Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ************* Symbol Path validation summary **************
- Response Time (ms) Location
- Deferred SRV*http://msdl.microsoft.com/download/symbols
- Microsoft (R) Windows Debugger Version 6.3.9600.17237 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- CommandLine: C:\\Users\\David\\Downloads\\xmplay38\\xmplay.exe fuzzed.wav
- ************* Symbol Path validation summary **************
- Response Time (ms) Location
- Deferred SRV*http://msdl.microsoft.com/download/symbols
- Symbol search path is: SRV*http://msdl.microsoft.com/download/symbols
- Executable search path is:
- ModLoad: 00000000`00400000 00000000`0054b000 image00000000`00400000
- ModLoad: 00007ffe`861c0000 00007ffe`8636c000 ntdll.dll
- ModLoad: 00000000`77d50000 00000000`77ebe000 ntdll.dll
- ModLoad: 00000000`001c0000 00000000`0022c000 C:\Windows\system32\verifier.dll
- Page heap: pid 0x1570: page heap enabled with flags 0x3.
- ModLoad: 00000000`77d00000 00000000`77d4b000 C:\Windows\SYSTEM32\wow64.dll
- ModLoad: 00000000`77c80000 00000000`77ce8000 C:\Windows\system32\wow64win.dll
- ModLoad: 00000000`77cf0000 00000000`77cf9000 C:\Windows\system32\wow64cpu.dll
- ModLoad: 00000000`00230000 00000000`0036e000 WOW64_IMAGE_SECTION
- ModLoad: 00000000`77850000 00000000`77990000 WOW64_IMAGE_SECTION
- ModLoad: 00000000`00230000 00000000`0036e000 NOT_AN_IMAGE
- ModLoad: 00000000`00230000 00000000`003a7000 NOT_AN_IMAGE
- ModLoad: 00000000`54c30000 00000000`54c90000 C:\Windows\syswow64\verifier.dll
- Page heap: pid 0x1570: page heap enabled with flags 0x3.
- ModLoad: 00000000`77850000 00000000`77990000 C:\Windows\SysWOW64\KERNEL32.DLL
- ModLoad: 00000000`75570000 00000000`75647000 C:\Windows\SysWOW64\KERNELBASE.dll
- ModLoad: 00000000`776e0000 00000000`77833000 C:\Windows\SysWOW64\USER32.dll
- ModLoad: 00000000`72530000 00000000`72553000 C:\Windows\SysWOW64\WINMM.dll
- ModLoad: 00000000`76c90000 00000000`76d9e000 C:\Windows\SysWOW64\GDI32.dll
- ModLoad: 00000000`77990000 00000000`77a2b000 C:\Windows\SysWOW64\comdlg32.dll
- ModLoad: 00000000`756b0000 00000000`7572c000 C:\Windows\SysWOW64\ADVAPI32.dll
- ModLoad: 00000000`75890000 00000000`76b3c000 C:\Windows\SysWOW64\SHELL32.dll
- ModLoad: 00000000`76f20000 00000000`77048000 C:\Windows\SysWOW64\ole32.dll
- ModLoad: 00000000`72350000 00000000`72525000 C:\Windows\SysWOW64\WININET.dll
- ModLoad: 00000000`64e70000 00000000`64e87000 C:\Windows\SysWOW64\MSACM32.dll
- ModLoad: 00000000`757c0000 00000000`75883000 C:\Windows\SysWOW64\MSVCRT.dll
- ModLoad: 00000000`72090000 00000000`720b3000 C:\Windows\SysWOW64\WINMMBASE.dll
- ModLoad: 00000000`75770000 00000000`757b5000 C:\Windows\SysWOW64\SHLWAPI.dll
- ModLoad: 00000000`6f7b0000 00000000`6f9b6000 C:\Windows\WinSxS\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.9600.17415_none_a9ed7f470139b3c1\COMCTL32.dll
- ModLoad: 00000000`76ba0000 00000000`76be1000 C:\Windows\SysWOW64\sechost.dll
- ModLoad: 00000000`77a80000 00000000`77b3a000 C:\Windows\SysWOW64\RPCRT4.dll
- ModLoad: 00000000`76da0000 00000000`76f1d000 C:\Windows\SysWOW64\combase.dll
- ModLoad: 00000000`71e50000 00000000`72082000 C:\Windows\SysWOW64\iertutil.dll
- ModLoad: 00000000`72bd0000 00000000`72beb000 C:\Windows\SysWOW64\USERENV.dll
- ModLoad: 00000000`75730000 00000000`7576c000 C:\Windows\SysWOW64\cfgmgr32.dll
- ModLoad: 00000000`72db0000 00000000`72dd1000 C:\Windows\SysWOW64\DEVOBJ.dll
- ModLoad: 00000000`75550000 00000000`7556e000 C:\Windows\SysWOW64\SspiCli.dll
- ModLoad: 00000000`72c40000 00000000`72c4f000 C:\Windows\SysWOW64\profapi.dll
- ModLoad: 00000000`72c50000 00000000`72cdb000 C:\Windows\SysWOW64\SHCORE.DLL
- ModLoad: 00000000`75540000 00000000`7554a000 C:\Windows\SysWOW64\CRYPTBASE.dll
- ModLoad: 00000000`754e0000 00000000`75534000 C:\Windows\SysWOW64\bcryptPrimitives.dll
- ModLoad: 774f0000 77517000 C:\Windows\SysWOW64\IMM32.DLL
- ModLoad: 00000000`77b50000 00000000`77c62000 C:\Windows\SysWOW64\MSCTF.dll
- ModLoad: 00000000`75420000 00000000`75429000 C:\Windows\SysWOW64\kernel.appcore.dll
- ModLoad: 00000000`718b0000 00000000`7199d000 C:\Windows\SysWOW64\uxtheme.dll
- ModLoad: 00000000`76bf0000 00000000`76c85000 C:\Windows\SysWOW64\OLEAUT32.dll
- ModLoad: 00000000`77350000 00000000`773dd000 C:\Windows\SysWOW64\clbcatq.dll
- ModLoad: 00000000`77520000 00000000`776d1000 C:\Windows\SysWOW64\SETUPAPI.dll
- ModLoad: 00000000`71a70000 00000000`71baa000 C:\Windows\SysWOW64\propsys.dll
- ModLoad: 00000000`10000000 00000000`1000a000 C:\Users\David\Downloads\xmplay38\xmp-cd.dll
- ModLoad: 00000000`05100000 00000000`05107000 C:\Users\David\Downloads\xmplay38\xmp-wadsp.dll
- ModLoad: 00000000`06ed0000 00000000`06ed8000 C:\Users\David\Downloads\xmplay38\xmp-wma.dll
- ModLoad: 00000000`07de0000 00000000`07dee000 C:\Users\David\Downloads\xmplay38\xmp-zip.dll
- ModLoad: 00000000`73b00000 00000000`73b19000 C:\Windows\SysWOW64\CRYPTSP.dll
- ModLoad: 00000000`73ad0000 00000000`73b00000 C:\Windows\SysWOW64\rsaenh.dll
- ModLoad: 00000000`73ab0000 00000000`73ace000 C:\Windows\SysWOW64\bcrypt.dll
- ModLoad: 00000000`6f290000 00000000`6f2aa000 C:\Windows\SysWOW64\dwmapi.dll
- (1570.227c): Access violation - code c0000005 (first chance)
- r
- eax=08b2dc08 ebx=00000000 ecx=071acff8 edx=0000000a esi=071acfe8 edi=00000001
- eip=64e808c6 esp=08b2dce0 ebp=08b2dd0c iopl=0 nv up ei pl zr na pe nc
- cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010246
- MSACM32!ValidateReadPointer+0x15:
- 64e808c6 8a4411ff mov al,byte ptr [ecx+edx-1] ds:002b:071ad001=??
- rF
- fpcw=027F: rn 53 puozdi fpsw=4020: top=0 cc=1000 --p----- fptw=0000
- fopcode=0000 fpip=0000:004267cd fpdp=0000:004653d0
- st0= 0.000000000000000000000e+0000 st1= 0.000000000000000000000e+0000
- st2= 0.000000000000000000000e+0000 st3= 0.000000000000000000000e+0000
- st4= 0.000000000000000000000e+0000 st5= 1.600000000000000000000e+0001
- st6= 0.000000000000000000000e+0000 st7= 0.000000000000000000000e+0000
- MSACM32!ValidateReadPointer+0x15:
- 64e808c6 8a4411ff mov al,byte ptr [ecx+edx-1] ds:002b:071ad001=??
- rX
- xmm0=0 0 0 0
- xmm1=0 0 0 0
- xmm2=0 0 0 0
- xmm3=0 0 0 0
- xmm4=0 0 0 0
- xmm5=0 0 0 0
- xmm6=0 0 0 0
- xmm7=0 0 0 0
- MSACM32!ValidateReadPointer+0x15:
- 64e808c6 8a4411ff mov al,byte ptr [ecx+edx-1] ds:002b:071ad001=??
- kb
- ChildEBP RetAddr Args to Child
- 08b2dd0c 64e80986 00000000 071a2fa4 64e7a4a1 MSACM32!ValidateReadPointer+0x15
- 08b2dd18 64e7a4a1 0000000c 071acfe8 071a2f68 MSACM32!ValidateReadWaveFormat+0x45
- *** WARNING: Unable to verify checksum for image00000000`00400000
- *** ERROR: Module load completed but symbols could not be loaded for image00000000`00400000
- 08b2dde8 00419fef 071a2fa4 00000000 071acfe8 MSACM32!acmStreamOpen+0xa1
- WARNING: Stack unwind information not available. Following frames may be wrong.
- 08b2fe7c 0041aafe 07124fec 004570d0 004570d0 image00000000_00400000+0x19fef
- 08b2fe90 00426e9f 071e7fb8 004ab530 00000000 image00000000_00400000+0x1aafe
- 08b2fecc 004269d6 004ab530 00000000 0890cff8 image00000000_00400000+0x26e9f
- 08b2fef8 00425b5d 757ff4a0 0042585c 76612bf2 image00000000_00400000+0x269d6
- 00000000 00000000 00000000 00000000 00000000 image00000000_00400000+0x25b5d
- .load C:\Users\David\Downloads\peach-3.0.202-win-x64-release\Debuggers\DebugEngine\msec64.dll
- !exploitable -m
- IDENTITY:HostMachine\HostUser
- PROCESSOR:X86
- CLASS:USER
- QUALIFIER:USER_PROCESS
- EVENT:DEBUG_EVENT_EXCEPTION
- EXCEPTION_FAULTING_ADDRESS:0x71ad001
- EXCEPTION_CODE:0xC0000005
- EXCEPTION_LEVEL:FIRST_CHANCE
- EXCEPTION_TYPE:STATUS_ACCESS_VIOLATION
- EXCEPTION_SUBTYPE:READ
- FAULTING_INSTRUCTION:64e808c6 mov al,byte ptr [ecx+edx-1]
- BASIC_BLOCK_INSTRUCTION_COUNT:6
- BASIC_BLOCK_INSTRUCTION:64e808c6 mov al,byte ptr [ecx+edx-1]
- BASIC_BLOCK_INSTRUCTION_TAINTED_INPUT_OPERAND:ecx
- BASIC_BLOCK_INSTRUCTION_TAINTED_INPUT_OPERAND:edx
- BASIC_BLOCK_INSTRUCTION:64e808ca mov byte ptr [ebp-19h],al
- BASIC_BLOCK_INSTRUCTION_TAINTED_INPUT_OPERAND:al
- BASIC_BLOCK_INSTRUCTION:64e808cd mov dword ptr [ebp-4],0fffffffeh
- BASIC_BLOCK_INSTRUCTION:64e808d4 xor eax,eax
- BASIC_BLOCK_INSTRUCTION:64e808d6 inc eax
- BASIC_BLOCK_INSTRUCTION:64e808d7 jmp msacm32!validatereadpointer+0x38 (64e808e9)
- MAJOR_HASH:0x2a444267
- MINOR_HASH:0x62035a23
- STACK_DEPTH:8
- STACK_FRAME:MSACM32!ValidateReadPointer+0x15
- STACK_FRAME:MSACM32!ValidateReadWaveFormat+0x45
- STACK_FRAME:MSACM32!acmStreamOpen+0xa1
- STACK_FRAME:image00000000_00400000+0x19fef
- STACK_FRAME:image00000000_00400000+0x1aafe
- STACK_FRAME:image00000000_00400000+0x26e9f
- STACK_FRAME:image00000000_00400000+0x269d6
- STACK_FRAME:image00000000_00400000+0x25b5d
- INSTRUCTION_ADDRESS:0x0000000064e808c6
- INVOKING_STACK_FRAME:0
- DESCRIPTION:Read Access Violation
- SHORT_DESCRIPTION:ReadAV
- CLASSIFICATION:UNKNOWN
- BUG_TITLE:Read Access Violation starting at MSACM32!ValidateReadPointer+0x0000000000000015 (Hash=0x2a444267.0x62035a23)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement