformantArrayFree (0x84e704,0x11ec58,0x7eddbc56)
- 1810.369:0027:trace:ole:ComputeConformanceOrVariance toplevel conformance, ofs=12
- 1810.369:0027:trace:ole:ComputeConformanceOrVariance resulting conformance is 36
- 1810.369:0027:trace:ole:EmbeddedPointerFree (0x84e704,0x11ec58,0x7eddbc5e)
- 1810.369:0027:trace:ole:PointerFree freeing 0x11ec58
- 1810.369:0027:trace:ole:NdrFree (0x84e704, 0x11ec58)
- 1810.369:0027:trace:heap:RtlFreeHeap (0x110000,70000062,0x11ec58): returning TRUE
- 1810.369:0027:trace:heap:RtlFreeHeap (0x110000,70000062,0x11ec40): returning TRUE
- 1810.369:0027:trace:heap:RtlAllocateHeap (0x110000,7000006a,00000018): returning 0x11ece8
- 1810.369:0027:trace:heap:RtlAllocateHeap (0x110000,7000006a,00000048): returning 0x11ed10
- 1810.369:0027:trace:file:WriteFile 0x34 0x11ed10 72 0x84e778 (nil)
- 1810.369:0027:trace:ntdll:NtWriteFile (0x34,(nil),(nil),(nil),0x84e704,0x11ed10,0x00000048,(nil),(nil))!
- 1810.369:0027:trace:ntdll:NtWriteFile = SUCCESS (72)
- 1810.369:0029:trace:ntdll:NtReadFile = SUCCESS (16)
- 1810.370:0027:trace:heap:RtlFreeHeap (0x110000,70000062,0x11ed10): returning TRUE
- 1810.370:0029:trace:heap:RtlAllocateHeap (0x110000,70000062,00000018): returning 0x12ab90
- 1810.370:0029:trace:file:ReadFile 0x10 0x12aba0 8 0x34f568 (nil)
- 1810.370:0027:trace:heap:RtlFreeHeap (0x110000,70000062,0x11ece8): returning TRUE
- 1810.370:0029:trace:ntdll:NtReadFile (0x10,(nil),(nil),(nil),0x34f4f4,0x12aba0,0x00000008,(nil),(nil)),partial stub!
- 1810.370:0027:trace:rpc:process_request_packet freeing Buffer=0x11eb88
- 1810.370:0029:trace:ntdll:NtReadFile = SUCCESS (8)
- 1810.370:0027:trace:heap:RtlFreeHeap (0x110000,70000062,0x11eb88): returning TRUE
- 1810.370:0029:trace:heap:RtlAllocateHeap (0x110000,70000062,00000030): returning 0x12abb8
- 1810.370:0029:trace:file:ReadFile 0x10 0x12abb8 48 0x34f568 (nil)
- 1810.370:0029:trace:ntdll:NtReadFile (0x10,(nil),(nil),(nil),0x34f4f4,0x12abb8,0x00000030,(nil),(nil)),partial stub!
- 1810.370:0029:trace:ntdll:NtReadFile = SUCCESS (48)
- 1810.370:0029:trace:rpc:RPCRT4_ReceiveWithAuth buffer length = 48
- 1810.370:0027:trace:heap:RtlFreeHeap (0x110000,70000062,0x11eca0): returning TRUE
- 1810.370:0027:trace:heap:RtlFreeHeap (0x110000,70000062,0x11eb30): returning TRUE
- 1810.370:0029:trace:heap:RtlAllocateHeap (0x110000,70000062,00000030): returning 0x12abf8
- 1810.370:0027:trace:heap:RtlFreeHeap (0x110000,70000062,0x11b2e8): returning TRUE
- 1810.370:0029:trace:heap:RtlFreeHeap (0x110000,70000062,0x12abb8): returning TRUE
- 1810.370:0027:trace:heap:RtlFreeHeap (0x110000,70000062,0x11ebb8): returning TRUE
- 0027: select( flags=2, cookie=0084e708, timeout=+30.0000000, prev_apc=0000, result={}, data={WAIT,handles={0048}} )
- 0027: select() = PENDING { timeout=1d0a66fad4eee82 (+30.0000000), call={APC_NONE}, apc_handle=0000 }
- 1810.370:0029:trace:heap:RtlFreeHeap (0x110000,70000062,0x12ab90): returning TRUE
- 1810.371:0029:trace:heap:RtlFreeHeap (0x110000,70000062,0x12aae8): returning TRUE
- 1810.371:0029:trace:ole:NdrConformantArrayUnmarshall (0x34f86c,0x34f77c,0x7edd59d6,0)
- 1810.371:0029:trace:ole:ReadConformance unmarshalled conformance is 36
- 1810.371:0029:trace:ole:EmbeddedPointerUnmarshall (0x34f86c,0x12abfc,0x34fac8,0x7edd59de,0)
- 1810.371:0029:trace:ole:array_read_variance_and_unmarshall copying 0x12abfc to 0x34fac8
- 1810.371:0029:trace:rpc:NdrFreeBuffer (pStubMsg == ^0x34f86c)
- 1810.371:0029:trace:rpc:I_RpcFreeBuffer (0x34f78c) Buffer=0x12abf8
- 1810.371:0029:trace:rpc:RPCRT4_CloseBinding (Binding == ^0x114340)
- 1810.371:0029:trace:heap:RtlFreeHeap (0x110000,70000062,0x12abf8): returning TRUE
- 1810.371:0029:trace:service:service_handle_control L"MountMgr" control 5
- 1810.371:0029:trace:winedevice:service_handler shutting down L"MountMgr"
- 1810.371:0029:trace:service:SetServiceStatus 0x1140d0 30 3 0 0 0 0 0
- 1810.371:0029:trace:rpc:NdrClientInitializeNew (pRpcMessage == ^0x34f7ac, pStubMsg == ^0x34f88c, pStubDesc == ^0x7ede7e00, ProcNum == 7)
- 1810.371:0029:trace:ole:NDRCContextBinding 0x1140d0
- 1810.371:0029:trace:rpc:NdrGetBuffer (stubmsg == ^0x34f88c, buflen == 56, handle == 0x114108)
- 1810.371:0029:trace:rpc:I_RpcGetBuffer (0x34f7ac): BufferLength=56
- 1810.371:0029:trace:heap:RtlAllocateHeap (0x110000,70000062,00000038): returning 0x12ac38
- 1810.371:0029:trace:rpc:I_RpcGetBuffer Buffer=0x12ac38
- 1810.371:0029:trace:rpc:I_RpcNegotiateTransferSyntax (0x34f7ac)
- 1810.371:0029:trace:rpc:RPCRT4_OpenBinding (Binding == ^0x114108)
- 1810.371:0029:trace:rpc:RpcAssoc_GetIdleConnection got connection from pool 0x1136f8
- 1810.371:0029:trace:ole:NdrClientContextMarshall (0x34f88c, 0x1140d0, 0)
- 1810.371:0029:trace:ole:NDRCContextMarshall 0x1140d0 0x12ac38
- 1810.371:0029:trace:ole:NdrSimpleStructMarshall (0x34f88c,0x34fab0,0x7edd57b4)
- 1810.371:0029:trace:rpc:NdrSendReceive (stubmsg == ^0x34f88c, buffer == ^0x12ac68)
- 1810.371:0029:trace:rpc:I_RpcSendReceive (0x34f7ac)
- 1810.371:0029:trace:rpc:I_RpcSend (0x34f7ac)
- 1810.371:0029:trace:rpc:UuidIsNil ({00000000-0000-0000-0000-000000000000})
- 1810.371:0029:trace:rpc:UuidCompare ({00000000-0000-0000-0000-000000000000},{00000000-0000-0000-0000-000000000000})
- 1810.372:0029:trace:heap:RtlAllocateHeap (0x110000,7000006a,00000018): returning 0x12ac80
- 1810.372:0029:trace:heap:RtlAllocateHeap (0x110000,7000006a,00000048): returning 0x12aca8
- 1810.372:0029:trace:file:WriteFile 0x10 0x12aca8 72 0x34f5c8 (nil)
- 1810.372:0029:trace:ntdll:NtWriteFile (0x10,(nil),(nil),(nil),0x34f554,0x12aca8,0x00000048,(nil),(nil))!
- 1810.372:002a:trace:ntdll:NtReadFile = SUCCESS (16)
- 1810.372:002a:trace:heap:RtlAllocateHeap (0x110000,70000062,00000018): returning 0x11ed68
- 1810.372:002a:trace:file:ReadFile 0x34 0x11ed78 8 0x54e888 (nil)
- 1810.372:002a:trace:ntdll:NtReadFile (0x34,(nil),(nil),(nil),0x54e814,0x11ed78,0x00000008,(nil),(nil)),partial stub!
- 1810.372:002a:trace:ntdll:NtReadFile = SUCCESS (8)
- 1810.372:002a:trace:heap:RtlAllocateHeap (0x110000,70000062,00000030): returning 0x11ed90
- 1810.372:002a:trace:file:ReadFile 0x34 0x11ed90 48 0x54e888 (nil)
- 1810.372:002a:trace:ntdll:NtReadFile (0x34,(nil),(nil),(nil),0x54e814,0x11ed90,0x00000030,(nil),(nil)),partial stub!
- 1810.372:002a:trace:ntdll:NtReadFile = SUCCESS (48)
- 1810.372:002a:trace:rpc:RPCRT4_ReceiveWithAuth buffer length = 48
- 1810.372:002a:trace:heap:RtlAllocateHeap (0x110000,70000062,00000030): returning 0x11edd0
- 1810.372:002a:trace:heap:RtlFreeHeap (0x110000,70000062,0x11ed90): returning TRUE
- 1810.372:002a:trace:rpc:RPCRT4_io_thread got request packet
- 1810.373:002a:trace:heap:RtlAllocateHeap (0x110000,70000062,00000014): returning 0x11ee10
- 1810.373:002a:trace:thread:QueueUserWorkItem (0x7ed853f0,0x11ee10,0x00000010)
- 1810.373:002a:trace:heap:RtlAllocateHeap (0x110000,70000062,00000010): returning 0x11ee38
- 002a: release_semaphore( handle=0048, count=00000001 )
- 1810.373:0029:trace:ntdll:NtWriteFile = SUCCESS (72)
- 002c: *wakeup* signaled=0
- 002a: release_semaphore() = 0 { prev_count=00000000 }
- 1810.373:0029:trace:heap:RtlFreeHeap (0x110000,70000062,0x12aca8): returning TRUE
- 1810.373:002a:trace:heap:RtlAllocateHeap (0x110000,7000006a,0000002c): returning 0x11ee58
- 1810.373:002a:trace:rpc:RPCRT4_ReceiveWithAuth (0x119728, 0x54e9b0, 0x11ee58, 0x54e9b4)
- 1810.373:002a:trace:rpc:RPCRT4_default_receive_fragment (0x119728, 0x54e9b0, 0x54e958)
- 1810.373:002a:trace:file:ReadFile 0x34 0x54e8cc 16 0x54e888 (nil)
- 1810.373:0029:trace:heap:RtlFreeHeap (0x110000,70000062,0x12ac80): returning TRUE
- 1810.373:002a:trace:ntdll:NtReadFile (0x34,(nil),(nil),(nil),0x54e814,0x54e8cc,0x00000010,(nil),(nil)),partial stub!
- 1810.373:0029:trace:rpc:I_RpcReceive (0x34f7ac)
- 1810.373:0029:trace:rpc:RPCRT4_ReceiveWithAuth (0x1136f8, 0x34f6b8, 0x34f7ac, (nil))
- 1810.373:002c:trace:heap:RtlFreeHeap (0x110000,70000062,0x11ee38): returning TRUE
- 1810.373:0029:trace:rpc:RPCRT4_default_receive_fragment (0x1136f8, 0x34f6b8, 0x34f658)
- 1810.373:002c:trace:threadpool:worker_thread_proc executing 0x7ed853f0(0x11ee10)
- 1810.373:0029:trace:file:ReadFile 0x10 0x34f5cc 16 0x34f588 (nil)
- 1810.373:002c:trace:rpc:RPCRT4_process_packet got request packet
- 1810.373:0029:trace:ntdll:NtReadFile (0x10,(nil),(nil),(nil),0x34f514,0x34f5cc,0x00000010,(nil),(nil)),partial stub!
- 1810.373:002c:trace:rpc:UuidIsNil ({367abb81-9844-35f1-ad32-98f038001003})
- 1810.373:002c:trace:rpc:UuidCompare ({367abb81-9844-35f1-ad32-98f038001003},{00000000-0000-0000-0000-000000000000})
- 1810.373:002c:trace:rpc:UuidEqual ({00000000-0000-0000-0000-000000000000},{00000000-0000-0000-0000-000000000000})
- 1810.373:002c:trace:rpc:UuidCompare ({00000000-0000-0000-0000-000000000000},{00000000-0000-0000-0000-000000000000})
- 1810.373:002c:trace:rpc:RPCRT4_find_interface returning 0x114c18 for object (null), if_id { 2.0 {367abb81-9844-35f1-ad32-98f038001003} }
- 1810.373:002c:trace:rpc:NdrServerInitializeNew (pRpcMsg == ^0x11ec00, pStubMsg == ^0xa5e714, pStubDesc == ^0x7eddfe40)
- 1810.373:002c:trace:ole:NdrServerContextNewUnmarshall (0xa5e714, 0x7eddba30)
- 1810.373:002c:trace:ole:NDRSContextUnmarshall2 (0x1199c8 0x11edd0 00000010 (nil) 0)
- 1810.373:002c:trace:rpc:UuidIsNil ({92012f8d-c0c0-4122-9d47-70a5ee8c3e08})
- 1810.373:002c:trace:rpc:UuidCompare ({92012f8d-c0c0-4122-9d47-70a5ee8c3e08},{00000000-0000-0000-0000-000000000000})
- 1810.373:002c:trace:rpc:RpcServerAssoc_FindContextHandle found 0x11a0e0
- 1810.373:002c:trace:heap:RtlAllocateHeap (0x110000,70000062,00000008): returning 0x11ee98
- 1810.373:002c:trace:ole:NdrSimpleStructUnmarshall (0xa5e714,0xa5e7f8,0x7eddba34,0)
- 1810.373:002c:trace:ole:NdrSimpleStructUnmarshall copying 0x11ede4 to 0x11ede4
- 1810.373:002c:trace:service:svcctl_SetServiceStatus (0x11a198, 0x11ede4)
- 002c: event_op( handle=0060, op=1 )
- 002c: event_op() = 0
- 1810.374:002c:trace:rpc:I_RpcGetBuffer (0x11ec00): BufferLength=8
- 1810.374:002c:trace:heap:RtlAllocateHeap (0x110000,70000062,00000008): returning 0x11eeb0
- 1810.374:002c:trace:rpc:I_RpcGetBuffer Buffer=0x11eeb0
- 1810.374:002c:trace:heap:RtlFreeHeap (0x110000,70000062,0x11ee98): returning TRUE
- 1810.374:002c:trace:heap:RtlAllocateHeap (0x110000,7000006a,00000018): returning 0x11eec8
- 1810.374:002c:trace:heap:RtlAllocateHeap (0x110000,7000006a,0000001c): returning 0x11eef0
- 1810.374:002c:trace:file:WriteFile 0x34 0x11eef0 28 0xa5e778 (nil)
- 1810.374:002c:trace:ntdll:NtWriteFile (0x34,(nil),(nil),(nil),0xa5e704,0x11eef0,0x0000001c,(nil),(nil))!
- 1810.374:002c:trace:ntdll:NtWriteFile = SUCCESS (28)
- 1810.374:0029:trace:ntdll:NtReadFile = SUCCESS (16)
- 1810.374:002c:trace:heap:RtlFreeHeap (0x110000,70000062,0x11eef0): returning TRUE
- 1810.374:0029:trace:heap:RtlAllocateHeap (0x110000,70000062,00000018): returning 0x12ad00
- 1810.374:0029:trace:file:ReadFile 0x10 0x12ad10 8 0x34f588 (nil)
- 1810.374:0029:trace:ntdll:NtReadFile (0x10,(nil),(nil),(nil),0x34f514,0x12ad10,0x00000008,(nil),(nil)),partial stub!
- 1810.374:0029:trace:ntdll:NtReadFile = SUCCESS (8)
- 1810.374:002c:trace:heap:RtlFreeHeap (0x110000,70000062,0x11eec8): returning TRUE
- 1810.374:002c:trace:rpc:process_request_packet freeing Buffer=0x11edd0
- 1810.375:002c:trace:heap:RtlFreeHeap (0x110000,70000062,0x11edd0): returning TRUE
- 1810.375:0029:trace:heap:RtlAllocateHeap (0x110000,70000062,00000004): returning 0x12ad28
- 1810.375:0029:trace:file:ReadFile 0x10 0x12ad28 4 0x34f588 (nil)
- 1810.375:0029:trace:ntdll:NtReadFile (0x10,(nil),(nil),(nil),0x34f514,0x12ad28,0x00000004,(nil),(nil)),partial stub!
- 1810.375:0029:trace:ntdll:NtReadFile = SUCCESS (4)
- 1810.375:0029:trace:rpc:RPCRT4_ReceiveWithAuth buffer length = 4
- 1810.375:002c:trace:heap:RtlFreeHeap (0x110000,70000062,0x11eeb0): returning TRUE
- 1810.375:002c:trace:heap:RtlFreeHeap (0x110000,70000062,0x11ed68): returning TRUE
- 1810.375:0029:trace:heap:RtlAllocateHeap (0x110000,70000062,00000004): returning 0x12ad40
- 1810.375:002c:trace:heap:RtlFreeHeap (0x110000,70000062,0x11ec00): returning TRUE
- 1810.375:0029:trace:heap:RtlFreeHeap (0x110000,70000062,0x12ad28): returning TRUE
- 1810.375:002c:trace:heap:RtlFreeHeap (0x110000,70000062,0x11ee10): returning TRUE
- 002c: select( flags=2, cookie=00a5e708, timeout=+30.0000000, prev_apc=0000, result={}, data={WAIT,handles={0048}} )
- 002c: select() = PENDING { timeout=1d0a66fad4fb132 (+30.0000000), call={APC_NONE}, apc_handle=0000 }
- 1810.375:0029:trace:heap:RtlFreeHeap (0x110000,70000062,0x12ad00): returning TRUE
- 1810.375:0029:trace:heap:RtlFreeHeap (0x110000,70000062,0x12ac38): returning TRUE
- 1810.375:0029:trace:rpc:NdrFreeBuffer (pStubMsg == ^0x34f88c)
- 1810.375:0029:trace:rpc:I_RpcFreeBuffer (0x34f7ac) Buffer=0x12ad40
- 1810.375:0029:trace:rpc:RPCRT4_CloseBinding (Binding == ^0x114108)
- 1810.376:0029:trace:heap:RtlFreeHeap (0x110000,70000062,0x12ad40): returning TRUE
- 0029: event_op( handle=0038, op=1 )
- 002e: *wakeup* signaled=0
- 0029: event_op() = 0
- 1810.376:0029:trace:service:service_run_main_thread last user process exited, shutting down (timeout: 5000)
- 0029: select( flags=2, cookie=0034f6c8, timeout=+5.0000000, prev_apc=0000, result={}, data={WAIT_ALL,handles={0034}} )
- 0029: select() = PENDING { timeout=1d0a66f9e691258 (+5.0000000), call={APC_NONE}, apc_handle=0000 }
- 1810.376:002e:trace:heap:RtlFreeHeap (0x110000,70000062,0x116890): returning TRUE
- 1810.376:002e:trace:service:SetServiceStatus 0x1140d0 30 1 0 0 0 0 2710
- 1810.376:002e:trace:rpc:NdrClientInitializeNew (pRpcMessage == ^0x54e64c, pStubMsg == ^0x54e72c, pStubDesc == ^0x7ede7e00, ProcNum == 7)
- 1810.376:002e:trace:ole:NDRCContextBinding 0x1140d0
- 1810.376:002e:trace:rpc:NdrGetBuffer (stubmsg == ^0x54e72c, buflen == 56, handle == 0x114108)
- 1810.376:002e:trace:rpc:I_RpcGetBuffer (0x54e64c): BufferLength=56
- 1810.376:002e:trace:heap:RtlAllocateHeap (0x110000,70000062,00000038): returning 0x12ad58
- 1810.376:002e:trace:rpc:I_RpcGetBuffer Buffer=0x12ad58
- 1810.376:002e:trace:rpc:I_RpcNegotiateTransferSyntax (0x54e64c)
- 1810.376:002e:trace:rpc:RPCRT4_OpenBinding (Binding == ^0x114108)
- 1810.376:002e:trace:rpc:RpcAssoc_GetIdleConnection got connection from pool 0x1136f8
- 1810.376:002e:trace:ole:NdrClientContextMarshall (0x54e72c, 0x1140d0, 0)
- 1810.376:002e:trace:ole:NDRCContextMarshall 0x1140d0 0x12ad58
- 1810.376:002e:trace:ole:NdrSimpleStructMarshall (0x54e72c,0x54e950,0x7edd57b4)
- 1810.376:002e:trace:rpc:NdrSendReceive (stubmsg == ^0x54e72c, buffer == ^0x12ad88)
- 1810.376:002e:trace:rpc:I_RpcSendReceive (0x54e64c)
- 1810.376:002e:trace:rpc:I_RpcSend (0x54e64c)
- 1810.376:002e:trace:rpc:UuidIsNil ({00000000-0000-0000-0000-000000000000})
- 1810.376:002e:trace:rpc:UuidCompare ({00000000-0000-0000-0000-000000000000},{00000000-0000-0000-0000-000000000000})
- 1810.376:002e:trace:heap:RtlAllocateHeap (0x110000,7000006a,00000018): returning 0x12ada0
- 1810.376:002e:trace:heap:RtlAllocateHeap (0x110000,7000006a,00000048): returning 0x12adc8
- 1810.376:002e:trace:file:WriteFile 0x10 0x12adc8 72 0x54e468 (nil)
- 1810.376:002e:trace:ntdll:NtWriteFile (0x10,(nil),(nil),(nil),0x54e3f4,0x12adc8,0x00000048,(nil),(nil))!
- 1810.376:002e:trace:ntdll:NtWriteFile = SUCCESS (72)
- 1810.376:002a:trace:ntdll:NtReadFile = SUCCESS (16)
- 1810.376:002e:trace:heap:RtlFreeHeap (0x110000,70000062,0x12adc8): returning TRUE
- 1810.376:002a:trace:heap:RtlAllocateHeap (0x110000,70000062,00000018): returning 0x11ef20
- 1810.376:002a:trace:file:ReadFile 0x34 0x11ef30 8 0x54e888 (nil)
- 1810.376:002a:trace:ntdll:NtReadFile (0x34,(nil),(nil),(nil),0x54e814,0x11ef30,0x00000008,(nil),(nil)),partial stub!
- 1810.376:002e:trace:heap:RtlFreeHeap (0x110000,70000062,0x12ada0): returning TRUE
- 1810.376:002e:trace:rpc:I_RpcReceive (0x54e64c)
- 1810.376:002a:trace:ntdll:NtReadFile = SUCCESS (8)
- 1810.376:002e:trace:rpc:RPCRT4_ReceiveWithAuth (0x1136f8, 0x54e558, 0x54e64c, (nil))
- 1810.376:002e:trace:rpc:RPCRT4_default_receive_fragment (0x1136f8, 0x54e558, 0x54e4f8)
- 1810.376:002e:trace:file:ReadFile 0x10 0x54e46c 16 0x54e428 (nil)
- 1810.376:002e:trace:ntdll:NtReadFile (0x10,(nil),(nil),(nil),0x54e3b4,0x54e46c,0x00000010,(nil),(nil)),partial stub!
- 1810.376:002a:trace:heap:RtlAllocateHeap (0x110000,70000062,00000030): returning 0x11ef48
- 1810.376:002a:trace:file:ReadFile 0x34 0x11ef48 48 0x54e888 (nil)
- 1810.376:002a:trace:ntdll:NtReadFile (0x34,(nil),(nil),(nil),0x54e814,0x11ef48,0x00000030,(nil),(nil)),partial stub!
- 1810.376:002a:trace:ntdll:NtReadFile = SUCCESS (48)
- 1810.376:002a:trace:rpc:RPCRT4_ReceiveWithAuth buffer length = 48
- 1810.376:002a:trace:heap:RtlAllocateHeap (0x110000,70000062,00000030): returning 0x11ef88
- 1810.377:002a:trace:heap:RtlFreeHeap (0x110000,70000062,0x11ef48): returning TRUE
- 1810.377:002a:trace:rpc:RPCRT4_io_thread got request packet
- 1810.377:002a:trace:heap:RtlAllocateHeap (0x110000,70000062,00000014): returning 0x11efc8
- 1810.377:002a:trace:thread:QueueUserWorkItem (0x7ed853f0,0x11efc8,0x00000010)
- 1810.377:002a:trace:heap:RtlAllocateHeap (0x110000,70000062,00000010): returning 0x11eff0
- 002a: release_semaphore( handle=0048, count=00000001 )
- 0027: *wakeup* signaled=0
- 002a: release_semaphore() = 0 { prev_count=00000000 }
- 1810.377:0027:trace:heap:RtlFreeHeap (0x110000,70000062,0x11eff0): returning TRUE
- 1810.377:0027:trace:threadpool:worker_thread_proc executing 0x7ed853f0(0x11efc8)
- 1810.377:0027:trace:rpc:RPCRT4_process_packet got request packet
- 1810.377:0027:trace:rpc:UuidIsNil ({367abb81-9844-35f1-ad32-98f038001003})
- 1810.377:0027:trace:rpc:UuidCompare ({367abb81-9844-35f1-ad32-98f038001003},{00000000-0000-0000-0000-000000000000})
- 1810.377:0027:trace:rpc:UuidEqual ({00000000-0000-0000-0000-000000000000},{00000000-0000-0000-0000-000000000000})
- 1810.377:0027:trace:rpc:UuidCompare ({00000000-0000-0000-0000-000000000000},{00000000-0000-0000-0000-000000000000})
- 1810.377:0027:trace:rpc:RPCRT4_find_interface returning 0x114c18 for object (null), if_id { 2.0 {367abb81-9844-35f1-ad32-98f038001003} }
- 1810.377:0027:trace:rpc:NdrServerInitializeNew (pRpcMsg == ^0x11ee58, pStubMsg == ^0x84e714, pStubDesc == ^0x7eddfe40)
- 1810.377:0027:trace:ole:NdrServerContextNewUnmarshall (0x84e714, 0x7eddba30)
- 1810.377:0027:trace:ole:NDRSContextUnmarshall2 (0x1199c8 0x11ef88 00000010 (nil) 0)
- 1810.377:0027:trace:rpc:UuidIsNil ({92012f8d-c0c0-4122-9d47-70a5ee8c3e08})
- 1810.377:0027:trace:rpc:UuidCompare ({92012f8d-c0c0-4122-9d47-70a5ee8c3e08},{00000000-0000-0000-0000-000000000000})
- 1810.377:0027:trace:rpc:RpcServerAssoc_FindContextHandle found 0x11a0e0
- 1810.377:002a:trace:heap:RtlAllocateHeap (0x110000,7000006a,0000002c): returning 0x11f010
- 1810.377:002a:trace:rpc:RPCRT4_ReceiveWithAuth (0x119728, 0x54e9b0, 0x11f010, 0x54e9b4)
- 1810.377:002a:trace:rpc:RPCRT4_default_receive_fragment (0x119728, 0x54e9b0, 0x54e958)
- 1810.377:002a:trace:file:ReadFile 0x34 0x54e8cc 16 0x54e888 (nil)
- 1810.377:002a:trace:ntdll:NtReadFile (0x34,(nil),(nil),(nil),0x54e814,0x54e8cc,0x00000010,(nil),(nil)),partial stub!
- 1810.377:0027:trace:heap:RtlAllocateHeap (0x110000,70000062,00000008): returning 0x11f050
- 1810.377:0027:trace:ole:NdrSimpleStructUnmarshall (0x84e714,0x84e7f8,0x7eddba34,0)
- 1810.377:0027:trace:ole:NdrSimpleStructUnmarshall copying 0x11ef9c to 0x11ef9c
- 1810.377:0027:trace:service:svcctl_SetServiceStatus (0x11a198, 0x11ef9c)
- 1810.377:0027:trace:heap:RtlAllocateHeap (0x110000,70000062,00000018): returning 0x11f068
- 0027: event_op( handle=003c, op=1 )
- 0027: event_op() = INVALID_HANDLE
- 1810.377:0027:trace:rpc:I_RpcGetBuffer (0x11ee58): BufferLength=8
- 1810.378:0027:trace:heap:RtlAllocateHeap (0x110000,70000062,00000008): returning 0x11f090
- 1810.378:0027:trace:rpc:I_RpcGetBuffer Buffer=0x11f090
- 1810.378:0027:trace:heap:RtlFreeHeap (0x110000,70000062,0x11f050): returning TRUE
- 1810.378:0027:trace:heap:RtlAllocateHeap (0x110000,7000006a,00000018): returning 0x11f0a8
- 1810.378:0027:trace:heap:RtlAllocateHeap (0x110000,7000006a,0000001c): returning 0x11f0d0
- 1810.378:0027:trace:file:WriteFile 0x34 0x11f0d0 28 0x84e778 (nil)
- 1810.378:0027:trace:ntdll:NtWriteFile (0x34,(nil),(nil),(nil),0x84e704,0x11f0d0,0x0000001c,(nil),(nil))!
- 1810.378:0027:trace:ntdll:NtWriteFile = SUCCESS (28)
- 1810.378:002e:trace:ntdll:NtReadFile = SUCCESS (16)
- 1810.378:0027:trace:heap:RtlFreeHeap (0x110000,70000062,0x11f0d0): returning TRUE
- 1810.378:0027:trace:heap:RtlFreeHeap (0x110000,70000062,0x11f0a8): returning TRUE
- 1810.378:0027:trace:rpc:process_request_packet freeing Buffer=0x11ef88
- 1810.378:002e:trace:heap:RtlAllocateHeap (0x110000,70000062,00000018): returning 0x12ae20
- 1810.378:002e:trace:file:ReadFile 0x10 0x12ae30 8 0x54e428 (nil)
- 1810.378:002e:trace:ntdll:NtReadFile (0x10,(nil),(nil),(nil),0x54e3b4,0x12ae30,0x00000008,(nil),(nil)),partial stub!
- 1810.378:002e:trace:ntdll:NtReadFile = SUCCESS (8)
- 1810.378:0027:trace:heap:RtlFreeHeap (0x110000,70000062,0x11ef88): returning TRUE
- 1810.378:002e:trace:heap:RtlAllocateHeap (0x110000,70000062,00000004): returning 0x12ae48
- 1810.378:002e:trace:file:ReadFile 0x10 0x12ae48 4 0x54e428 (nil)
- 1810.378:0027:trace:heap:RtlFreeHeap (0x110000,70000062,0x11f090): returning TRUE
- 1810.378:002e:trace:ntdll:NtReadFile (0x10,(nil),(nil),(nil),0x54e3b4,0x12ae48,0x00000004,(nil),(nil)),partial stub!
- 1810.378:002e:trace:ntdll:NtReadFile = SUCCESS (4)
- 1810.378:002e:trace:rpc:RPCRT4_ReceiveWithAuth buffer length = 4
- 1810.378:0027:trace:heap:RtlFreeHeap (0x110000,70000062,0x11ef20): returning TRUE
- 1810.378:002e:trace:heap:RtlAllocateHeap (0x110000,70000062,00000004): returning 0x12ae60
- 1810.378:0027:trace:heap:RtlFreeHeap (0x110000,70000062,0x11ee58): returning TRUE
- 1810.378:0027:trace:heap:RtlFreeHeap (0x110000,70000062,0x11efc8): returning TRUE
- 1810.378:002e:trace:heap:RtlFreeHeap (0x110000,70000062,0x12ae48): returning TRUE
- 0027: select( flags=2, cookie=0084e708, timeout=+30.0000000, prev_apc=0000, result={}, data={WAIT,handles={0048}} )
- 0027: select() = PENDING { timeout=1d0a66fad502bf8 (+30.0000000), call={APC_NONE}, apc_handle=0000 }
- 1810.378:002e:trace:heap:RtlFreeHeap (0x110000,70000062,0x12ae20): returning TRUE
- 1810.378:002e:trace:heap:RtlFreeHeap (0x110000,70000062,0x12ad58): returning TRUE
- 1810.378:002e:trace:rpc:NdrFreeBuffer (pStubMsg == ^0x54e72c)
- 1810.378:002e:trace:rpc:I_RpcFreeBuffer (0x54e64c) Buffer=0x12ae60
- 1810.378:002e:trace:rpc:RPCRT4_CloseBinding (Binding == ^0x114108)
- 1810.379:002e:trace:heap:RtlFreeHeap (0x110000,70000062,0x12ae60): returning TRUE
- 002e: event_op( handle=0028, op=1 )
- 002e: event_op() = 0
- 1810.379:002e:trace:service:CloseServiceHandle 0x1140d0
- 1810.379:002e:trace:rpc:NdrClientInitializeNew (pRpcMessage == ^0x54e54c, pStubMsg == ^0x54e62c, pStubDesc == ^0x7ede7e00, ProcNum == 0)
- 1810.379:002e:trace:ole:NDRCContextBinding 0x1140d0
- 1810.379:002e:trace:rpc:NdrGetBuffer (stubmsg == ^0x54e62c, buflen == 24, handle == 0x114108)
- 1810.379:002e:trace:rpc:I_RpcGetBuffer (0x54e54c): BufferLength=24
- 1810.379:002e:trace:heap:RtlAllocateHeap (0x110000,70000062,00000018): returning 0x12ae78
- 1810.379:002e:trace:rpc:I_RpcGetBuffer Buffer=0x12ae78
- 1810.379:002e:trace:rpc:I_RpcNegotiateTransferSyntax (0x54e54c)
- 1810.379:002e:trace:rpc:RPCRT4_OpenBinding (Binding == ^0x114108)
- 1810.379:002e:trace:rpc:RpcAssoc_GetIdleConnection got connection from pool 0x1136f8
- 1810.379:002e:trace:ole:NdrClientContextMarshall (0x54e62c, 0x1140d0, 1)
- 1810.379:002e:trace:ole:NDRCContextMarshall 0x1140d0 0x12ae78
- 1810.379:002e:trace:rpc:NdrSendReceive (stubmsg == ^0x54e62c, buffer == ^0x12ae8c)
- 1810.379:002e:trace:rpc:I_RpcSendReceive (0x54e54c)
- 1810.379:002e:trace:rpc:I_RpcSend (0x54e54c)
- 1810.379:002e:trace:rpc:UuidIsNil ({00000000-0000-0000-0000-000000000000})
- 1810.379:002e:trace:rpc:UuidCompare ({00000000-0000-0000-0000-000000000000},{00000000-0000-0000-0000-000000000000})
- 1810.379:002e:trace:heap:RtlAllocateHeap (0x110000,7000006a,00000018): returning 0x12aea0
- 1810.379:002e:trace:heap:RtlAllocateHeap (0x110000,7000006a,0000002c): returning 0x12aec8
- 1810.379:002e:trace:file:WriteFile 0x10 0x12aec8 44 0x54e378 (nil)
- 1810.379:002e:trace:ntdll:NtWriteFile (0x10,(nil),(nil),(nil),0x54e304,0x12aec8,0x0000002c,(nil),(nil))!
- 1810.379:002e:trace:ntdll:NtWriteFile = SUCCESS (44)
- 1810.379:002a:trace:ntdll:NtReadFile = SUCCESS (16)
- 1810.379:002a:trace:heap:RtlAllocateHeap (0x110000,70000062,00000018): returning 0x11f100
- 1810.379:002a:trace:file:ReadFile 0x34 0x11f110 8 0x54e888 (nil)
- 1810.379:002e:trace:heap:RtlFreeHeap (0x110000,70000062,0x12aec8): returning TRUE
- 1810.379:002a:trace:ntdll:NtReadFile (0x34,(nil),(nil),(nil),0x54e814,0x11f110,0x00000008,(nil),(nil)),partial stub!
- 1810.379:002a:trace:ntdll:NtReadFile = SUCCESS (8)
- 1810.379:002a:trace:heap:RtlAllocateHeap (0x110000,70000062,00000014): returning 0x11f128
- 1810.379:002a:trace:file:ReadFile 0x34 0x11f128 20 0x54e888 (nil)
- 1810.379:002e:trace:heap:RtlFreeHeap (0x110000,70000062,0x12aea0): returning TRUE
- 1810.379:002a:trace:ntdll:NtReadFile (0x34,(nil),(nil),(nil),0x54e814,0x11f128,0x00000014,(nil),(nil)),partial stub!
- 1810.379:002e:trace:rpc:I_RpcReceive (0x54e54c)
- 1810.379:002a:trace:ntdll:NtReadFile = SUCCESS (20)
- 1810.379:002e:trace:rpc:RPCRT4_ReceiveWithAuth (0x1136f8, 0x54e468, 0x54e54c, (nil))
- 1810.379:002a:trace:rpc:RPCRT4_ReceiveWithAuth buffer length = 20
- 1810.379:002e:trace:rpc:RPCRT4_default_receive_fragment (0x1136f8, 0x54e468, 0x54e408)
- 1810.379:002e:trace:file:ReadFile 0x10 0x54e37c 16 0x54e338 (nil)
- 1810.379:002e:trace:ntdll:NtReadFile (0x10,(nil),(nil),(nil),0x54e2c4,0x54e37c,0x00000010,(nil),(nil)),partial stub!
- 1810.379:002a:trace:heap:RtlAllocateHeap (0x110000,70000062,00000014): returning 0x11f150
- 1810.379:002a:trace:heap:RtlFreeHeap (0x110000,70000062,0x11f128): returning TRUE
- 1810.379:002a:trace:rpc:RPCRT4_io_thread got request packet
- 1810.379:002a:trace:heap:RtlAllocateHeap (0x110000,70000062,00000014): returning 0x11f178
- 1810.379:002a:trace:thread:QueueUserWorkItem (0x7ed853f0,0x11f178,0x00000010)
- 1810.379:002a:trace:heap:RtlAllocateHeap (0x110000,70000062,00000010): returning 0x11f1a0
- 002a: release_semaphore( handle=0048, count=00000001 )
- 002c: *wakeup* signaled=0
- 002a: release_semaphore() = 0 { prev_count=00000000 }
- 1810.380:002c:trace:heap:RtlFreeHeap (0x110000,70000062,0x11f1a0): returning TRUE
- 1810.380:002c:trace:threadpool:worker_thread_proc executing 0x7ed853f0(0x11f178)
- 1810.380:002c:trace:rpc:RPCRT4_process_packet got request packet
- 1810.380:002c:trace:rpc:UuidIsNil ({367abb81-9844-35f1-ad32-98f038001003})
- 1810.380:002c:trace:rpc:UuidCompare ({367abb81-9844-35f1-ad32-98f038001003},{00000000-0000-0000-0000-000000000000})
- 1810.380:002c:trace:rpc:UuidEqual ({00000000-0000-0000-0000-000000000000},{00000000-0000-0000-0000-000000000000})
- 1810.380:002c:trace:rpc:UuidCompare ({00000000-0000-0000-0000-000000000000},{00000000-0000-0000-0000-000000000000})
- 1810.380:002c:trace:rpc:RPCRT4_find_interface returning 0x114c18 for object (null), if_id { 2.0 {367abb81-9844-35f1-ad32-98f038001003} }
- 1810.380:002c:trace:rpc:NdrServerInitializeNew (pRpcMsg == ^0x11f010, pStubMsg == ^0xa5e718, pStubDesc == ^0x7eddfe40)
- 1810.380:002a:trace:heap:RtlAllocateHeap (0x110000,7000006a,0000002c): returning 0x11f1c0
- 1810.380:002c:trace:ole:NdrServerContextNewUnmarshall (0xa5e718, 0x7eddba04)
- 1810.380:002a:trace:rpc:RPCRT4_ReceiveWithAuth (0x119728, 0x54e9b0, 0x11f1c0, 0x54e9b4)
- 1810.380:002c:trace:ole:NDRSContextUnmarshall2 (0x1199c8 0x11f150 00000010 (nil) 0)
- 1810.380:002a:trace:rpc:RPCRT4_default_receive_fragment (0x119728, 0x54e9b0, 0x54e958)
- 1810.380:002c:trace:rpc:UuidIsNil ({92012f8d-c0c0-4122-9d47-70a5ee8c3e08})
- 1810.380:002a:trace:file:ReadFile 0x34 0x54e8cc 16 0x54e888 (nil)
- 1810.380:002a:trace:ntdll:NtReadFile (0x34,(nil),(nil),(nil),0x54e814,0x54e8cc,0x00000010,(nil),(nil)),partial stub!
- 1810.380:002c:trace:rpc:UuidCompare ({92012f8d-c0c0-4122-9d47-70a5ee8c3e08},{00000000-0000-0000-0000-000000000000})
- 1810.380:002c:trace:rpc:RpcServerAssoc_FindContextHandle found 0x11a0e0
- 1810.380:002c:trace:heap:RtlAllocateHeap (0x110000,70000062,00000008): returning 0x11f200
- 1810.380:002c:trace:service:svcctl_CloseServiceHandle (&0x11a198)
- 1810.380:002c:trace:heap:RtlFreeHeap (0x110000,70000062,0x11a198): returning TRUE
- 1810.380:002c:trace:rpc:I_RpcGetBuffer (0x11f010): BufferLength=32
- 1810.380:002c:trace:heap:RtlAllocateHeap (0x110000,70000062,00000020): returning 0x11f218
- 1810.380:002c:trace:rpc:I_RpcGetBuffer Buffer=0x11f218
- 1810.380:002c:trace:ole:NdrServerContextNewMarshall (0xa5e718, 0x11a0e0, 0x7edd0770, 0x7eddba04)
- 1810.380:002c:trace:ole:NDRSContextMarshall2 (0x1199c8 0x11a0e0 0x11f218 0x7edd0770 (nil) 0)
- 1810.380:002c:trace:heap:RtlFreeHeap (0x110000,70000062,0x11f200): returning TRUE
- 1810.380:002c:trace:rpc:RpcContextHandle_Destroy freeing 0x11a0e0
- 002c: close_handle( handle=0088 )
- 002c: close_handle() = 0
- 002c: close_handle( handle=008c )
- 002c: close_handle() = 0
- 1810.380:002c:trace:heap:RtlFreeHeap (0x110000,70000062,0x11a150): returning TRUE
- 1810.380:002c:trace:heap:RtlFreeHeap (0x110000,70000062,0x11a0e0): returning TRUE
- 1810.380:002c:trace:heap:RtlAllocateHeap (0x110000,7000006a,00000018): returning 0x11f248
- 1810.380:002c:trace:heap:RtlAllocateHeap (0x110000,7000006a,00000030): returning 0x11f270
- 1810.380:002c:trace:file:WriteFile 0x34 0x11f270 48 0xa5e778 (nil)
- 1810.380:002c:trace:ntdll:NtWriteFile (0x34,(nil),(nil),(nil),0xa5e704,0x11f270,0x00000030,(nil),(nil))!
- 1810.380:002c:trace:ntdll:NtWriteFile = SUCCESS (48)
- 1810.380:002e:trace:ntdll:NtReadFile = SUCCESS (16)
- 1810.381:002c:trace:heap:RtlFreeHeap (0x110000,70000062,0x11f270): returning TRUE
- 1810.381:002e:trace:heap:RtlAllocateHeap (0x110000,70000062,00000018): returning 0x12af08
- 1810.381:002e:trace:file:ReadFile 0x10 0x12af18 8 0x54e338 (nil)
- 1810.381:002e:trace:ntdll:NtReadFile (0x10,(nil),(nil),(nil),0x54e2c4,0x12af18,0x00000008,(nil),(nil)),partial stub!
- 1810.381:002c:trace:heap:RtlFreeHeap (0x110000,70000062,0x11f248): returning TRUE
- 1810.381:002e:trace:ntdll:NtReadFile = SUCCESS (8)
- 1810.381:002c:trace:rpc:process_request_packet freeing Buffer=0x11f150
- 1810.381:002c:trace:heap:RtlFreeHeap (0x110000,70000062,0x11f150): returning TRUE
- 1810.381:002e:trace:heap:RtlAllocateHeap (0x110000,70000062,00000018): returning 0x12af30
- 1810.381:002e:trace:file:ReadFile 0x10 0x12af30 24 0x54e338 (nil)
- 1810.381:002e:trace:ntdll:NtReadFile (0x10,(nil),(nil),(nil),0x54e2c4,0x12af30,0x00000018,(nil),(nil)),partial stub!
- 1810.381:002e:trace:ntdll:NtReadFile = SUCCESS (24)
- 1810.381:002e:trace:rpc:RPCRT4_ReceiveWithAuth buffer length = 24
- 1810.381:002c:trace:heap:RtlFreeHeap (0x110000,70000062,0x11f218): returning TRUE
- 1810.381:002c:trace:heap:RtlFreeHeap (0x110000,70000062,0x11f100): returning TRUE
- 1810.381:002e:trace:heap:RtlAllocateHeap (0x110000,70000062,00000018): returning 0x12af58
- 1810.381:002c:trace:heap:RtlFreeHeap (0x110000,70000062,0x11f010): returning TRUE
- 1810.381:002e:trace:heap:RtlFreeHeap (0x110000,70000062,0x12af30): returning TRUE
- 1810.381:002c:trace:heap:RtlFreeHeap (0x110000,70000062,0x11f178): returning TRUE
- 002c: select( flags=2, cookie=00a5e708, timeout=+30.0000000, prev_apc=0000, result={}, data={WAIT,handles={0048}} )
- 1810.381:002e:trace:heap:RtlFreeHeap (0x110000,70000062,0x12af08): returning TRUE
- 002c: select() = PENDING { timeout=1d0a66fad5097c8 (+30.0000000), call={APC_NONE}, apc_handle=0000 }
- 1810.381:002e:trace:heap:RtlFreeHeap (0x110000,70000062,0x12ae78): returning TRUE
- 1810.381:002e:trace:ole:NdrClientContextUnmarshall (0x54e62c, 0x54e75c, 0x114108)
- 1810.381:002e:trace:ole:NDRCContextUnmarshall *0x54e75c=(0x1140d0) 0x114108 0x12af58 00000010
- 1810.381:002e:trace:rpc:RpcBindingFree (0x1140dc) = 0x114108
- 1810.381:002e:trace:heap:RtlFreeHeap (0x110000,70000062,0x1140d0): returning TRUE
- 1810.381:002e:trace:rpc:NdrFreeBuffer (pStubMsg == ^0x54e62c)
- 1810.381:002e:trace:rpc:I_RpcFreeBuffer (0x54e54c) Buffer=0x12af58
- 1810.381:002e:trace:rpc:RPCRT4_CloseBinding (Binding == ^0x114108)
- 1810.381:002e:trace:rpc:RPCRT4_ReleaseBinding binding: 0x114108
- 1810.381:002e:trace:heap:RtlFreeHeap (0x110000,70000062,0x114198): returning TRUE
- 1810.381:002e:trace:heap:RtlFreeHeap (0x110000,70000062,0x114180): returning TRUE
- 1810.381:002e:trace:heap:RtlFreeHeap (0x110000,70000062,0x114160): returning TRUE
- 1810.382:002e:trace:heap:RtlFreeHeap (0x110000,70000062,0x114108): returning TRUE
- 1810.382:002e:trace:heap:RtlFreeHeap (0x110000,70000062,0x12af58): returning TRUE
- 1810.382:002e:trace:winedevice:ServiceMain service L"MountMgr" stopped
- 1810.382:002e:trace:heap:RtlFreeHeap (0x110000,70000062,0x114418): returning TRUE
- 1810.382:002e:trace:module:LdrShutdownThread ()
- 1810.382:002e:trace:module:MODULE_InitDLL (0x7e7c0000 L"user32.dll",THREAD_DETACH,(nil)) - CALL
- 002e: close_handle( handle=0000 )
- 002e: close_handle() = INVALID_HANDLE
- 1810.382:002e:trace:module:MODULE_InitDLL (0x7e7c0000,THREAD_DETACH,(nil)) - RETURN 1
- 1810.382:002e:trace:module:MODULE_InitDLL (0x7ecd0000 L"rpcrt4.dll",THREAD_DETACH,(nil)) - CALL
- 1810.382:002e:trace:heap:RtlFreeHeap (0x110000,70000062,0x1144e0): returning TRUE
- 1810.382:002e:trace:heap:RtlFreeHeap (0x110000,70000062,0x1144a0): returning TRUE
- 1810.382:002e:trace:module:MODULE_InitDLL (0x7ecd0000,THREAD_DETACH,(nil)) - RETURN 1
- 002e: *killed* exit_code=0
- 0029: *wakeup* signaled=0
- 0029: terminate_process( handle=0000, exit_code=0 )
- 002d: *killed* exit_code=0
- 002d: *sent signal* signal=3
- 002f: *killed* exit_code=0
- 002f: *sent signal* signal=3
- 0029: terminate_process() = 0 { self=1 }
- 1810.382:0029:trace:module:LdrShutdownProcess ()
- 1810.382:0029:trace:module:MODULE_InitDLL (0x7e7c0000 L"user32.dll",PROCESS_DETACH,0x1) - CALL
- 1810.383:0029:trace:heap:RtlFreeHeap (0x110000,70000062,0x1220d0): returning TRUE
- 1810.383:0029:trace:module:MODULE_InitDLL (0x7e7c0000,PROCESS_DETACH,0x1) - RETURN 1
- 1810.383:0029:trace:module:MODULE_InitDLL (0x7ec90000 L"version.dll",PROCESS_DETACH,0x1) - CALL
- 1810.383:0029:trace:module:MODULE_InitDLL (0x7ec90000,PROCESS_DETACH,0x1) - RETURN 1
- 1810.383:0029:trace:module:MODULE_InitDLL (0x7e6a0000 L"gdi32.dll",PROCESS_DETACH,0x1) - CALL
- 1810.383:0029:trace:module:MODULE_InitDLL (0x7e6a0000,PROCESS_DETACH,0x1) - RETURN 1
- 1810.383:0029:trace:module:MODULE_InitDLL (0x7ecd0000 L"rpcrt4.dll",PROCESS_DETACH,0x1) - CALL
- 1810.383:0029:trace:module:MODULE_InitDLL (0x7ecd0000,PROCESS_DETACH,0x1) - RETURN 1
- 1810.383:0029:trace:module:MODULE_InitDLL (0x7ed40000 L"ntoskrnl.exe",PROCESS_DETACH,0x1) - CALL
- 1810.383:0029:trace:module:MODULE_InitDLL (0x7ed40000,PROCESS_DETACH,0x1) - RETURN 1
- 1810.383:0029:trace:module:MODULE_InitDLL (0x7ed90000 L"advapi32.dll",PROCESS_DETACH,0x1) - CALL
- 1810.383:0029:trace:module:MODULE_InitDLL (0x7ed90000,PROCESS_DETACH,0x1) - RETURN 1
- 1810.383:0029:trace:module:MODULE_InitDLL (0x7b810000 L"KERNEL32.dll",PROCESS_DETACH,0x1) - CALL
- 1810.383:0029:trace:module:MODULE_InitDLL (0x7b810000,PROCESS_DETACH,0x1) - RETURN 1
- 1810.383:0029:trace:module:MODULE_InitDLL (0x7bc10000 L"ntdll.dll",PROCESS_DETACH,0x1) - CALL
- 1810.383:0029:trace:module:MODULE_InitDLL (0x7bc10000,PROCESS_DETACH,0x1) - RETURN 1
- 0029: terminate_process( handle=ffffffff, exit_code=0 )
- 0029: terminate_process() = 0 { self=1 }
- 1810.383:0029:trace:module:LdrUnloadDll (0x7ecd0000)
- 1810.383:0029:trace:module:LdrUnloadDll (0x7e7c0000)
- 0029: *killed* exit_code=0
- 1810.384:002a:trace:ntdll:NtReadFile = 0xc000014b
- 000d: *wakeup* signaled=0
- 1810.384:002a:warn:rpc:RPCRT4_default_receive_fragment Short read of header, -1 bytes
- 1810.384:002a:warn:rpc:RPCRT4_io_thread receive failed with error 6be
- 0028: *process killed*
- 000d: close_handle( handle=007c )
- 000d: close_handle() = 0
- 000d: close_handle( handle=001c )
- 000d: close_handle() = 0
- 1810.385:002a:trace:heap:RtlFreeHeap (0x110000,70000062,0x11f1c0): returning TRUE
- 1810.385:002a:trace:rpc:RPCRT4_ReleaseConnection destroying connection 0x119728
- 1810.385:002a:trace:rpc:RPCRT4_CloseConnection (Connection == ^0x119728)
- 002a: flush_file( handle=0034 )
- 002a: flush_file() = 0 { event=0000 }
- 1810.385:000d:trace:heap:RtlFreeHeap (0x110000,70000062,0x1149f0): returning TRUE
- 002a: close_handle( handle=0034 )
- 002a: close_handle() = 0
- 002a: close_handle( handle=0040 )
- 002a: close_handle() = 0
- 1810.385:000d:trace:heap:RtlFreeHeap (0x110000,70000062,0x1149b8): returning TRUE
- 1810.385:000d:trace:userenv:DestroyEnvironmentBlock 0x850000
- 1810.385:000d:trace:environ:RtlDestroyEnvironment (0x850000)!
- 1810.385:000d:trace:virtual:NtFreeVirtualMemory 0xffffffff 0x850000 00000000 8000
- 1810.385:002a:trace:heap:RtlFreeHeap (0x110000,70000062,0x1197c0): returning TRUE
- 1810.385:002a:trace:rpc:RPCRT4_ReleaseBinding binding: 0x1199c8
- 1810.385:002a:trace:rpc:RpcAssoc_Release destroying assoc 0x119a60
- 1810.385:002a:trace:rpc:RpcContextHandle_Destroy freeing 0x119db0
- 1810.385:002a:trace:rpc:RpcContextHandle_Destroy calling rundown routine 0x7edd0770 with user context 0x119e68
- 1810.385:002a:trace:heap:RtlFreeHeap (0x110000,70000062,0x119e68): returning TRUE
- 002a: close_handle( handle=0078 )
- 002a: close_handle() = 0
- 002a: close_handle( handle=0084 )
- 002a: close_handle() = 0
- 1810.385:002a:trace:heap:RtlFreeHeap (0x110000,70000062,0x119e20): returning TRUE
- 1810.385:002a:trace:heap:RtlFreeHeap (0x110000,70000062,0x119db0): returning TRUE
- 1810.385:002a:trace:rpc:RpcContextHandle_Destroy freeing 0x11a3a8
- 1810.385:002a:trace:rpc:RpcContextHandle_Destroy calling rundown routine 0x7edd0770 with user context 0x11a460
- 1810.385:002a:trace:heap:RtlFreeHeap (0x110000,70000062,0x11a460): returning TRUE
- 002a: close_handle( handle=0090 )
- 002a: close_handle() = 0
- 002a: close_handle( handle=0094 )
- 002a: close_handle() = 0
- 1810.385:002a:trace:heap:RtlFreeHeap (0x110000,70000062,0x11a418): returning TRUE
- 1810.386:002a:trace:heap:RtlFreeHeap (0x110000,70000062,0x11a3a8): returning TRUE
- 1810.386:002a:trace:heap:RtlFreeHeap (0x110000,70000062,0x119b18): returning TRUE
- 1810.386:002a:trace:heap:RtlFreeHeap (0x110000,70000062,0x119af8): returning TRUE
- 1810.386:002a:trace:heap:RtlFreeHeap (0x110000,70000062,0x119ac8): returning TRUE
- 1810.386:002a:trace:heap:RtlFreeHeap (0x110000,70000062,0x119a60): returning TRUE
- 1810.386:002a:trace:heap:RtlFreeHeap (0x110000,70000062,0x119a40): returning TRUE
- 1810.386:002a:trace:heap:RtlFreeHeap (0x110000,70000062,0x119a20): returning TRUE
- 1810.386:002a:trace:heap:RtlFreeHeap (0x110000,70000062,0x1199c8): returning TRUE
- 1810.386:002a:trace:heap:RtlFreeHeap (0x110000,70000062,0x119728): returning TRUE
- 1810.386:002a:trace:module:LdrShutdownThread ()
- 1810.386:002a:trace:module:MODULE_InitDLL (0x7ed50000 L"rpcrt4.dll",THREAD_DETACH,(nil)) - CALL
- 1810.386:002a:trace:heap:RtlFreeHeap (0x110000,70000062,0x1198c0): returning TRUE
- 1810.386:002a:trace:heap:RtlFreeHeap (0x110000,70000062,0x119880): returning TRUE
- 1810.386:002a:trace:module:MODULE_InitDLL (0x7ed50000,THREAD_DETACH,(nil)) - RETURN 1
- 1810.386:002a:trace:virtual:NtFreeVirtualMemory 0xffffffff 0x550000 00000000 8000
- 1810.386:000d:trace:heap:RtlFreeHeap (0xffbf0000,70000061,0xffbf1588): returning TRUE
- 1810.386:000d:trace:service:main services.exe exited with code 0
- 000d: terminate_process( handle=0000, exit_code=0 )
- 000e: *killed* exit_code=0
- 0027: *killed* exit_code=0
- 002a: *killed* exit_code=0
- 002a: *sent signal* signal=3
- 002b: *killed* exit_code=0
- 002c: *killed* exit_code=0
- 000d: terminate_process() = 0 { self=1 }
- 1810.387:000d:trace:module:LdrShutdownProcess ()
- 1810.387:000d:trace:module:MODULE_InitDLL (0x7eff0000 L"userenv.dll",PROCESS_DETACH,0x1) - CALL
- 1810.387:000d:trace:userenv:DllMain 0x7eff0000 0 0x1
- 1810.387:000d:trace:module:MODULE_InitDLL (0x7eff0000,PROCESS_DETACH,0x1) - RETURN 1
- 1810.387:000d:trace:module:MODULE_InitDLL (0x7ed50000 L"rpcrt4.dll",PROCESS_DETACH,0x1) - CALL
- 1810.387:000d:trace:module:MODULE_InitDLL (0x7ed50000,PROCESS_DETACH,0x1) - RETURN 1
- 1810.387:000d:trace:module:MODULE_InitDLL (0x7ece0000 L"advapi32.dll",PROCESS_DETACH,0x1) - CALL
- 1810.387:000d:trace:module:MODULE_InitDLL (0x7ece0000,PROCESS_DETACH,0x1) - RETURN 1
- 1810.387:000d:trace:module:MODULE_InitDLL (0x7b810000 L"KERNEL32.dll",PROCESS_DETACH,0x1) - CALL
- 1810.387:000d:trace:module:MODULE_InitDLL (0x7b810000,PROCESS_DETACH,0x1) - RETURN 1
- 1810.387:000d:trace:module:MODULE_InitDLL (0x7bc10000 L"ntdll.dll",PROCESS_DETACH,0x1) - CALL
- 1810.387:000d:trace:module:MODULE_InitDLL (0x7bc10000,PROCESS_DETACH,0x1) - RETURN 1
- 000d: terminate_process( handle=ffffffff, exit_code=0 )
- 000d: terminate_process() = 0 { self=1 }
- 000d: *killed* exit_code=0
- 000c: *process killed*
- wineserver: exiting (pid=12566)
- ^C
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement