Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- CommandLine: "C:\totalcmd\TOTALCMD64.EXE"
- Symbol search path is: symsrv*symsrv.dll*c:\symbols*http://msdl.microsoft.com/download/symbols
- Executable search path is:
- ModLoad: 00000000`00400000 00000000`00c00000 image00000000`00400000
- ModLoad: 00000000`77650000 00000000`777f9000 ntdll.dll
- ModLoad: 00000000`77530000 00000000`7764f000 C:\Windows\system32\kernel32.dll
- ModLoad: 000007fe`fdc20000 000007fe`fdc8c000 C:\Windows\system32\KERNELBASE.dll
- ModLoad: 000007fe`fe7d0000 000007fe`fe8ab000 C:\Windows\system32\advapi32.dll
- ModLoad: 000007fe`fea70000 000007fe`feb0f000 C:\Windows\system32\msvcrt.dll
- ModLoad: 000007fe`fe710000 000007fe`fe72f000 C:\Windows\SYSTEM32\sechost.dll
- ModLoad: 000007fe`fe190000 000007fe`fe2bd000 C:\Windows\system32\RPCRT4.dll
- ModLoad: 000007fe`fc550000 000007fe`fc744000 C:\Windows\WinSxS\amd64_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_fa396087175ac9ac\comctl32.dll
- ModLoad: 000007fe`fe6a0000 000007fe`fe707000 C:\Windows\system32\GDI32.dll
- ModLoad: 00000000`77430000 00000000`7752a000 C:\Windows\system32\USER32.dll
- ModLoad: 000007fe`fe8b0000 000007fe`fe8be000 C:\Windows\system32\LPK.dll
- ModLoad: 000007fe`fe8c0000 000007fe`fe989000 C:\Windows\system32\USP10.dll
- ModLoad: 000007fe`fdeb0000 000007fe`fdf21000 C:\Windows\system32\SHLWAPI.dll
- ModLoad: 000007fe`fe4f0000 000007fe`fe587000 C:\Windows\system32\comdlg32.dll
- ModLoad: 000007fe`febd0000 000007fe`ff958000 C:\Windows\system32\SHELL32.dll
- ModLoad: 000007fe`fb040000 000007fe`fb058000 C:\Windows\system32\mpr.dll
- ModLoad: 000007fe`fe2c0000 000007fe`fe4c3000 C:\Windows\system32\ole32.dll
- ModLoad: 000007fe`fe990000 000007fe`fea67000 C:\Windows\system32\oleaut32.dll
- ModLoad: 000007fe`fcc10000 000007fe`fcc1c000 C:\Windows\system32\version.dll
- ModLoad: 000007fe`f83b0000 000007fe`f83eb000 C:\Windows\system32\winmm.dll
- ModLoad: 000007fe`faa90000 000007fe`fab01000 C:\Windows\system32\winspool.drv
- ModLoad: 000007fe`fde80000 000007fe`fdeae000 C:\Windows\system32\IMM32.DLL
- ModLoad: 000007fe`fe590000 000007fe`fe699000 C:\Windows\system32\MSCTF.dll
- ModLoad: 000007fe`fc240000 000007fe`fc296000 C:\Windows\system32\uxtheme.dll
- ModLoad: 000007fe`f4670000 000007fe`f4677000 C:\Windows\system32\msimg32.dll
- ModLoad: 000007fe`fd9a0000 000007fe`fd9af000 C:\Windows\system32\CRYPTBASE.dll
- ModLoad: 000007fe`f87d0000 000007fe`f8870000 C:\Windows\WinSxS\amd64_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_a4d6a923711520a9\comctl32.dll
- ModLoad: 000007fe`fe730000 000007fe`fe7c9000 C:\Windows\system32\CLBCatQ.DLL
- ModLoad: 000007fe`fc320000 000007fe`fc44c000 C:\Windows\system32\propsys.dll
- ModLoad: 000007fe`fbcb0000 000007fe`fbcdd000 C:\Windows\system32\ntmarta.dll
- ModLoad: 000007fe`feb20000 000007fe`feb72000 C:\Windows\system32\WLDAP32.dll
- ModLoad: 000007fe`fdab0000 000007fe`fdabf000 C:\Windows\system32\profapi.dll
- ModLoad: 000007fe`fbce0000 000007fe`fbe0a000 C:\Windows\system32\WindowsCodecs.dll
- ModLoad: 000007fe`fd940000 000007fe`fd997000 C:\Windows\system32\apphelp.dll
- ModLoad: 000007fe`f9ec0000 000007fe`f9ef5000 C:\Windows\system32\EhStorShell.dll
- ModLoad: 000007fe`fdfb0000 000007fe`fe187000 C:\Windows\system32\SETUPAPI.dll
- ModLoad: 000007fe`fdc90000 000007fe`fdcc6000 C:\Windows\system32\CFGMGR32.dll
- ModLoad: 000007fe`fdb60000 000007fe`fdb7a000 C:\Windows\system32\DEVOBJ.dll
- ModLoad: 000007fe`f9df0000 000007fe`f9e70000 C:\Windows\system32\ntshrui.dll
- ModLoad: 000007fe`fd6a0000 000007fe`fd6c3000 C:\Windows\system32\srvcli.dll
- ModLoad: 000007fe`f9c50000 000007fe`f9c5f000 C:\Windows\system32\cscapi.dll
- ModLoad: 000007fe`fbab0000 000007fe`fbabb000 C:\Windows\system32\slc.dll
- ModLoad: 000007fe`fbe50000 000007fe`fbe68000 C:\Windows\system32\dwmapi.dll
- ModLoad: 000007fe`f8870000 000007fe`f890c000 C:\Windows\system32\mscms.dll
- ModLoad: 000007fe`fce00000 000007fe`fce1e000 C:\Windows\system32\USERENV.dll
- ModLoad: 000007fe`fc760000 000007fe`fc76a000 C:\Windows\System32\drprov.dll
- ModLoad: 000007fe`fda50000 000007fe`fda8d000 C:\Windows\System32\WINSTA.dll
- ModLoad: 000007fe`f8280000 000007fe`f82a2000 C:\Windows\System32\ntlanman.dll
- ModLoad: 000007fe`f8460000 000007fe`f847c000 C:\Windows\System32\davclnt.dll
- ModLoad: 000007fe`fc770000 000007fe`fc77a000 C:\Windows\System32\DAVHLPR.dll
- ModLoad: 000007fe`f85d0000 000007fe`f864f000 C:\Program Files\Common Files\microsoft shared\ink\tiptsf.dll
- ModLoad: 000007fe`fa8c0000 000007fe`faa8a000 C:\Windows\system32\explorerframe.dll
- ModLoad: 000007fe`fbeb0000 000007fe`fbef3000 C:\Windows\system32\DUser.dll
- ModLoad: 000007fe`fbf00000 000007fe`fbff2000 C:\Windows\system32\DUI70.dll
- ModLoad: 00000000`ff280000 00000000`ff2b5000 notepad.exe
- (a8c.a90): Access violation - code c0000005 (first chance)
- First chance exceptions are reported before any exception handling.
- This exception may be expected and handled.
- *** WARNING: Unable to verify timestamp for image00000000`00400000
- *** ERROR: Module load completed but symbols could not be loaded for image00000000`00400000
- image00000000_00400000+0x22034:
- 00000000`00422034 ac lods byte ptr [rsi] ds:00000000`898cc6ae=??
- 0:000> kv
- Child-SP RetAddr : Args to Child : Call Site
- 00000000`01bfcae8 00000000`09847540 : 00000000`09847501 00000000`00000000 00000000`01bfcab0 00000000`09855cc0 : image00000000_00400000+0x22034
- 00000000`01bfcaf0 00000000`09847501 : 00000000`00000000 00000000`01bfcab0 00000000`09855cc0 00000000`000003ff : 0x9847540
- 00000000`01bfcaf8 00000000`00000000 : 00000000`01bfcab0 00000000`09855cc0 00000000`000003ff 00000000`01bfcd20 : 0x9847501
- 0:000> u
- image00000000_00400000+0x22034:
- 00000000`00422034 ac lods byte ptr [rsi]
- 00000000`00422035 38d8 cmp al,bl
- 00000000`00422037 7406 je image00000000_00400000+0x2203f (00000000`0042203f)
- 00000000`00422039 38f8 cmp al,bh
- 00000000`0042203b 7402 je image00000000_00400000+0x2203f (00000000`0042203f)
- 00000000`0042203d ebf0 jmp image00000000_00400000+0x2202f (00000000`0042202f)
- 00000000`0042203f ffc6 inc esi
- 00000000`00422041 4889f2 mov rdx,rsi
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement