Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Instant Online Crash Analysis, brought to you by OSR Open Systems Resources, Inc.
- Primary Analysis
- Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
- Online Crash Dump Analysis Service
- See http://www.osronline.com for more information
- Windows 7 Version 7600 MP (4 procs) Free x64
- Product: WinNt, suite: SingleUserTS Personal
- kernel32.dll version: 6.1.7600.16385 (win7_rtm.090713-1255)
- Machine Name:
- Debug session time: Sun Feb 6 01:27:39.000 2011 (UTC - 5:00)
- System Uptime: not available
- Process Uptime: 0 days 12:28:36.000
- Kernel time: 0 days 1:15:01.000
- User time: 0 days 0:43:23.000
- Unable to load image C:\Windows\System32\ntdll.dll, Win32 error 0n2
- *** WARNING: Unable to verify timestamp for ntdll.dll
- *******************************************************************************
- * *
- * Exception Analysis *
- * *
- *******************************************************************************
- GetPageUrlData failed, server returned HTTP status 404
- URL requested: http://watson.microsoft.com/StageOne/WmiPrvSE_exe/6_1_7600_16385/4a5bc794/unknown/0_0_0_0/bbbbbbb4/80000007/00000000.htm?Retriage=1
- FAULTING_IP:
- +1562faf0006ed48
- 00000000`00000000 ?? ???
- EXCEPTION_RECORD: ffffffffffffffff -- (.exr 0xffffffffffffffff)
- ExceptionAddress: 0000000000000000
- ExceptionCode: 80000007 (Wake debugger)
- ExceptionFlags: 00000001
- NumberParameters: 0
- BUGCHECK_STR: 80000007
- PROCESS_NAME: WmiPrvSE.exe
- ERROR_CODE: (NTSTATUS) 0x80000007 - {Kernel Debugger Awakened} the system debugger was awakened by an interrupt.
- EXCEPTION_CODE: (HRESULT) 0x80000007 (2147483655) - Operation aborted
- MOD_LIST:
- NTGLOBALFLAG: 0
- APPLICATION_VERIFIER_FLAGS: 0
- DERIVED_WAIT_CHAIN:
- Dl Eid Cid WaitType
- -- --- ------- --------------------------
- 5 10f0.2678 Speculated (Triage) -->
- 9 10f0.2e64 File IO
- WAIT_CHAIN_COMMAND: ~5s;k;;~9s;k;;
- BLOCKING_THREAD: 0000000000002e64
- DEFAULT_BUCKET_ID: APPLICATION_HANG_BlockedOn_FileIO
- PRIMARY_PROBLEM_CLASS: APPLICATION_HANG_BlockedOn_FileIO
- LAST_CONTROL_TRANSFER: from 000007fefd014d76 to 00000000770102aa
- FAULTING_THREAD: 0000000000000009
- STACK_TEXT:
- 00000000`0283c318 000007fe`fd014d76 : 00000000`00000000 00000000`80000000 ffffffff`ffffffff 00000000`7700cbb3 : ntdll!ZwCreateFile+0xa
- 00000000`0283c320 00000000`76db2aad : 000007fe`e9541880 00000000`80000000 00000000`00000003 000007fe`feca9ff1 : KERNELBASE!CreateFileW+0x2cd
- 00000000`0283c480 000007fe`e93d5ec4 : ffffffff`ffffffff 00000000`0283da30 00000000`0283da68 00000000`00000000 : kernel32!CreateFileWImplementation+0x7d
- 00000000`0283c4e0 000007fe`e93d6863 : 00000000`00000023 00000000`0024b120 00000000`0283dc30 00000000`0024f2c0 : cimwin32!CWin32NetworkAdapter::fGetMacAddressAndType+0x164
- 00000000`0283d9f0 000007fe`e93d630e : 00000000`0024f2c0 00000000`00000000 00000000`00000021 00000000`0024f2c0 : cimwin32!CWin32NetworkAdapter::GetNetCardInfoForNT5+0x4c7
- 00000000`0283db60 000007fe`e93d591b : 00000000`001db450 00000000`00000000 00000000`0283dc30 000007fe`e94c6e80 : cimwin32!CWin32NetworkAdapter::EnumNetAdaptersInNT5+0x11a
- 00000000`0283dbf0 000007fe`f19f6af0 : 000007fe`e94c6e80 000007fe`e9541880 00000000`001db450 000007fe`e94c6e80 : cimwin32!CWin32NetworkAdapter::EnumerateInstances+0xdf
- 00000000`0283dc70 000007fe`f19fac60 : 00000000`80041024 00000000`001db450 00000000`02220026 00000000`0283de70 : framedynos!Provider::CreateInstanceEnum+0x34
- 00000000`0283dca0 000007fe`f19f5692 : 00000000`00000000 00000000`0035cda0 000007fe`e9541880 00000000`001d8a2c : framedynos!Provider::ExecuteQuery+0x9f
- 00000000`0283dce0 00000000`ffcc2845 : 00000000`0035cdb0 00000000`01d1be90 00000000`00000000 00000000`01cc4f70 : framedynos!CWbemProviderGlue::ExecQueryAsync+0x392
- 00000000`0283e320 00000000`ffcc25d5 : 00000000`00000000 00000000`00000000 00000000`01cc4f70 00000000`00000000 : WmiPrvSE!CInterceptor_IWbemSyncProvider::Helper_ExecQueryAsync+0x544
- 00000000`0283e3d0 000007fe`fec9c7f5 : 00000000`00000000 00000000`00000006 00000000`00394008 00000000`00000000 : WmiPrvSE!CInterceptor_IWbemSyncProvider::ExecQueryAsync+0x192
- 00000000`0283e480 000007fe`fec9b0b2 : 00000000`0283e8c0 000007fe`f47cb222 00000000`00000040 000007fe`f47cbde0 : rpcrt4!Invoke+0x65
- 00000000`0283e4f0 000007fe`fd89e175 : 00000000`003636e0 00000000`0283ee90 00000000`003636e0 00000000`00336da0 : rpcrt4!NdrStubCall2+0x32a
- 00000000`0283eb10 000007fe`f4cfd36d : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : ole32!CStdStubBuffer_Invoke+0x8b
- 00000000`0283eb40 000007fe`fd89fc0d : 00000000`00000002 00000000`00000000 00000000`00000000 00000000`00000000 : fastprox!CBaseStublet::Invoke+0x19
- 00000000`0283eb70 000007fe`fd89fb83 : 00000000`01cb9150 00000000`0034a4b4 00000000`00341fa0 00000000`ffd02888 : ole32!SyncStubInvoke+0x5d
- 00000000`0283ebe0 000007fe`fd73fd60 : 00000000`01cb9150 00000000`003a4b80 00000000`01cb9150 00000000`00000000 : ole32!StubInvoke+0xdb
- 00000000`0283ec90 000007fe`fd89fa22 : 00000000`00000000 00000000`00000010 00000000`0082d938 00000000`003369b0 : ole32!CCtxComChnl::ContextInvoke+0x190
- 00000000`0283ee20 000007fe`fd89f76b : 00000000`d0908070 00000000`003a4b80 00000000`003475b0 00000000`003636e0 : ole32!AppInvoke+0xc2
- 00000000`0283ee90 000007fe`fd89ed6d : 00000000`003a4b80 00000000`003a4b80 00000000`003369b0 00000000`00070005 : ole32!ComInvokeWithLockAndIPID+0x52b
- 00000000`0283f020 000007fe`fec99c24 : 00000000`0283f128 00000000`00000000 00000000`0037aaf0 000007fe`fd733722 : ole32!ThreadInvoke+0x30d
- 00000000`0283f0c0 000007fe`fec99d86 : 00000000`746b972e 00000000`00000570 00000000`0283f330 000007fe`fd7334c4 : rpcrt4!DispatchToStubInCNoAvrf+0x14
- 00000000`0283f0f0 000007fe`fec9c44b : 00000000`0034a490 00000000`00000000 00000000`0283f414 00000000`0034a490 : rpcrt4!RPC_INTERFACE::DispatchToStubWorker+0x146
- 00000000`0283f210 000007fe`fec9c38b : 00000000`00000000 00000000`0283f330 00000000`0283f330 00000000`0037aaf0 : rpcrt4!RPC_INTERFACE::DispatchToStub+0x9b
- 00000000`0283f250 000007fe`fec9c322 : 00000000`0037a9a0 00000000`00347740 00000000`0034a490 000007fe`fec9ac00 : rpcrt4!RPC_INTERFACE::DispatchToStubWithObject+0x5b
- 00000000`0283f2d0 000007fe`fec9a11d : 00000000`00000001 00000000`00000000 000007fe`fec70000 00000000`0034a490 : rpcrt4!LRPC_SCALL::DispatchRequest+0x422
- 00000000`0283f3b0 000007fe`feca7ddf : 00000000`00010000 00000000`00000000 00000000`00000000 00000000`00000003 : rpcrt4!LRPC_SCALL::HandleRequest+0x20d
- 00000000`0283f4e0 000007fe`feca7995 : 00000200`00000000 00000000`00000000 00000000`0032e3b0 00000000`00000000 : rpcrt4!LRPC_ADDRESS::ProcessIO+0x3bf
- 00000000`0283f620 00000000`76fdb3ab : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : rpcrt4!LrpcIoComplete+0xa5
- 00000000`0283f6b0 00000000`76fd91af : 00000000`00000000 00000000`00000000 00000000`0000ffff 00000000`00000000 : ntdll!TppAlpcpExecuteCallback+0x26b
- 00000000`0283f740 00000000`76dbf56d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!TppWorkerThread+0x3f8
- 00000000`0283fa40 00000000`76ff3021 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : kernel32!BaseThreadInitThunk+0xd
- 00000000`0283fa70 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x1d
- FOLLOWUP_IP:
- cimwin32!CWin32NetworkAdapter::fGetMacAddressAndType+164
- 000007fe`e93d5ec4 4c8be0 mov r12,rax
- SYMBOL_STACK_INDEX: 3
- SYMBOL_NAME: cimwin32!CWin32NetworkAdapter::fGetMacAddressAndType+164
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: cimwin32
- IMAGE_NAME: cimwin32.dll
- DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bdeb5
- STACK_COMMAND: ~9s ; kb
- BUCKET_ID: X64_80000007_cimwin32!CWin32NetworkAdapter::fGetMacAddressAndType+164
- FAILURE_BUCKET_ID: APPLICATION_HANG_BlockedOn_FileIO_80000007_cimwin32.dll!CWin32NetworkAdapter::fGetMacAddressAndType
- WATSON_STAGEONE_URL: http://watson.microsoft.com/StageOne/WmiPrvSE_exe/6_1_7600_16385/4a5bc794/unknown/0_0_0_0/bbbbbbb4/80000007/00000000.htm?Retriage=1
- Followup: MachineOwner
- ---------
- This free analysis is provided by OSR Open Systems Resources, Inc.
- Want a deeper understanding of crash dump analysis? Check out our Windows Kernel Debugging and Crash Dump Analysis Seminar (opens in new tab/window)
- Loaded Module List
- start end module name
- 00000000`76da0000 00000000`76ebf000 kernel32 kernel32.dll
- 00000000`76ec0000 00000000`76fba000 user32 user32.dll
- 00000000`76fc0000 00000000`7716b000 ntdll ntdll.dll
- 00000000`ffcc0000 00000000`ffd1d000 WmiPrvSE WmiPrvSE.exe
- 000007fe`e8a40000 000007fe`e8a48000 winbrand winbrand.dll
- 000007fe`e9370000 000007fe`e956a000 cimwin32 cimwin32.dll
- 000007fe`efc60000 000007fe`efc6b000 perfos perfos.dll
- 000007fe`f19a0000 000007fe`f19ac000 linkinfo linkinfo.dll
- 000007fe`f19f0000 000007fe`f1a3c000 framedynos framedynos.dll
- 000007fe`f3520000 000007fe`f352f000 cscapi cscapi.dll
- 000007fe`f40a0000 000007fe`f40b6000 ncobjapi ncobjapi.dll
- 000007fe`f4790000 000007fe`f47b6000 wmiutils wmiutils.dll
- 000007fe`f47c0000 000007fe`f47d4000 wbemsvc wbemsvc.dll
- 000007fe`f4cc0000 000007fe`f4ce7000 ntdsapi ntdsapi.dll
- 000007fe`f4cf0000 000007fe`f4dd2000 fastprox fastprox.dll
- 000007fe`f4ee0000 000007fe`f4f66000 wbemcomn wbemcomn.dll
- 000007fe`f66c0000 000007fe`f66d1000 dhcpcsvc6 dhcpcsvc6.DLL
- 000007fe`f66e0000 000007fe`f66f8000 dhcpcsvc dhcpcsvc.dll
- 000007fe`f6800000 000007fe`f680b000 winnsi winnsi.dll
- 000007fe`f6810000 000007fe`f6837000 IPHLPAPI IPHLPAPI.DLL
- 000007fe`f6e80000 000007fe`f6ead000 ntmarta ntmarta.dll
- 000007fe`f7510000 000007fe`f7525000 wkscli wkscli.dll
- 000007fe`f7950000 000007fe`f797c000 powrprof powrprof.dll
- 000007fe`f7980000 000007fe`f7991000 wtsapi32 wtsapi32.dll
- 000007fe`f7fa0000 000007fe`f80cc000 propsys propsys.dll
- 000007fe`f8120000 000007fe`f8314000 comctl32 comctl32.dll
- 000007fe`f8610000 000007fe`f861c000 version version.dll
- 000007fe`fc220000 000007fe`fc23e000 userenv userenv.dll
- 000007fe`fc330000 000007fe`fc339000 credssp credssp.dll
- 000007fe`fc4b0000 000007fe`fc4f7000 rsaenh rsaenh.dll
- 000007fe`fc540000 000007fe`fc597000 schannel schannel.dll
- 000007fe`fc7b0000 000007fe`fc7c7000 cryptsp cryptsp.dll
- 000007fe`fc9c0000 000007fe`fc9fd000 winsta winsta.dll
- 000007fe`fcdc0000 000007fe`fcde5000 sspicli sspicli.dll
- 000007fe`fcdf0000 000007fe`fce47000 apphelp apphelp.dll
- 000007fe`fce50000 000007fe`fce5f000 CRYPTBASE CRYPTBASE.dll
- 000007fe`fcf00000 000007fe`fcf14000 RpcRtRemote RpcRtRemote.dll
- 000007fe`fcf20000 000007fe`fcf2f000 profapi profapi.dll
- 000007fe`fcfc0000 000007fe`fcfcf000 msasn1 msasn1.dll
- 000007fe`fcfd0000 000007fe`fd006000 cfgmgr32 cfgmgr32.dll
- 000007fe`fd010000 000007fe`fd07b000 KERNELBASE KERNELBASE.dll
- 000007fe`fd080000 000007fe`fd09a000 devobj devobj.dll
- 000007fe`fd0a0000 000007fe`fd206000 crypt32 crypt32.dll
- 000007fe`fd2b0000 000007fe`fd2ea000 wintrust wintrust.dll
- 000007fe`fd550000 000007fe`fd727000 setupapi setupapi.dll
- 000007fe`fd730000 000007fe`fd932000 ole32 ole32.dll
- 000007fe`fdbe0000 000007fe`fdbff000 sechost sechost.dll
- 000007fe`fdd30000 000007fe`fdd3e000 lpk lpk.dll
- 000007fe`fdd40000 000007fe`feac6000 shell32 shell32.dll
- 000007fe`fead0000 000007fe`feb41000 shlwapi shlwapi.dll
- 000007fe`feb50000 000007fe`feb58000 nsi nsi.dll
- 000007fe`feb60000 000007fe`febad000 ws2_32 ws2_32.dll
- 000007fe`febb0000 000007fe`fec17000 gdi32 gdi32.dll
- 000007fe`fec20000 000007fe`fec70000 Wldap32 Wldap32.dll
- 000007fe`fec70000 000007fe`fed9e000 rpcrt4 rpcrt4.dll
- 000007fe`feda0000 000007fe`fee3f000 msvcrt msvcrt.dll
- 000007fe`fee40000 000007fe`fef1b000 advapi32 advapi32.dll
- 000007fe`fef20000 000007fe`feff7000 oleaut32 oleaut32.dll
- 000007fe`ff020000 000007fe`ff0b9000 clbcatq clbcatq.dll
- 000007fe`ff0c0000 000007fe`ff0ee000 imm32 imm32.dll
- 000007fe`ff0f0000 000007fe`ff1ba000 usp10 usp10.dll
- 000007fe`ff1c0000 000007fe`ff2c9000 msctf msctf.dll
- Raw Stack Contents
- Dump Header Information
- ----- User Mini Dump Analysis
- MINIDUMP_HEADER:
- Version A793 (6C02)
- NumberOfStreams 12
- Flags 1105
- 0001 MiniDumpWithDataSegs
- 0004 MiniDumpWithHandleData
- 0100 MiniDumpWithProcessThreadData
- 1000 MiniDumpWithThreadInfo
- Streams:
- Stream 0: type ThreadListStream (3), size 000001E4, RVA 00000278
- 10 threads
- RVA 0000027C, ID 7A0, Teb:000007FFFFFDE000
- RVA 000002AC, ID CE0, Teb:000007FFFFFDC000
- RVA 000002DC, ID 113C, Teb:000007FFFFFD9000
- RVA 0000030C, ID 13F4, Teb:000007FFFFFD3000
- RVA 0000033C, ID 1028, Teb:000007FFFFFAE000
- RVA 0000036C, ID 2678, Teb:000007FFFFFAA000
- RVA 0000039C, ID 263C, Teb:000007FFFFFA8000
- RVA 000003CC, ID 2E30, Teb:000007FFFFFD7000
- RVA 000003FC, ID 2FEC, Teb:000007FFFFFD5000
- RVA 0000042C, ID 2E64, Teb:000007FFFFFAC000
- Stream 1: type ThreadInfoListStream (17), size 0000028C, RVA 0000045C
- RVA 00000468, ID 7A0
- RVA 000004A8, ID CE0
- RVA 000004E8, ID 113C
- RVA 00000528, ID 13F4
- RVA 00000568, ID 1028
- RVA 000005A8, ID 2678
- RVA 000005E8, ID 263C
- RVA 00000628, ID 2E30
- RVA 00000668, ID 2FEC
- RVA 000006A8, ID 2E64
- Stream 2: type ModuleListStream (4), size 00001A2C, RVA 000006E8
- 62 modules
- RVA 000006EC, 00000000`ffcc0000 - 00000000`ffd1d000: 'C:\Windows\System32\wbem\WmiPrvSE.exe'
- RVA 00000758, 00000000`76fc0000 - 00000000`7716b000: 'C:\Windows\System32\ntdll.dll'
- RVA 000007C4, 00000000`76da0000 - 00000000`76ebf000: 'C:\Windows\System32\kernel32.dll'
- RVA 00000830, 000007fe`fd010000 - 000007fe`fd07b000: 'C:\Windows\System32\KERNELBASE.dll'
- RVA 0000089C, 000007fe`fee40000 - 000007fe`fef1b000: 'C:\Windows\System32\advapi32.dll'
- RVA 00000908, 000007fe`feda0000 - 000007fe`fee3f000: 'C:\Windows\System32\msvcrt.dll'
- RVA 00000974, 000007fe`fdbe0000 - 000007fe`fdbff000: 'C:\Windows\System32\sechost.dll'
- RVA 000009E0, 000007fe`fec70000 - 000007fe`fed9e000: 'C:\Windows\System32\rpcrt4.dll'
- RVA 00000A4C, 00000000`76ec0000 - 00000000`76fba000: 'C:\Windows\System32\user32.dll'
- RVA 00000AB8, 000007fe`febb0000 - 000007fe`fec17000: 'C:\Windows\System32\gdi32.dll'
- RVA 00000B24, 000007fe`fdd30000 - 000007fe`fdd3e000: 'C:\Windows\System32\lpk.dll'
- RVA 00000B90, 000007fe`ff0f0000 - 000007fe`ff1ba000: 'C:\Windows\System32\usp10.dll'
- RVA 00000BFC, 000007fe`f4ee0000 - 000007fe`f4f66000: 'C:\Windows\System32\wbemcomn.dll'
- RVA 00000C68, 000007fe`fef20000 - 000007fe`feff7000: 'C:\Windows\System32\oleaut32.dll'
- RVA 00000CD4, 000007fe`fd730000 - 000007fe`fd932000: 'C:\Windows\System32\ole32.dll'
- RVA 00000D40, 000007fe`feb60000 - 000007fe`febad000: 'C:\Windows\System32\ws2_32.dll'
- RVA 00000DAC, 000007fe`feb50000 - 000007fe`feb58000: 'C:\Windows\System32\nsi.dll'
- RVA 00000E18, 000007fe`f4cf0000 - 000007fe`f4dd2000: 'C:\Windows\System32\wbem\fastprox.dll'
- RVA 00000E84, 000007fe`f4cc0000 - 000007fe`f4ce7000: 'C:\Windows\System32\ntdsapi.dll'
- RVA 00000EF0, 000007fe`f40a0000 - 000007fe`f40b6000: 'C:\Windows\System32\ncobjapi.dll'
- RVA 00000F5C, 000007fe`ff0c0000 - 000007fe`ff0ee000: 'C:\Windows\System32\imm32.dll'
- RVA 00000FC8, 000007fe`ff1c0000 - 000007fe`ff2c9000: 'C:\Windows\System32\msctf.dll'
- RVA 00001034, 000007fe`fce50000 - 000007fe`fce5f000: 'C:\Windows\System32\CRYPTBASE.dll'
- RVA 000010A0, 000007fe`f6e80000 - 000007fe`f6ead000: 'C:\Windows\System32\ntmarta.dll'
- RVA 0000110C, 000007fe`fec20000 - 000007fe`fec70000: 'C:\Windows\System32\Wldap32.dll'
- RVA 00001178, 000007fe`ff020000 - 000007fe`ff0b9000: 'C:\Windows\System32\clbcatq.dll'
- RVA 000011E4, 000007fe`fc7b0000 - 000007fe`fc7c7000: 'C:\Windows\System32\cryptsp.dll'
- RVA 00001250, 000007fe`fc4b0000 - 000007fe`fc4f7000: 'C:\Windows\System32\rsaenh.dll'
- RVA 000012BC, 000007fe`fcf00000 - 000007fe`fcf14000: 'C:\Windows\System32\RpcRtRemote.dll'
- RVA 00001328, 000007fe`f47c0000 - 000007fe`f47d4000: 'C:\Windows\System32\wbem\wbemsvc.dll'
- RVA 00001394, 000007fe`f4790000 - 000007fe`f47b6000: 'C:\Windows\System32\wbem\wmiutils.dll'
- RVA 00001400, 000007fe`e9370000 - 000007fe`e956a000: 'C:\Windows\System32\wbem\cimwin32.dll'
- RVA 0000146C, 000007fe`f19f0000 - 000007fe`f1a3c000: 'C:\Windows\System32\framedynos.dll'
- RVA 000014D8, 000007fe`fcdc0000 - 000007fe`fcde5000: 'C:\Windows\System32\sspicli.dll'
- RVA 00001544, 000007fe`f7980000 - 000007fe`f7991000: 'C:\Windows\System32\wtsapi32.dll'
- RVA 000015B0, 000007fe`fd080000 - 000007fe`fd09a000: 'C:\Windows\System32\devobj.dll'
- RVA 0000161C, 000007fe`fcfd0000 - 000007fe`fd006000: 'C:\Windows\System32\cfgmgr32.dll'
- RVA 00001688, 000007fe`f6810000 - 000007fe`f6837000: 'C:\Windows\System32\IPHLPAPI.DLL'
- RVA 000016F4, 000007fe`f6800000 - 000007fe`f680b000: 'C:\Windows\System32\winnsi.dll'
- RVA 00001760, 000007fe`f66e0000 - 000007fe`f66f8000: 'C:\Windows\System32\dhcpcsvc.dll'
- RVA 000017CC, 000007fe`f66c0000 - 000007fe`f66d1000: 'C:\Windows\System32\dhcpcsvc6.DLL'
- RVA 00001838, 000007fe`e8a40000 - 000007fe`e8a48000: 'C:\Windows\System32\winbrand.dll'
- RVA 000018A4, 000007fe`fc330000 - 000007fe`fc339000: 'C:\Windows\System32\credssp.dll'
- RVA 00001910, 000007fe`fc540000 - 000007fe`fc597000: 'C:\Windows\System32\schannel.dll'
- RVA 0000197C, 000007fe`fd0a0000 - 000007fe`fd206000: 'C:\Windows\System32\crypt32.dll'
- RVA 000019E8, 000007fe`fcfc0000 - 000007fe`fcfcf000: 'C:\Windows\System32\msasn1.dll'
- RVA 00001A54, 000007fe`f7510000 - 000007fe`f7525000: 'C:\Windows\System32\wkscli.dll'
- RVA 00001AC0, 000007fe`f3520000 - 000007fe`f352f000: 'C:\Windows\System32\cscapi.dll'
- RVA 00001B2C, 000007fe`fc9c0000 - 000007fe`fc9fd000: 'C:\Windows\System32\winsta.dll'
- RVA 00001B98, 000007fe`f7950000 - 000007fe`f797c000: 'C:\Windows\System32\powrprof.dll'
- RVA 00001C04, 000007fe`fd550000 - 000007fe`fd727000: 'C:\Windows\System32\setupapi.dll'
- RVA 00001C70, 000007fe`fdd40000 - 000007fe`feac6000: 'C:\Windows\System32\shell32.dll'
- RVA 00001CDC, 000007fe`fead0000 - 000007fe`feb41000: 'C:\Windows\System32\shlwapi.dll'
- RVA 00001D48, 000007fe`f8120000 - 000007fe`f8314000: 'C:\Windows\winsxs\amd64_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7600.16661_none_fa62ad231704eab7\comctl32.dll'
- RVA 00001DB4, 000007fe`f19a0000 - 000007fe`f19ac000: 'C:\Windows\System32\linkinfo.dll'
- RVA 00001E20, 000007fe`f7fa0000 - 000007fe`f80cc000: 'C:\Windows\System32\propsys.dll'
- RVA 00001E8C, 000007fe`f8610000 - 000007fe`f861c000: 'C:\Windows\System32\version.dll'
- RVA 00001EF8, 000007fe`fcdf0000 - 000007fe`fce47000: 'C:\Windows\System32\apphelp.dll'
- RVA 00001F64, 000007fe`fcf20000 - 000007fe`fcf2f000: 'C:\Windows\System32\profapi.dll'
- RVA 00001FD0, 000007fe`fc220000 - 000007fe`fc23e000: 'C:\Windows\System32\userenv.dll'
- RVA 0000203C, 000007fe`efc60000 - 000007fe`efc6b000: 'C:\Windows\System32\perfos.dll'
- RVA 000020A8, 000007fe`fd2b0000 - 000007fe`fd2ea000: 'C:\Windows\System32\wintrust.dll'
- Stream 3: type MemoryListStream (5), size 000005B4, RVA 00007132
- 91 memory ranges
- range# RVA Address Size
- 0 000076E6 000007fe`fe21e000 00000000`000093e0
- 1 00010AC6 000007fe`efc66000 00000000`00001e68
- 2 0001292E 000007fe`f47cf000 00000000`000019d4
- 3 00014302 00000000`76eaa000 00000000`00001900
- 4 00015C02 000007fe`f40b1000 00000000`000008c0
- 5 000164C2 000007fe`feb37000 00000000`00001508
- 6 000179CA 000007fe`f6832000 00000000`00000be0
- 7 000185AA 000007fe`fc58f000 00000000`00001f88
- 8 0001A532 000007fe`ff0ab000 00000000`000056f0
- 9 0001FC22 000007fe`ff279000 00000000`000025e8
- 10 0002220A 000007fe`feee8000 00000000`00004260
- 11 0002646A 000007fe`feb54000 00000000`00000690
- 12 00026AFA 00000000`76edc8aa 00000000`00000100
- 13 00026BFA 000007fe`fd070000 00000000`00001b48
- 14 00028742 000007fe`f4f54000 00000000`00008830
- 15 00030F72 000007fe`ff0e2000 00000000`00001028
- 16 00031F9A 000007fe`fc239000 00000000`00000aa0
- 17 00032A3A 000007fe`fd096000 00000000`00000904
- 18 0003333E 000007fe`fdd3a000 00000000`00000890
- 19 00033BCE 000007fe`f7521000 00000000`000008c8
- 20 00034496 000007fe`f66c9000 00000000`00000964
- 21 00034DFA 000007fe`feb9c000 00000000`00000a68
- 22 00035862 00000000`770f3000 00000000`0000ba60
- 23 000412C2 000007fe`fc7c3000 00000000`00000bc8
- 24 00041E8A 000007fe`f19a8000 00000000`000007e4
- 25 0004266E 000007fe`fed80000 00000000`00001a24
- 26 00044092 000007fe`f4dc1000 00000000`000011e0
- 27 00045272 000007fe`fd63a000 00000000`00005b28
- 28 0004AD9A 00000000`ffd14000 00000000`000025f8
- 29 0004D392 000007fe`f66f4000 00000000`00000ab0
- 30 0004DE42 000007fe`fcf10000 00000000`00000b8c
- 31 0004E9CE 00000000`76f52000 00000000`00001a50
- 32 0005041E 000007fe`e8a44000 00000000`00000724
- 33 00050B42 000007fe`fcf2b000 00000000`00000804
- 34 00051346 000007ff`fffa8000 00000000`00008000
- 35 00059346 000007fe`f8049000 00000000`000025c8
- 36 0005B90E 000007fe`fd2e4000 00000000`00000f00
- 37 0005C80E 000007fe`fec0c000 00000000`00001848
- 38 0005E056 000007fe`fc9f5000 00000000`00003364
- 39 000613BA 000007fe`ff173000 00000000`00002a10
- 40 00063DCA 000007ff`fffd3000 00000000`00008380
- 41 0006C14A 00000000`002c1320 00000000`00002020
- 42 0006E16A 000007fe`e9540000 00000000`00009b80
- 43 00077CEA 00000000`002c35e8 00000000`00000028
- 44 00077D12 000007ff`fffdc000 00000000`00004000
- 45 0007BD12 000007fe`fdbf9000 00000000`00002a90
- 46 0007E7A2 000007fe`f1a34000 00000000`00001994
- 47 00080136 000007fe`f352b000 00000000`00000c3c
- 48 00080D72 000007fe`f7968000 00000000`00000dc0
- 49 00081B32 000007fe`f6ea6000 00000000`000029a4
- 50 000844D6 000007fe`fefe3000 00000000`00002630
- 51 00086B06 00000000`00303fb0 00000000`00000410
- 52 00086F16 000007fe`fcddf000 00000000`00001108
- 53 0008801E 000007fe`fee31000 00000000`00005602
- 54 0008D620 000007fe`f8618000 00000000`0000091a
- 55 0008DF3A 000007fe`fec68000 00000000`00001314
- 56 0008F24E 000007fe`fc4ee000 00000000`000033d4
- 57 00092622 000007fe`f798d000 00000000`000008e4
- 58 00092F06 00000000`0031c6b0 00000000`00000410
- 59 00093316 000007fe`fc335000 00000000`00000810
- 60 00093B26 000007fe`fcfcb000 00000000`000006b0
- 61 000941D6 000007fe`fd197000 00000000`000020ac
- 62 00096282 00000000`7700fd1a 00000000`00000100
- 63 00096382 00000000`7701001a 00000000`00000100
- 64 00096482 00000000`7701022a 00000000`00000160
- 65 000965E2 00000000`0033e180 00000000`00000410
- 66 000969F2 00000000`770115da 00000000`00000100
- 67 00096AF2 00000000`00344da0 00000000`00000410
- 68 00096F02 000007fe`f4ce3000 00000000`00000ebc
- 69 00097DBE 000007fe`f82bc000 00000000`000030fc
- 70 0009AEBA 000007fe`fd001000 00000000`00000850
- 71 0009B70A 000007fe`fce36000 00000000`00003240
- 72 0009E94A 000007fe`fd904000 00000000`00006b68
- 73 000A54B2 00000000`00373770 00000000`00000410
- 74 000A58C2 00000000`00373bc0 00000000`00000410
- 75 000A5CD2 00000000`00374010 00000000`00000410
- 76 000A60E2 00000000`003748b0 00000000`00000410
- 77 000A64F2 00000000`00374d00 00000000`00000410
- 78 000A6902 000007fe`f47af000 00000000`00001328
- 79 000A7C2A 000007fe`f6807000 00000000`00000724
- 80 000A834E 000007fe`fce5b000 00000000`00000760
- 81 000A8AAE 00000000`0017f7d8 00000000`00000828
- 82 000A92D6 00000000`0109f578 00000000`00000a88
- 83 000A9D5E 00000000`008af628 00000000`000009d8
- 84 000AA736 00000000`014efb78 00000000`00000488
- 85 000AABBE 00000000`013af418 00000000`00000be8
- 86 000AB7A6 00000000`0126f688 00000000`00000978
- 87 000AC11E 00000000`01eaf868 00000000`00000798
- 88 000AC8B6 00000000`026bf838 00000000`000007c8
- 89 000AD07E 00000000`0170fc08 00000000`000003f8
- 90 000AD476 00000000`0283c318 00000000`00003ce8
- Total memory: a9a78
- Stream 4: type ExceptionStream (6), size 000000A8, RVA 000001D0
- ThreadID 9848
- ExceptionCode 80000007
- ExceptionRecord 0
- ExceptionAddress 0
- Context record RVA 3280, size 4d0
- Stream 5: type SystemInfoStream (7), size 00000038, RVA 000000B0
- ProcessorArchitecture 0009 (PROCESSOR_ARCHITECTURE_AMD64)
- ProcessorLevel 0006
- ProcessorRevision 2505
- NumberOfProcessors 04
- MajorVersion 00000006
- MinorVersion 00000001
- BuildNumber 00001DB0 (7600)
- PlatformId 00000002 (VER_PLATFORM_WIN32_NT)
- CSDVersionRva 00002114
- Length: 0
- Product: WinNt, suite: SingleUserTS Personal
- Stream 6: type MiscInfoStream (15), size 000000E8, RVA 000000E8
- Stream 7: type HandleDataStream (12), size 00003440, RVA 000B87D2
- 334 descriptors, header size is 16, descriptor size is 40
- Handle(0000000000000004,"Directory","\KnownDlls")
- Handle(0000000000000008,"File","")
- Handle(000000000000000C,"Key","\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Sorting\Versions")
- Handle(0000000000000010,"Mutant","")
- Handle(0000000000000014,"ALPC Port","")
- Handle(0000000000000018,"Key","\REGISTRY\MACHINE")
- Handle(000000000000001C,"Event","")
- Handle(0000000000000020,"Key","\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SESSION MANAGER")
- Handle(0000000000000000,"Key","\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SESSION MANAGER")
- Handle(0000000000000028,"Event","")
- Handle(0000000000000000,"Event","")
- Handle(000000000000003C,"Event","")
- Handle(0000000000000040,"Event","")
- Handle(0000000000000044,"Event","")
- Handle(0000000000000048,"Event","")
- Handle(000000000000004C,"Event","")
- Handle(0000000000000050,"Event","")
- Handle(0000000000000054,"Directory","\BaseNamedObjects")
- Handle(0000000000000058,"Mutant","")
- Handle(0000000000000000,"Mutant","")
- Handle(0000000000000000,"Mutant","")
- Handle(0000000000000000,"Mutant","")
- Handle(0000000000000000,"Mutant","")
- Handle(0000000000000000,"Mutant","")
- Handle(0000000000000000,"Mutant","")
- Handle(0000000000000000,"Mutant","")
- Handle(0000000000000000,"Mutant","")
- Handle(000000000000007C,"Event","")
- Handle(0000000000000080,"Event","")
- Handle(0000000000000084,"Event","")
- Handle(0000000000000000,"Event","")
- Handle(0000000000000000,"Event","")
- Handle(0000000000000090,"Event","")
- Handle(0000000000000094,"Thread","")
- Handle(0000000000000098,"ALPC Port","")
- Handle(000000000000009C,"Event","")
- Handle(00000000000000A0,"Event","")
- Handle(00000000000000A4,"File","")
- Handle(0000000000000000,"File","")
- Handle(0000000000000000,"File","")
- Handle(00000000000000B0,"Event","")
- Handle(00000000000000B4,"Semaphore","")
- Handle(00000000000000B8,"Semaphore","")
- Handle(00000000000000BC,"Semaphore","")
- Handle(00000000000000C0,"Semaphore","")
- Handle(00000000000000C4,"Semaphore","")
- Handle(00000000000000C8,"Semaphore","")
- Handle(00000000000000CC,"Semaphore","")
- Handle(00000000000000D0,"Semaphore","")
- Handle(00000000000000D4,"KeyedEvent","")
- Handle(00000000000000D8,"IoCompletion","")
- Handle(00000000000000DC,"TpWorkerFactory","")
- Handle(00000000000000E0,"TpWorkerFactory","")
- Handle(00000000000000E4,"TpWorkerFactory","")
- Handle(00000000000000E8,"TpWorkerFactory","")
- Handle(00000000000000EC,"Timer","")
- Handle(00000000000000F0,"Timer","")
- Handle(00000000000000F4,"Thread","")
- Handle(00000000000000F8,"Thread","")
- Handle(00000000000000FC,"Timer","")
- Handle(0000000000000100,"ALPC Port","")
- Handle(0000000000000104,"Event","")
- Handle(0000000000000108,"Event","")
- Handle(000000000000010C,"Section","\BaseNamedObjects\Wmi Provider Sub System Counters")
- Handle(0000000000000110,"Event","")
- Handle(0000000000000114,"Event","")
- Handle(0000000000000118,"Event","")
- Handle(000000000000011C,"Event","\BaseNamedObjects\WBEM_ESS_OPEN_FOR_BUSINESS")
- Handle(0000000000000120,"Event","")
- Handle(0000000000000124,"Thread","")
- Handle(0000000000000128,"Event","\BaseNamedObjects\EVENT_READYROOT/CIMV2PROVIDERSUBSYSTEM")
- Handle(000000000000012C,"Section","\BaseNamedObjects\__ComCatalogCache__")
- Handle(0000000000000130,"Key","\REGISTRY\MACHINE\SOFTWARE\Classes")
- Handle(0000000000000134,"Event","\KernelObjects\MaximumCommitCondition")
- Handle(0000000000000138,"Section","\BaseNamedObjects\__ComCatalogCache__")
- Handle(000000000000013C,"Event","")
- Handle(0000000000000140,"Section","\BaseNamedObjects\C:*ProgramData*Microsoft*Windows*Caches*cversions.2.ro")
- Handle(0000000000000144,"ALPC Port","\RPC Control\OLE96F2B40F7AB74B1680BFFA433E32")
- Handle(0000000000000148,"Event","")
- Handle(0000000000000000,"Event","")
- Handle(0000000000000000,"Event","")
- Handle(0000000000000154,"Event","")
- Handle(0000000000000158,"ALPC Port","")
- Handle(000000000000015C,"Event","")
- Handle(0000000000000160,"Event","")
- Handle(0000000000000164,"Event","")
- Handle(0000000000000168,"Event","")
- Handle(000000000000016C,"Thread","")
- Handle(0000000000000170,"ALPC Port","")
- Handle(0000000000000174,"Event","")
- Handle(0000000000000178,"Event","")
- Handle(000000000000017C,"Event","")
- Handle(0000000000000180,"Thread","")
- Handle(0000000000000184,"Event","")
- Handle(0000000000000188,"Event","")
- Handle(000000000000018C,"Event","")
- Handle(0000000000000190,"Event","")
- Handle(0000000000000194,"Event","")
- Handle(0000000000000198,"ALPC Port","")
- Handle(000000000000019C,"Event","")
- Handle(00000000000001A0,"Event","")
- Handle(00000000000001A4,"Key","\REGISTRY\MACHINE\SOFTWARE\Classes")
- Handle(00000000000001A8,"Semaphore","")
- Handle(00000000000001AC,"Semaphore","")
- Handle(00000000000001B0,"Event","")
- Handle(00000000000001B4,"Event","")
- Handle(00000000000001B8,"Event","")
- Handle(00000000000001BC,"Event","")
- Handle(00000000000001C0,"Event","")
- Handle(00000000000001C4,"ALPC Port","")
- Handle(00000000000001C8,"Event","")
- Handle(00000000000001CC,"ALPC Port","")
- Handle(00000000000001D0,"Thread","")
- Handle(00000000000001D4,"ALPC Port","")
- Handle(00000000000001D8,"Event","")
- Handle(00000000000001DC,"Mutant","")
- Handle(00000000000001E0,"Event","")
- Handle(00000000000001E4,"Event","")
- Handle(0000000000000000,"Event","")
- Handle(00000000000001F0,"Event","")
- Handle(00000000000001F4,"Token","")
- Handle(00000000000001F8,"Semaphore","")
- Handle(00000000000001FC,"Event","")
- Handle(0000000000000200,"Event","")
- Handle(0000000000000204,"Event","")
- Handle(0000000000000208,"Event","")
- Handle(0000000000000000,"Event","")
- Handle(0000000000000210,"Event","")
- Handle(0000000000000000,"Event","")
- Handle(0000000000000218,"Event","")
- Handle(000000000000021C,"Semaphore","")
- Handle(0000000000000220,"Semaphore","")
- Handle(0000000000000224,"File","")
- Handle(0000000000000228,"Key","\REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum")
- Handle(000000000000022C,"Key","\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\CLASS")
- Handle(0000000000000230,"Key","\REGISTRY\MACHINE\SYSTEM\ControlSet001\services")
- Handle(0000000000000234,"Key","\REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\PerHwIdStorage")
- Handle(0000000000000238,"Key","\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\DeviceClasses")
- Handle(000000000000023C,"Event","")
- Handle(0000000000000240,"Key","\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\CoDeviceInstallers")
- Handle(0000000000000244,"Event","")
- Handle(0000000000000000,"Event","")
- Handle(000000000000024C,"Semaphore","")
- Handle(0000000000000250,"Event","")
- Handle(0000000000000254,"Event","")
- Handle(0000000000000000,"Event","")
- Handle(000000000000025C,"Semaphore","")
- Handle(0000000000000260,"Semaphore","")
- Handle(0000000000000264,"Semaphore","")
- Handle(0000000000000268,"Semaphore","")
- Handle(000000000000026C,"Semaphore","")
- Handle(0000000000000270,"Semaphore","")
- Handle(0000000000000274,"Semaphore","")
- Handle(0000000000000278,"Semaphore","")
- Handle(000000000000027C,"Semaphore","")
- Handle(0000000000000280,"Semaphore","")
- Handle(0000000000000284,"Semaphore","")
- Handle(0000000000000288,"Semaphore","")
- Handle(000000000000028C,"Semaphore","")
- Handle(0000000000000290,"Semaphore","")
- Handle(0000000000000294,"Key","\REGISTRY\MACHINE\SOFTWARE\MICROSOFT\Windows\CurrentVersion\Explorer\FolderDescriptions\{F38BF404-1D43-42F2-9305-67DE0B28FC23}\PropertyBag")
- Handle(0000000000000000,"Key","\REGISTRY\MACHINE\SOFTWARE\MICROSOFT\Windows\CurrentVersion\Explorer\FolderDescriptions\{F38BF404-1D43-42F2-9305-67DE0B28FC23}\PropertyBag")
- Handle(0000000000000000,"Key","\REGISTRY\MACHINE\SOFTWARE\MICROSOFT\Windows\CurrentVersion\Explorer\FolderDescriptions\{F38BF404-1D43-42F2-9305-67DE0B28FC23}\PropertyBag")
- Handle(00000000000002A0,"File","")
- Handle(0000000000000000,"File","")
- Handle(00000000000002AC,"Event","")
- Handle(00000000000002B0,"Semaphore","")
- Handle(00000000000002B4,"Semaphore","")
- Handle(00000000000002B8,"Event","")
- Handle(00000000000002BC,"Event","")
- Handle(00000000000002C0,"Thread","")
- Handle(0000000000000000,"Thread","a")
- Handle(0000000000000000,"Thread","a")
- Handle(0000000000000000,"Thread","a")
- Handle(0000000000000000,"Thread","a")
- Handle(0000000000000000,"Thread","a")
- Handle(0000000000000000,"Thread","a")
- Handle(00000000000002DC,"Semaphore","")
- Handle(00000000000002E0,"Semaphore","")
- Handle(00000000000002E4,"Key","\REGISTRY\MACHINE\SYSTEM\ControlSet001\services\.NET CLR Data\Performance")
- Handle(00000000000002EC,"Event","\BaseNamedObjects\TermSrvReadyEvent")
- Handle(00000000000002F0,"Event","")
- Handle(0000000000000000,"Event","")
- Handle(00000000000002F8,"Event","")
- Handle(0000000000000000,"Event","")
- Handle(0000000000000300,"Event","")
- Handle(0000000000000304,"Mutant","")
- Handle(0000000000000308,"Event","")
- Handle(000000000000030C,"Mutant","")
- Handle(0000000000000310,"ALPC Port","")
- Handle(0000000000000314,"Event","")
- Handle(000000000000031C,"Thread","")
- Handle(0000000000000320,"Event","")
- Handle(0000000000000324,"Event","")
- Handle(0000000000000328,"Event","")
- Handle(0000000000000000,"Event","")
- Handle(0000000000000334,"Thread","")
- Handle(0000000000000338,"Thread","")
- Handle(0000000000000000,"Thread","a")
- Handle(0000000000000000,"Thread","a")
- Handle(0000000000000344,"File","")
- Handle(0000000000000000,"File","")
- Handle(000000000000034C,"Event","")
- Handle(0000000000000350,"Section","\BaseNamedObjects\windows_shell_global_counters")
- Handle(0000000000000354,"Section","\BaseNamedObjects\C:*ProgramData*Microsoft*Windows*Caches*{6AF0698E-D558-4F6E-9B3C-3716689AF493}.2.ver0x0000000000000005.db")
- Handle(0000000000000358,"Section","\BaseNamedObjects\C:*ProgramData*Microsoft*Windows*Caches*{DDF571F2-BE98-426D-8288-1A9A39C3FDA2}.2.ver0x0000000000000001.db")
- Handle(0000000000000000,"Section","\BaseNamedObjects\C:*ProgramData*Microsoft*Windows*Caches*{DDF571F2-BE98-426D-8288-1A9A39C3FDA2}.2.ver0x0000000000000001.db")
- Handle(0000000000000360,"Thread","")
- Handle(0000000000000364,"Key","\REGISTRY\MACHINE\SOFTWARE\MICROSOFT\Windows\CurrentVersion\Explorer\FolderDescriptions\{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}\PropertyBag")
- Handle(0000000000000000,"Key","\REGISTRY\MACHINE\SOFTWARE\MICROSOFT\Windows\CurrentVersion\Explorer\FolderDescriptions\{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}\PropertyBag")
- Handle(000000000000036C,"Event","")
- Handle(0000000000000370,"Event","")
- Handle(0000000000000374,"Section","\BaseNamedObjects\C:*ProgramData*Microsoft*Windows*Caches*cversions.2.ro")
- Handle(0000000000000378,"Event","")
- Handle(0000000000000000,"Event","")
- Handle(0000000000000380,"Key","\REGISTRY\MACHINE\SOFTWARE\MICROSOFT\Windows\CurrentVersion\Explorer\FolderDescriptions\{905E63B6-C1BF-494E-B29C-65B732D3D21A}\PropertyBag")
- Handle(0000000000000384,"Event","")
- Handle(0000000000000388,"Key","\REGISTRY\MACHINE\SOFTWARE\MICROSOFT\Windows\CurrentVersion\Explorer\FolderDescriptions\{F3CE0F7C-4901-4ACC-8648-D5D44B04EF8F}\PropertyBag")
- Handle(000000000000038C,"Section","\BaseNamedObjects\windows_shell_global_counters")
- Handle(0000000000000000,"Section","\BaseNamedObjects\windows_shell_global_counters")
- Handle(0000000000000394,"Key","\REGISTRY\USER")
- Handle(0000000000000398,"Key","\REGISTRY\MACHINE\SOFTWARE\MICROSOFT\Windows\CurrentVersion\Explorer\FolderDescriptions\{18989B1D-99B5-455B-841C-AB7C74E4DDFC}\PropertyBag")
- Handle(0000000000000000,"Key","\REGISTRY\MACHINE\SOFTWARE\MICROSOFT\Windows\CurrentVersion\Explorer\FolderDescriptions\{18989B1D-99B5-455B-841C-AB7C74E4DDFC}\PropertyBag")
- Handle(0000000000000000,"Key","\REGISTRY\MACHINE\SOFTWARE\MICROSOFT\Windows\CurrentVersion\Explorer\FolderDescriptions\{18989B1D-99B5-455B-841C-AB7C74E4DDFC}\PropertyBag")
- Handle(00000000000003A4,"Key","\REGISTRY\MACHINE\SOFTWARE\MICROSOFT\Windows\CurrentVersion\Explorer\FolderDescriptions\{33E28130-4E1E-4676-835A-98395C3BC3BB}\PropertyBag")
- Handle(00000000000003AC,"Mutant","")
- Handle(00000000000003B0,"Key","\REGISTRY\MACHINE\SOFTWARE\MICROSOFT\Windows\CurrentVersion\Explorer\FolderDescriptions\{2112AB0A-C86A-4FFE-A368-0DE96E47012E}\PropertyBag")
- Handle(00000000000003B4,"Key","\REGISTRY\MACHINE\SOFTWARE\MICROSOFT\Windows\CurrentVersion\Explorer\FolderDescriptions\{491E922F-5643-4AF4-A7EB-4E7A138D8174}\PropertyBag")
- Handle(00000000000003B8,"Key","\REGISTRY\MACHINE\SOFTWARE\MICROSOFT\Windows\CurrentVersion\Explorer\FolderDescriptions\{B4BFCC3A-DB2C-424C-B029-7FE99A87C641}\PropertyBag")
- Handle(00000000000003BC,"Key","\REGISTRY\MACHINE\SOFTWARE\MICROSOFT\Windows\CurrentVersion\Explorer\FolderDescriptions\{2400183A-6185-49FB-A2D8-4A392A602BA3}\PropertyBag")
- Handle(00000000000003C0,"Key","\REGISTRY\MACHINE\SOFTWARE\MICROSOFT\Windows\CurrentVersion\Explorer\FolderDescriptions\{56784854-C6CB-462B-8169-88E350ACB882}\PropertyBag")
- Handle(00000000000003C4,"Key","\REGISTRY\MACHINE\SOFTWARE\MICROSOFT\Windows\CurrentVersion\Explorer\FolderDescriptions\{A302545D-DEFF-464B-ABE8-61C8648D939B}\PropertyBag")
- Handle(00000000000003C8,"Key","\REGISTRY\MACHINE\SOFTWARE\MICROSOFT\Windows\CurrentVersion\Explorer\FolderDescriptions\{1AC14E77-02E7-4E5D-B744-2EB1AE5198B7}\PropertyBag")
- Handle(00000000000003CC,"Key","\REGISTRY\MACHINE\SOFTWARE\MICROSOFT\Windows\CurrentVersion\Explorer\FolderDescriptions\{52528A6B-B9E3-4ADD-B60D-588C2DBA842D}\PropertyBag")
- Handle(00000000000003D0,"Key","\REGISTRY\MACHINE\SOFTWARE\MICROSOFT\Windows\CurrentVersion\Explorer\FolderDescriptions\{7B0DB17D-9CD2-4A93-9733-46CC89022E7C}\PropertyBag")
- Handle(00000000000003D4,"Key","\REGISTRY\MACHINE\SOFTWARE\MICROSOFT\Windows\CurrentVersion\Explorer\FolderDescriptions\{4BD8D571-6D19-48D3-BE97-422220080E43}\PropertyBag")
- Handle(00000000000003D8,"Key","\REGISTRY\MACHINE\SOFTWARE\MICROSOFT\Windows\CurrentVersion\Explorer\FolderDescriptions\{B6EBFB86-6907-413C-9AF7-4FC2ABF07CC5}\PropertyBag")
- Handle(00000000000003DC,"Key","\REGISTRY\MACHINE\SOFTWARE\MICROSOFT\Windows\CurrentVersion\Explorer\FolderDescriptions\{A990AE9F-A03B-4E80-94BC-9912D7504104}\PropertyBag")
- Handle(00000000000003E0,"Key","\REGISTRY\MACHINE\SOFTWARE\MICROSOFT\Windows\CurrentVersion\Explorer\FolderDescriptions\{ED4824AF-DCE4-45A8-81E2-FC7965083634}\PropertyBag")
- Handle(00000000000003E4,"Key","\REGISTRY\MACHINE\SOFTWARE\MICROSOFT\Windows\CurrentVersion\Explorer\FolderDescriptions\{FD228CB7-AE11-4AE3-864C-16F3910AB8FE}\PropertyBag")
- Handle(00000000000003E8,"Key","\REGISTRY\MACHINE\SOFTWARE\MICROSOFT\Windows\CurrentVersion\Explorer\FolderDescriptions\{D65231B0-B2F1-4857-A4CE-A8E7C6EA7D27}\PropertyBag")
- Handle(00000000000003EC,"Key","\REGISTRY\MACHINE\SOFTWARE\MICROSOFT\Windows\CurrentVersion\Explorer\FolderDescriptions\{3214FAB5-9757-4298-BB61-92A9DEAA44FF}\PropertyBag")
- Handle(00000000000003F0,"Key","\REGISTRY\MACHINE\SYSTEM\ControlSet001\services\.NET CLR Networking\Performance")
- Handle(00000000000003F4,"Key","\REGISTRY\MACHINE\SOFTWARE\MICROSOFT\Windows\CurrentVersion\Explorer\FolderDescriptions\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\PropertyBag")
- Handle(00000000000003F8,"Key","\REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\PERFLIB")
- Handle(0000000000000404,"Event","")
- Handle(0000000000000408,"Event","")
- Handle(000000000000040C,"Event","")
- Handle(0000000000000410,"Event","")
- Handle(0000000000000414,"Event","")
- Handle(0000000000000418,"Mutant","\BaseNamedObjects\.NET CLR Data_Perf_Library_Lock_PID_10f0")
- Handle(0000000000000420,"Thread","")
- Handle(0000000000000424,"Thread","")
- Handle(0000000000000428,"Mutant","\BaseNamedObjects\.NET CLR Networking_Perf_Library_Lock_PID_10f0")
- Handle(000000000000042C,"Key","\REGISTRY\MACHINE\SYSTEM\ControlSet001\services\.NET CLR Networking 4.0.0.0\Performance")
- Handle(0000000000000430,"Mutant","\BaseNamedObjects\.NET CLR Networking 4.0.0.0_Perf_Library_Lock_PID_10f0")
- Handle(0000000000000434,"Key","\REGISTRY\MACHINE\SYSTEM\ControlSet001\services\.NET Data Provider for Oracle\Performance")
- Handle(0000000000000438,"Mutant","\BaseNamedObjects\.NET Data Provider for Oracle_Perf_Library_Lock_PID_10f0")
- Handle(000000000000043C,"Key","\REGISTRY\MACHINE\SYSTEM\ControlSet001\services\.NET Data Provider for SqlServer\Performance")
- Handle(0000000000000440,"Mutant","\BaseNamedObjects\.NET Data Provider for SqlServer_Perf_Library_Lock_PID_10f0")
- Handle(0000000000000444,"Key","\REGISTRY\MACHINE\SYSTEM\ControlSet001\services\.NETFramework\Performance")
- Handle(0000000000000448,"Mutant","\BaseNamedObjects\.NETFramework_Perf_Library_Lock_PID_10f0")
- Handle(000000000000044C,"Key","\REGISTRY\MACHINE\SYSTEM\ControlSet001\services\BITS\Performance")
- Handle(0000000000000450,"Mutant","\BaseNamedObjects\BITS_Perf_Library_Lock_PID_10f0")
- Handle(0000000000000454,"Key","\REGISTRY\MACHINE\SYSTEM\ControlSet001\services\ESENT\Performance")
- Handle(0000000000000458,"Mutant","\BaseNamedObjects\ESENT_Perf_Library_Lock_PID_10f0")
- Handle(000000000000045C,"Key","\REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Lsa\Performance")
- Handle(0000000000000460,"Mutant","\BaseNamedObjects\Lsa_Perf_Library_Lock_PID_10f0")
- Handle(0000000000000464,"Key","\REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MAV Client PerfMon Provider\Performance")
- Handle(0000000000000468,"Mutant","\BaseNamedObjects\MAV Client PerfMon Provider_Perf_Library_Lock_PID_10f0")
- Handle(000000000000046C,"Key","\REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MSDTC\Performance")
- Handle(0000000000000470,"Mutant","\BaseNamedObjects\MSDTC_Perf_Library_Lock_PID_10f0")
- Handle(0000000000000474,"Key","\REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MSDTC Bridge 3.0.0.0\Performance")
- Handle(0000000000000478,"Mutant","\BaseNamedObjects\MSDTC Bridge 3.0.0.0_Perf_Library_Lock_PID_10f0")
- Handle(000000000000047C,"Key","\REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MSDTC Bridge 4.0.0.0\Performance")
- Handle(0000000000000480,"Mutant","\BaseNamedObjects\MSDTC Bridge 4.0.0.0_Perf_Library_Lock_PID_10f0")
- Handle(0000000000000484,"Key","\REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MSSCNTRS\Performance")
- Handle(0000000000000488,"Mutant","\BaseNamedObjects\MSSCNTRS_Perf_Library_Lock_PID_10f0")
- Handle(000000000000048C,"Key","\REGISTRY\MACHINE\SYSTEM\ControlSet001\services\PerfDisk\Performance")
- Handle(0000000000000490,"Mutant","\BaseNamedObjects\PerfDisk_Perf_Library_Lock_PID_10f0")
- Handle(0000000000000494,"Key","\REGISTRY\MACHINE\SYSTEM\ControlSet001\services\PerfNet\Performance")
- Handle(0000000000000498,"Mutant","\BaseNamedObjects\PerfNet_Perf_Library_Lock_PID_10f0")
- Handle(000000000000049C,"Key","\REGISTRY\MACHINE\SYSTEM\ControlSet001\services\PerfOS\Performance")
- Handle(00000000000004A0,"Mutant","\BaseNamedObjects\PerfOS_Perf_Library_Lock_PID_10f0")
- Handle(00000000000004A4,"Key","\REGISTRY\MACHINE\SYSTEM\ControlSet001\services\PerfProc\Performance")
- Handle(00000000000004A8,"Mutant","\BaseNamedObjects\PerfProc_Perf_Library_Lock_PID_10f0")
- Handle(00000000000004AC,"Key","\REGISTRY\MACHINE\SYSTEM\ControlSet001\services\rdyboost\Performance")
- Handle(00000000000004B0,"Mutant","\BaseNamedObjects\rdyboost_Perf_Library_Lock_PID_10f0")
- Handle(00000000000004B4,"Key","\REGISTRY\MACHINE\SYSTEM\ControlSet001\services\RemoteAccess\Performance")
- Handle(00000000000004B8,"Mutant","\BaseNamedObjects\RemoteAccess_Perf_Library_Lock_PID_10f0")
- Handle(00000000000004BC,"Key","\REGISTRY\MACHINE\SYSTEM\ControlSet001\services\ServiceModelEndpoint 3.0.0.0\Performance")
- Handle(00000000000004C0,"Mutant","\BaseNamedObjects\ServiceModelEndpoint 3.0.0.0_Perf_Library_Lock_PID_10f0")
- Handle(00000000000004C4,"Key","\REGISTRY\MACHINE\SYSTEM\ControlSet001\services\ServiceModelOperation 3.0.0.0\Performance")
- Handle(00000000000004C8,"Mutant","\BaseNamedObjects\ServiceModelOperation 3.0.0.0_Perf_Library_Lock_PID_10f0")
- Handle(00000000000004CC,"Key","\REGISTRY\MACHINE\SYSTEM\ControlSet001\services\ServiceModelService 3.0.0.0\Performance")
- Handle(00000000000004D0,"Mutant","\BaseNamedObjects\ServiceModelService 3.0.0.0_Perf_Library_Lock_PID_10f0")
- Handle(00000000000004D4,"Key","\REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SMSvcHost 3.0.0.0\Performance")
- Handle(00000000000004D8,"Mutant","\BaseNamedObjects\SMSvcHost 3.0.0.0_Perf_Library_Lock_PID_10f0")
- Handle(00000000000004DC,"Key","\REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SMSvcHost 4.0.0.0\Performance")
- Handle(00000000000004E0,"Mutant","\BaseNamedObjects\SMSvcHost 4.0.0.0_Perf_Library_Lock_PID_10f0")
- Handle(00000000000004E4,"Key","\REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Spooler\Performance")
- Handle(00000000000004E8,"Mutant","\BaseNamedObjects\Spooler_Perf_Library_Lock_PID_10f0")
- Handle(00000000000004EC,"Key","\REGISTRY\MACHINE\SYSTEM\ControlSet001\services\TapiSrv\Performance")
- Handle(00000000000004F0,"Mutant","\BaseNamedObjects\TapiSrv_Perf_Library_Lock_PID_10f0")
- Handle(00000000000004F4,"Key","\REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Tcpip\Performance")
- Handle(00000000000004F8,"Mutant","\BaseNamedObjects\Tcpip_Perf_Library_Lock_PID_10f0")
- Handle(00000000000004FC,"Key","\REGISTRY\MACHINE\SYSTEM\ControlSet001\services\TermService\Performance")
- Handle(0000000000000500,"Mutant","\BaseNamedObjects\TermService_Perf_Library_Lock_PID_10f0")
- Handle(0000000000000504,"Key","\REGISTRY\MACHINE\SYSTEM\ControlSet001\services\UGatherer\Performance")
- Handle(0000000000000508,"Mutant","\BaseNamedObjects\UGatherer_Perf_Library_Lock_PID_10f0")
- Handle(000000000000050C,"Key","\REGISTRY\MACHINE\SYSTEM\ControlSet001\services\UGTHRSVC\Performance")
- Handle(0000000000000510,"Mutant","\BaseNamedObjects\UGTHRSVC_Perf_Library_Lock_PID_10f0")
- Handle(0000000000000514,"Key","\REGISTRY\MACHINE\SYSTEM\ControlSet001\services\usbhub\Performance")
- Handle(0000000000000518,"Mutant","\BaseNamedObjects\usbhub_Perf_Library_Lock_PID_10f0")
- Handle(000000000000051C,"Key","\REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Windows Workflow Foundation 3.0.0.0\Performance")
- Handle(0000000000000520,"Mutant","\BaseNamedObjects\Windows Workflow Foundation 3.0.0.0_Perf_Library_Lock_PID_10f0")
- Handle(0000000000000524,"Key","\REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WmiApRpl\Performance")
- Handle(0000000000000528,"Mutant","\BaseNamedObjects\WmiApRpl_Perf_Library_Lock_PID_10f0")
- Handle(000000000000052C,"Key","\REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WSearchIdxPi\Performance")
- Handle(0000000000000530,"Mutant","\BaseNamedObjects\WSearchIdxPi_Perf_Library_Lock_PID_10f0")
- Handle(0000000000000534,"Mutant","\BaseNamedObjects\LOADPERF_MUTEX")
- Handle(0000000000000538,"Mutant","")
- Handle(000000000000053C,"Semaphore","")
- Handle(0000000000000540,"Section","")
- Handle(0000000000000544,"Event","")
- Handle(000000000000054C,"Thread","")
- Handle(0000000000000558,"ALPC Port","")
- Handle(000000000000055C,"Event","")
- Handle(0000000000000560,"Mutant","")
- Handle(0000000000000564,"Mutant","")
- Handle(0000000000000568,"Event","")
- Handle(000000000000056C,"Event","")
- Handle(0000000000000574,"Thread","")
- Handle(0000000000000578,"Thread","")
- Stream 8: type CommentStreamW (11), size 00000108, RVA 0000702A
- '
- *** procdump.exe -64 -c 15 -s 1 4336 WmiPrvSE2.dmp
- *** Process exceeded 15% CPU for 1 second. Thread consuming CPU: 9848 (0x2678)'
- Stream 9: type UnusedStream (0), size 00000000, RVA 00000000
- Stream 10: type UnusedStream (0), size 00000000, RVA 00000000
- Stream 11: type UnusedStream (0), size 00000000, RVA 00000000
- Strings
- India Standard Time
- India Daylight Time
- KnoL`/
- C:\Windows\System32\wbem\WmiPrvSE.exe
- C:\Windows\System32\ntdll.dll
- C:\Windows\System32\kernel32.dll
- C:\Windows\System32\KERNELBASE.dll
- C:\Windows\System32\advapi32.dll
- C:\Windows\System32\msvcrt.dll
- C:\Windows\System32\sechost.dll
- C:\Windows\System32\rpcrt4.dll
- C:\Windows\System32\user32.dll
- C:\Windows\System32\gdi32.dll
- C:\Windows\System32\lpk.dll
- C:\Windows\System32\usp10.dll
- C:\Windows\System32\wbemcomn.dll
- C:\Windows\System32\oleaut32.dll
- C:\Windows\System32\ole32.dll
- C:\Windows\System32\ws2_32.dll
- C:\Windows\System32\nsi.dll
- C:\Windows\System32\wbem\fastprox.dll
- C:\Windows\System32\ntdsapi.dll
- C:\Windows\System32\ncobjapi.dll
- C:\Windows\System32\imm32.dll
- C:\Windows\System32\msctf.dll
- C:\Windows\System32\CRYPTBASE.dll
- C:\Windows\System32\ntmarta.dll
- C:\Windows\System32\Wldap32.dll
- C:\Windows\System32\clbcatq.dll
- C:\Windows\System32\cryptsp.dll
- C:\Windows\System32\rsaenh.dll
- C:\Windows\System32\RpcRtRemote.dll
- C:\Windows\System32\wbem\wbemsvc.dll
- C:\Windows\System32\wbem\wmiutils.dll
- C:\Windows\System32\wbem\cimwin32.dll
- C:\Windows\System32\framedynos.dll
- C:\Windows\System32\sspicli.dll
- C:\Windows\System32\wtsapi32.dll
- C:\Windows\System32\devobj.dll
- C:\Windows\System32\cfgmgr32.dll
- C:\Windows\System32\IPHLPAPI.DLL
- C:\Windows\System32\winnsi.dll
- C:\Windows\System32\dhcpcsvc.dll
- C:\Windows\System32\dhcpcsvc6.DLL
- C:\Windows\System32\winbrand.dll
- C:\Windows\System32\credssp.dll
- C:\Windows\System32\schannel.dll
- C:\Windows\System32\crypt32.dll
- C:\Windows\System32\msasn1.dll
- C:\Windows\System32\wkscli.dll
- C:\Windows\System32\cscapi.dll
- C:\Windows\System32\winsta.dll
- C:\Windows\System32\powrprof.dll
- C:\Windows\System32\setupapi.dll
- C:\Windows\System32\shell32.dll
- C:\Windows\System32\shlwapi.dll
- C:\Windows\winsxs\amd64_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7600.16661_none_fa62ad231704eab7\comctl32.dll
- C:\Windows\System32\linkinfo.dll
- C:\Windows\System32\propsys.dll
- C:\Windows\System32\version.dll
- C:\Windows\System32\apphelp.dll
- C:\Windows\System32\profapi.dll
- C:\Windows\System32\userenv.dll
- C:\Windows\System32\perfos.dll
- C:\Windows\System32\wintrust.dll
- 3++S++
- 3++S++
- 3++S++
- 3++S++
- 3++S++
- 3++S++
- 3++S++
- I\Proces 0
- 3++S++
- I\Proces 0
- 3++S++
- I\Proces 0
- 3++S++
- WmiPrvSE.pdb
- ntdll.pdb
- kernel32.pdb
- kernelbase.pdb
- advapi32.pdb
- msvcrt.pdb
- sechost.pdb
- RSDSE!JH
- rpcrt4.pdb
- user32.pdb
- gdi32.pdb
- lpk.pdb
- usp10.pdb
- Rr>nr@
- wbemcomn.pdb
- oleaut32.pdb
- ole32.pdb
- ws2_32.pdb
- RSDS=k
- nsi.pdb
- fastprox.pdb
- ntdsapi.pdb
- NCObjAPI.pdb
- imm32.pdb
- msctf.pdb
- cryptbase.pdb
- ntmarta.pdb
- wldap32.pdb
- CLBCatQ.pdb
- cryptsp.pdb
- rsaenh.pdb
- RpcRtRemote.pdb
- wbemsvc.pdb
- wmiutils.pdb
- cimwin32.pdb
- RSDSO9
- framedynos.pdb
- sspicli.pdb
- wtsapi32.pdb
- devobj.pdb
- cfgmgr32.pdb
- iphlpapi.pdb
- winnsi.pdb
- dhcpcsvc.pdb
- dhcpcsvc6.pdb
- winbrand.pdb
- credssp.pdb
- schannel.pdb
- crypt32.pdb
- msasn1.pdb
- wkscli.pdb
- cscapi.pdb
- winsta.pdb
- powrprof.pdb
- setupapi.pdb
- shell32.pdb
- shlwapi.pdb
- comctl32.pdb
- linkinfo.pdb
- propsys.pdb
- version.pdb
- apphelp.pdb
- profapi.pdb
- userenv.pdb
- perfos.pdb
- wintrust.pdb
- *** procdump.exe -64 -c 15 -s 1 4336 WmiPrvSE2.dmp
- *** Process exceeded 15% CPU for 1 second. Thread consuming CPU: 9848 (0x2678)
- .?AVexception@@
- .?AVbad_alloc@std@@
- .?AVlogic_error@std@@
- .?AVlength_error@std@@
- .?AVout_of_range@std@@
- wmiprvse.exe
- C:\Windows\system32\
- .?AVCX_Exception@@
- .?AVCX_MemoryException@@
- .?AVexception@@
- .?AVlogic_error@std@@
- .?AVlength_error@std@@
- .?AVout_of_range@std@@
- .?AVSafeIntException@@
- .?AVbad_alloc@std@@
- NT AUTHORITY
- certificate
- Schannel
- C:\Windows\Registration
- C:\Windows\system32\emptyregdb.dat
- C:\Windows\Registration
- .?AUISimpleTableControl@@
- .?AUISimpleTableRead@@
- .?AUISimpleTableWrite@@
- .?AUISimpleLogicTableDispenser@@
- .?AUIUnknown@@
- .?AUIClassFactory@@
- .?AVCLTBase@@
- .?AVCSLTComsClient@@
- .?AVCSLTComs@@
- SOFTWARE\Classes\CLSID
- InprocServer32
- ThreadingModel
- .?AUISimpleTableMarshall@@
- .?AVCSimpleDataTableCursor@@
- .?AVCSLTShapeless@@
- .?AVCNonFailFastingAllocator@@
- .?AV?$EnumMap@U_GUID@@HVHashGUID@@VCNonFailFastingAllocator@@@@
- .?AVEnum@@
- 0123456789abcdef
- C:\Windows\system32\WBEM\Logs\
- .?AVCX_Exception@@
- .?AVCX_MemoryException@@
- .?AVComException@@
- .?AVSafeIntException@@
- .?AVCX_VarVectorException@@
- .?AVexception@@
- .?AVlogic_error@std@@
- .?AVlength_error@std@@
- .?AVout_of_range@std@@
- .?AVbad_alloc@std@@
- .?AV_com_error@@
- .?AVCCscNetApiInterface@@
- .?AVCCscNetApiInterfaceV1@@
- dwmapi.dll
- dxgi.dll
- dwmapi.dll
- dxgi.dll
- dwmapi.dll
- NETAPI32.DLL
- DSROLE.DLL
- SCHEDCLI.DLL
- BROWCLI.DLL
- LOGONCLI.DLL
- netutils.dll
- srvcli.dll
- SAMCLI.DLL
- netutils.dll
- shdocvw.dll
- dxgi.dll
- y(~~r'
- lA<>6+A
- .~~r'2`|%:
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement