Guest User

Untitled

a guest
Jun 14th, 2015
336
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. 1806.504:0009:trace:virtual:VIRTUAL_DumpView 0x7e3d1000 - 0x7e3f2fff c-r-x
  2. 1806.504:0009:trace:virtual:VIRTUAL_DumpView 0x7e3f3000 - 0x7e3f3fff c-rw-
  3. 1806.504:0009:trace:virtual:VIRTUAL_DumpView 0x7e3f4000 - 0x7e3f4fff c-rW-
  4. 1806.504:0009:trace:virtual:VIRTUAL_DumpView 0x7e3f5000 - 0x7e3f5fff c-rw-
  5. 1806.504:0009:trace:imports:import_dll --- CloseHandle kernel32.dll.172 = 0x7b85c800
  6. 1806.504:0009:trace:imports:import_dll --- CopyFileW kernel32.dll.195 = 0x7b858460
  7. 1806.504:0009:trace:imports:import_dll --- CreateDirectoryW kernel32.dll.203 = 0x7b859620
  8. 1806.504:0009:trace:imports:import_dll --- CreateFileW kernel32.dll.213 = 0x7b83cd30
  9. 1806.504:0009:trace:imports:import_dll --- DelayLoadFailureHook kernel32.dll.257 = 0x7b854e50
  10. 1806.504:0009:trace:imports:import_dll --- DeleteFileW kernel32.dll.262 = 0x7b83d640
  11. 1806.504:0009:trace:imports:import_dll --- DisableThreadLibraryCalls kernel32.dll.269 = 0x7b8534d0
  12. 1806.504:0009:trace:imports:import_dll --- FileTimeToSystemTime kernel32.dll.340 = 0x7b873dd0
  13. 1806.504:0009:trace:imports:import_dll --- FindClose kernel32.dll.349 = 0x7b83e640
  14. 1806.504:0009:trace:imports:import_dll --- FindFirstFileW kernel32.dll.356 = 0x7b83f100
  15. 1806.504:0009:trace:imports:import_dll --- FindNextFileW kernel32.dll.363 = 0x7b83dfa0
  16. 1806.504:0009:trace:imports:import_dll --- FreeLibrary kernel32.dll.391 = 0x7b854ce0
  17. 1806.504:0009:trace:imports:import_dll --- GetDateFormatA kernel32.dll.471 = 0x7b845fb0
  18. 1806.504:0009:trace:imports:import_dll --- GetFileSize kernel32.dll.503 = 0x7b83c2a0
  19. 1806.504:0009:trace:imports:import_dll --- GetFileSizeEx kernel32.dll.504 = 0x7b83c210
  20. 1806.504:0009:trace:imports:import_dll --- GetFileTime kernel32.dll.505 = 0x7b83c810
  21. 1806.504:0009:trace:imports:import_dll --- GetLocaleInfoA kernel32.dll.519 = 0x7b84c970
  22. 1806.504:0009:trace:imports:import_dll --- GetProcAddress kernel32.dll.563 = 0x7b854d90
  23. 1806.504:0009:trace:imports:import_dll --- GetSystemDirectoryW kernel32.dll.603 = 0x7b85a130
  24. 1806.504:0009:trace:imports:import_dll --- GetSystemTime kernel32.dll.607 = 0x7b874710
  25. 1806.504:0009:trace:imports:import_dll --- HeapAlloc kernel32.dll.684 = 0x7bc48560
  26. 1806.504:0009:trace:imports:import_dll --- HeapFree kernel32.dll.690 = 0x7bc47c50
  27. 1806.504:0009:trace:imports:import_dll --- HeapReAlloc kernel32.dll.694 = 0x7bc48910
  28. 1806.504:0009:trace:imports:import_dll --- LoadLibraryA kernel32.dll.790 = 0x7b854c40
  29. 1806.504:0009:trace:imports:import_dll --- LoadLibraryW kernel32.dll.793 = 0x7b854c90
  30. 1806.504:0009:trace:imports:import_dll --- LocalFree kernel32.dll.800 = 0x7b843a10
  31. 1806.504:0009:trace:imports:import_dll --- MultiByteToWideChar kernel32.dll.834 = 0x7b84c160
  32. 1806.504:0009:trace:imports:import_dll --- RaiseException kernel32.dll.893 = 0x7b839650
  33. 1806.504:0009:trace:imports:import_dll --- ReadFile kernel32.dll.906 = 0x7b83b4e0
  34. 1806.504:0009:trace:imports:import_dll --- RtlUnwind kernel32.dll.981 = 0x7bc72dfc
  35. 1806.504:0009:trace:imports:import_dll --- SetFileAttributesW kernel32.dll.1065 = 0x7b83f3d0
  36. 1806.504:0009:trace:imports:import_dll --- SetFilePointer kernel32.dll.1067 = 0x7b83c680
  37. 1806.504:0009:trace:imports:import_dll --- SystemTimeToFileTime kernel32.dll.1126 = 0x7b874160
  38. 1806.504:0009:trace:virtual:NtProtectVirtualMemory 0xffffffff 0x7e3f4000 00001000 00000008
  39. 1806.504:0009:trace:virtual:VIRTUAL_SetProt 0x7e3f4000-0x7e3f4fff c-rW-
  40. 1806.504:0009:trace:virtual:VIRTUAL_DumpView View: 0x7e3d0000 - 0x7e3f5fff (system)
  41. 1806.504:0009:trace:virtual:VIRTUAL_DumpView 0x7e3d0000 - 0x7e3d0fff c-r--
  42. 1806.504:0009:trace:virtual:VIRTUAL_DumpView 0x7e3d1000 - 0x7e3f2fff c-r-x
  43. 1806.504:0009:trace:virtual:VIRTUAL_DumpView 0x7e3f3000 - 0x7e3f3fff c-rw-
  44. 1806.504:0009:trace:virtual:VIRTUAL_DumpView 0x7e3f4000 - 0x7e3f4fff c-rW-
  45. 1806.504:0009:trace:virtual:VIRTUAL_DumpView 0x7e3f5000 - 0x7e3f5fff c-rw-
  46. 1806.504:0009:trace:module:load_dll looking for L"ntdll.dll" in L"Z:\\home\\yozz\\\0414\043e\043a\0443\043c\0435\043d\0442\044b;.;C:\\windows\\system32;C:\\windows\\system;C:\\windows;"
  47. 1806.504:0009:trace:module:load_dll Found L"C:\\windows\\system32\\ntdll.dll" for L"ntdll.dll" at 0x7bc10000, count=11
  48. 1806.504:0009:trace:virtual:NtProtectVirtualMemory 0xffffffff 0x7e3f4560 00000008 00000004
  49. 1806.504:0009:trace:virtual:VIRTUAL_SetProt 0x7e3f4000-0x7e3f4fff c-rW-
  50. 1806.504:0009:trace:virtual:VIRTUAL_DumpView View: 0x7e3d0000 - 0x7e3f5fff (system)
  51. 1806.504:0009:trace:virtual:VIRTUAL_DumpView 0x7e3d0000 - 0x7e3d0fff c-r--
  52. 1806.504:0009:trace:virtual:VIRTUAL_DumpView 0x7e3d1000 - 0x7e3f2fff c-r-x
  53. 1806.504:0009:trace:virtual:VIRTUAL_DumpView 0x7e3f3000 - 0x7e3f3fff c-rw-
  54. 1806.504:0009:trace:virtual:VIRTUAL_DumpView 0x7e3f4000 - 0x7e3f4fff c-rW-
  55. 1806.504:0009:trace:virtual:VIRTUAL_DumpView 0x7e3f5000 - 0x7e3f5fff c-rw-
  56. 1806.504:0009:trace:imports:import_dll --- RtlGUIDFromString ntdll.dll.486 = 0x7bc6a640
  57. 1806.504:0009:trace:imports:import_dll --- RtlInitUnicodeString ntdll.dll.525 = 0x7bc67f70
  58. 1806.504:0009:trace:virtual:NtProtectVirtualMemory 0xffffffff 0x7e3f4000 00001000 00000008
  59. 1806.504:0009:trace:virtual:VIRTUAL_SetProt 0x7e3f4000-0x7e3f4fff c-rW-
  60. 1806.504:0009:trace:virtual:VIRTUAL_DumpView View: 0x7e3d0000 - 0x7e3f5fff (system)
  61. 1806.504:0009:trace:virtual:VIRTUAL_DumpView 0x7e3d0000 - 0x7e3d0fff c-r--
  62. 1806.504:0009:trace:virtual:VIRTUAL_DumpView 0x7e3d1000 - 0x7e3f2fff c-r-x
  63. 1806.504:0009:trace:virtual:VIRTUAL_DumpView 0x7e3f3000 - 0x7e3f3fff c-rw-
  64. 1806.504:0009:trace:virtual:VIRTUAL_DumpView 0x7e3f4000 - 0x7e3f4fff c-rW-
  65. 1806.504:0009:trace:virtual:VIRTUAL_DumpView 0x7e3f5000 - 0x7e3f5fff c-rw-
  66. 1806.504:0009:trace:module:load_builtin_callback loaded wintrust.dll 0x1216a8 0x7e3d0000
  67. 0009: load_dll( mapping=0000, base=7e3d0000, name=001216d0, size=155648, dbg_offset=0, dbg_size=0, filename=L"C:\\windows\\system32\\wintrust.dll" )
  68. 0009: load_dll() = 0
  69. 1806.504:0009:trace:loaddll:load_builtin_dll Loaded L"C:\\windows\\system32\\wintrust.dll" at 0x7e3d0000: builtin
  70. 1806.504:0009:trace:module:load_dll Loaded module L"C:\\windows\\system32\\WINTRUST.dll" (builtin) at 0x7e3d0000
  71. 1806.504:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x1209e0): returning TRUE
  72. 1806.504:0009:trace:virtual:NtProtectVirtualMemory 0xffffffff 0x4bd4c0 00000004 00000004
  73. 1806.505:0009:trace:virtual:VIRTUAL_SetProt 0x4bd000-0x4bdfff c-rW-
  74. 1806.505:0009:trace:virtual:VIRTUAL_DumpView View: 0x400000 - 0x1e4afff 0x18
  75. 1806.505:0009:trace:virtual:VIRTUAL_DumpView 0x400000 - 0x400fff c-r--
  76. 1806.505:0009:trace:virtual:VIRTUAL_DumpView 0x401000 - 0x4bcfff c-r-x
  77. 1806.505:0009:trace:virtual:VIRTUAL_DumpView 0x4bd000 - 0x4bdfff c-rW-
  78. 1806.505:0009:trace:virtual:VIRTUAL_DumpView 0x4be000 - 0x553fff c-r--
  79. 1806.505:0009:trace:virtual:VIRTUAL_DumpView 0x554000 - 0x55efff c-rW-
  80. 1806.505:0009:trace:virtual:VIRTUAL_DumpView 0x55f000 - 0x1e4afff c-r--
  81. 1806.505:0009:trace:imports:import_dll --- WinVerifyTrust WINTRUST.dll.115 = 0x7e3e7ce0
  82. 1806.505:0009:trace:virtual:NtProtectVirtualMemory 0xffffffff 0x4bd000 00001000 00000002
  83. 1806.505:0009:trace:virtual:VIRTUAL_SetProt 0x4bd000-0x4bdfff c-r--
  84. 1806.505:0009:trace:virtual:VIRTUAL_DumpView View: 0x400000 - 0x1e4afff 0x18
  85. 1806.505:0009:trace:virtual:VIRTUAL_DumpView 0x400000 - 0x400fff c-r--
  86. 1806.505:0009:trace:virtual:VIRTUAL_DumpView 0x401000 - 0x4bcfff c-r-x
  87. 1806.505:0009:trace:virtual:VIRTUAL_DumpView 0x4bd000 - 0x553fff c-r--
  88. 1806.505:0009:trace:virtual:VIRTUAL_DumpView 0x554000 - 0x55efff c-rW-
  89. 1806.505:0009:trace:virtual:VIRTUAL_DumpView 0x55f000 - 0x1e4afff c-r--
  90. 1806.505:0009:trace:module:load_dll looking for L"WINHTTP.dll" in L"Z:\\home\\yozz\\\0414\043e\043a\0443\043c\0435\043d\0442\044b;.;C:\\windows\\system32;C:\\windows\\system;C:\\windows;"
  91. 1806.505:0009:trace:actctx:RtlFindActivationContextSectionString 00000001 (null) 2 L"WINHTTP.dll" 0xfffd7ddc
  92. 1806.505:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,00000046): returning 0x122048
  93. 1806.505:0009:trace:file:RtlDosPathNameToNtPathName_U (L"Z:\\home\\yozz\\\0414\043e\043a\0443\043c\0435\043d\0442\044b\\WINHTTP.dll",0xfffd7c80,(nil),(nil))
  94. 1806.505:0009:trace:file:RtlGetFullPathName_U (L"Z:\\home\\yozz\\\0414\043e\043a\0443\043c\0435\043d\0442\044b\\WINHTTP.dll" 520 0xfffd7a34 (nil))
  95. 1806.505:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,00000056): returning 0x1220a0
  96. 1806.505:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,00000145): returning 0x122108
  97. 1806.505:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,00000048): returning 0x122260
  98. 1806.505:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x122260): returning TRUE
  99. 1806.505:0009:trace:file:wine_nt_to_unix_file_name L"\\home\\yozz\\\0414\043e\043a\0443\043c\0435\043d\0442\044b\\WINHTTP.dll" not found in /root/.wine/dosdevices/z:/home/yozz/Документы
  100. 1806.505:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x122108): returning TRUE
  101. 1806.505:0009:warn:ntdll:NtQueryAttributesFile L"\\??\\Z:\\home\\yozz\\\0414\043e\043a\0443\043c\0435\043d\0442\044b\\WINHTTP.dll" not found (c0000034)
  102. 1806.506:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x1220a0): returning TRUE
  103. 1806.506:0009:trace:file:RtlDosPathNameToNtPathName_U (L".\\WINHTTP.dll",0xfffd7c80,(nil),(nil))
  104. 1806.506:0009:trace:file:RtlGetFullPathName_U (L".\\WINHTTP.dll" 520 0xfffd7a34 (nil))
  105. 1806.506:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,0000003e): returning 0x1222b8
  106. 1806.506:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,00000130): returning 0x122308
  107. 1806.506:0009:trace:file:wine_nt_to_unix_file_name L"\\var\\log\\WINHTTP.dll" not found in /root/.wine/dosdevices/z:/var/log
  108. 1806.506:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x122308): returning TRUE
  109. 1806.506:0009:warn:ntdll:NtQueryAttributesFile L"\\??\\Z:\\var\\log\\WINHTTP.dll" not found (c0000034)
  110. 1806.506:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x1222b8): returning TRUE
  111. 1806.506:0009:trace:file:RtlDosPathNameToNtPathName_U (L"C:\\windows\\system32\\WINHTTP.dll",0xfffd7c80,(nil),(nil))
  112. 1806.506:0009:trace:file:RtlGetFullPathName_U (L"C:\\windows\\system32\\WINHTTP.dll" 520 0xfffd7a34 (nil))
  113. 1806.506:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,00000050): returning 0x122448
  114. 1806.506:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,00000139): returning 0x1224a8
  115. 1806.506:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,00000050): returning 0x1225f8
  116. 1806.506:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x1225f8): returning TRUE
  117. 1806.506:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,0000004c): returning 0x122658
  118. 1806.506:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x122658): returning TRUE
  119. 1806.507:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,0000004e): returning 0x1226b8
  120. 1806.507:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x1226b8): returning TRUE
  121. 1806.507:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,00000050): returning 0x122718
  122. 1806.507:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x122718): returning TRUE
  123. 1806.507:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,00000046): returning 0x122778
  124. 1806.507:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x122778): returning TRUE
  125. 1806.507:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,0000004c): returning 0x1227d0
  126. 1806.507:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x1227d0): returning TRUE
  127. 1806.507:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,0000004e): returning 0x122830
  128. 1806.507:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x122830): returning TRUE
  129. 1806.507:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,0000004e): returning 0x122890
  130. 1806.507:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x122890): returning TRUE
  131. 1806.507:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,0000004a): returning 0x1228f0
  132. 1806.507:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x1228f0): returning TRUE
  133. 1806.508:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,00000052): returning 0x122950
  134. 1806.508:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x122950): returning TRUE
  135. 1806.508:0009:trace:file:wine_nt_to_unix_file_name L"\\??\\C:\\windows\\system32\\WINHTTP.dll" -> "/root/.wine/dosdevices/c:/windows/system32/winhttp.dll"
  136. 1806.508:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x1224a8): returning TRUE
  137. 1806.508:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x122448): returning TRUE
  138. 1806.508:0009:trace:file:RtlGetFullPathName_U (L"C:\\windows\\system32\\WINHTTP.dll" 64 0xfffd7e96 0xfffd7dc8)
  139. 1806.508:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x122048): returning TRUE
  140. 1806.508:0009:trace:file:RtlDosPathNameToNtPathName_U (L"C:\\windows\\system32\\WINHTTP.dll",0xfffd7dcc,(nil),(nil))
  141. 1806.508:0009:trace:file:RtlGetFullPathName_U (L"C:\\windows\\system32\\WINHTTP.dll" 520 0xfffd7b44 (nil))
  142. 1806.508:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,00000050): returning 0x1229b8
  143. 1806.508:0009:trace:ntdll:FILE_CreateFile handle=0xfffd7e7c access=80000000 name=L"\\??\\C:\\windows\\system32\\WINHTTP.dll" objattr=00000040 root=(nil) sec=(nil) io=0xfffd7dd4 alloc_size=(nil) attr=00000000 sharing=00000005 disp=1 options=00000000 ea=(nil).0x00000000
  144. 1806.508:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,00000139): returning 0x122a18
  145. 1806.508:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,00000050): returning 0x122b68
  146. 1806.508:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x122b68): returning TRUE
  147. 1806.508:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,0000004c): returning 0x122bc8
  148. 1806.508:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x122bc8): returning TRUE
  149. 1806.509:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,0000004e): returning 0x122c28
  150. 1806.509:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x122c28): returning TRUE
  151. 1806.509:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,00000050): returning 0x122c88
  152. 1806.509:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x122c88): returning TRUE
  153. 1806.509:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,00000046): returning 0x122ce8
  154. 1806.509:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x122ce8): returning TRUE
  155. 1806.509:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,0000004c): returning 0x122d40
  156. 1806.509:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x122d40): returning TRUE
  157. 1806.509:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,0000004e): returning 0x122da0
  158. 1806.509:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x122da0): returning TRUE
  159. 1806.509:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,0000004e): returning 0x122e00
  160. 1806.509:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x122e00): returning TRUE
  161. 1806.509:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,0000004a): returning 0x122e60
  162. 1806.509:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x122e60): returning TRUE
  163. 1806.510:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,00000052): returning 0x122ec0
  164. 1806.510:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x122ec0): returning TRUE
  165. 1806.510:0009:trace:file:wine_nt_to_unix_file_name L"\\??\\C:\\windows\\system32\\WINHTTP.dll" -> "/root/.wine/dosdevices/c:/windows/system32/winhttp.dll"
  166. 0009: create_file( access=80000000, attributes=00000040, sharing=00000005, create=1, options=00000000, attrs=00000000, objattr={rootdir=0000,sd={},name=L""}, filename="/root/.wine/dosdevices/c:/windows/system32/winhttp.dll" )
  167. 0009: create_file() = 0 { handle=0010 }
  168. 1806.510:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x122a18): returning TRUE
  169. 1806.510:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x1229b8): returning TRUE
  170. 1806.510:0009:trace:module:get_load_order looking for L"C:\\windows\\system32\\WINHTTP.dll"
  171. 1806.510:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,0000001a): returning 0x122f28
  172. 1806.510:0009:trace:module:get_load_order got hardcoded default for L"WINHTTP.dll"
  173. 1806.510:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x122f28): returning TRUE
  174. 1806.510:0009:trace:ntdll:NtReadFile (0x10,(nil),(nil),(nil),0xfffd7e8c,0xfffd7ed7,0x00000055,0xfffd7e80,(nil)),partial stub!
  175. 0009: get_handle_fd( handle=0010 )
  176. 0009: *fd* 0010 -> 23
  177. 0009: get_handle_fd() = 0 { type=1, cacheable=1, access=00120089, options=00000000 }
  178. 1806.510:0009:trace:ntdll:NtReadFile = SUCCESS (85)
  179. 1806.510:0009:trace:module:load_dll L"C:\\windows\\system32\\WINHTTP.dll" is a fake Wine dll
  180. 0009: close_handle( handle=0010 )
  181. 0009: close_handle() = 0
  182. 1806.510:0009:trace:module:load_builtin_dll Trying built-in L"WINHTTP.dll"
  183. 1806.512:0009:trace:heap:RtlAllocateHeap (0xffbb0000,70000061,00000054): returning 0xffbb3400
  184. 1806.512:0009:trace:virtual:VIRTUAL_DumpView View: 0x7e2c0000 - 0x7e2f4fff (system)
  185. 1806.512:0009:trace:virtual:VIRTUAL_DumpView 0x7e2c0000 - 0x7e2f4fff c-rWx
  186. 1806.512:0009:trace:virtual:virtual_create_builtin_view created 0x7e2c0000-0x7e2f5000
  187. 1806.512:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,00000040): returning 0x122f58
  188. 1806.513:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,00000054): returning 0x122fa8
  189. 1806.513:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,00000040): returning 0x123010
  190. 1806.513:0009:trace:heap:RtlFreeHeap (0x110000,70000062,0x122f58): returning TRUE
  191. 1806.513:0009:trace:resource:LdrFindResource_U module 0x7e2c0000 type #0018 name #0002 lang 0000 level 3
  192. 1806.513:0009:trace:resource:find_entry_by_id root 0x7e2f0e9c dir 0x7e2f0e9c id 0018 not found
  193. 1806.513:0009:trace:heap:RtlAllocateHeap (0x110000,70000062,0000000c): returning 0x123060
  194. 1806.513:0009:trace:module:load_dll looking for L"user32.dll" in L"Z:\\home\\yozz\\\0414\043e\043a\0443\043c\0435\043d\0442\044b;.;C:\\windows\\system32;C:\\windows\\system;C:\\windows;"
  195. 1806.513:0009:trace:module:load_dll Found L"C:\\windows\\system32\\user32.dll" for L"user32.dll" at 0x7ecc0000, count=11
  196. 1806.513:0009:trace:virtual:NtProtectVirtualMemory 0xffffffff 0x7e2f0634 00000010 00000004
  197. 1806.513:0009:trace:virtual:VIRTUAL_SetProt 0x7e2f0000-0x7e2f0fff c-rW-
  198. 1806.513:0009:trace:virtual:VIRTUAL_DumpView View: 0x7e2c0000 - 0x7e2f4fff (system)
  199. 1806.513:0009:trace:virtual:VIRTUAL_DumpView 0x7e2c0000 - 0x7e2c0fff c-r--
  200. 1806.513:0009:trace:virtual:VIRTUAL_DumpView 0x7e2c1000 - 0x7e2effff c-r-x
  201. 1806.513:0009:trace:virtual:VIRTUAL_DumpView 0x7e2f0000 - 0x7e2f0fff c-rW-
  202. 1806.513:0009:trace:virtual:VIRTUAL_DumpView 0x7e2f1000 - 0x7e2f4fff c-rw-
  203. 1806.513:0009:trace:imports:import_dll --- DispatchMessageW user32.dll.160 = 0x7ed180b0
  204. 1806.513:0009:trace:imports:import_dll --- MsgWaitForMultipleObjects user32.dll.477 = 0x7ed183d0
  205. 1806.513:0009:trace:imports:import_dll --- PeekMessageW user32.dll.496 = 0x7ed1c3b0
  206. 1806.513:0009:trace:imports:import_dll --- TranslateMessage user32.dll.663 = 0x7ed1f1d0
  207. 1806.513:0009:trace:virtual:NtProtectVirtualMemory 0xffffffff 0x7e2f0000 00001000 00000004
  208. 1806.513:0009:trace:virtual:VIRTUAL_SetProt 0x7e2f0000-0x7e2f0fff c-rW-
  209. 1806.513:0009:trace:virtual:VIRTUAL_DumpView View: 0x7e2c0000 - 0x7e2f4fff (system)
  210. 1806.513:0009:trace:virtual:VIRTUAL_DumpView 0x7e2c0000 - 0x7e2c0fff c-r--
  211. 1806.513:0009:trace:virtual:VIRTUAL_DumpView 0x7e2c1000 - 0x7e2effff c-r-x
  212. 1806.513:0009:trace:virtual:VIRTUAL_DumpView 0x7e2f0000 - 0x7e2f0fff c-rW-
  213. 1806.513:0009:trace:virtual:VIRTUAL_DumpView 0x7e2f1000 - 0x7e2f4fff c-rw-
  214. 1806.513:0009:trace:module:load_dll looking for L"advapi32.dll" in L"Z:\\home\\yozz\\\0414\043e\043a\0443\043c\0435\043d\0442\044b;.;C:\\windows\\system32;C:\\windows\\system;C:\\windows;"
  215. 1806.513:0009:trace:module:load_dll Found L"C:\\windows\\system32\\advapi32.dll" for L"advapi32.dll" at 0x7eb30000, count=12
  216. 1806.513:0009:trace:virtual:NtProtectVirtualMemory 0xffffffff 0x7e2f0648 00000014 00000004
  217. 1806.513:0009:trace:virtual:VIRTUAL_SetProt 0x7e2f0000-0x7e2f0fff c-rW-
  218. 1806.513:0009:trace:virtual:VIRTUAL_DumpView View: 0x7e2c0000 - 0x7e2f4fff (system)
  219. 1806.513:0009:trace:virtual:VIRTUAL_DumpView 0x7e2c0000 - 0x7e2c0fff c-r--
  220. 1806.513:0009:trace:virtual:VIRTUAL_DumpView 0x7e2c1000 - 0x7e2effff c-r-x
  221. 1806.513:0009:trace:virtual:VIRTUAL_DumpView 0x7e2f0000 - 0x7e2f0fff c-rW-
  222. 1806.513:0009:trace:virtual:VIRTUAL_DumpView 0x7e2f1000 - 0x7e2f4fff c-rw-
  223. 1806.513:0009:trace:imports:import_dll --- RegCloseKey advapi32.dll.348 = 0x7eb502c0
  224. 1806.513:0009:trace:imports:import_dll --- RegCreateKeyExW advapi32.dll.353 = 0x7eb4e5f0
  225. 1806.513:0009:trace:imports:import_dll --- RegOpenKeyExW advapi32.dll.383 = 0x7eb4ed70
  226. 1806.513:0009:trace:imports:import_dll --- RegQueryValueExW advapi32.dll.393 = 0x7eb51430
  227. 1806.513:0009:trace:imports:import_dll --- RegSetValueExW advapi32.dll.405 = 0x7eb50b00
  228. 1806.513:0009:trace:virtual:NtProtectVirtualMemory 0xffffffff 0x7e2f0000 00001000 00000008
  229. 1806.513:0009:trace:virtual:VIRTUAL_SetProt 0x7e2f0000-0x7e2f0fff c-rW-
  230. 1806.513:0009:trace:virtual:VIRTUAL_DumpView View: 0x7e2c0000 - 0x7e2f4fff (system)
  231. 1806.513:0009:trace:virtual:VIRTUAL_DumpView 0x7e2c0000 - 0x7e2c0fff c-r--
  232. 1806.513:0009:trace:virtual:VIRTUAL_DumpView 0x7e2c1000 - 0x7e2effff c-r-x
  233. 1806.513:0009:trace:virtual:VIRTUAL_DumpView 0x7e2f0000 - 0x7e2f0fff c-rW-
  234. 1806.513:0009:trace:virtual:VIRTUAL_DumpView 0x7e2f1000 - 0x7e2f4fff c-rw-
  235. 1806.513:0009:trace:module:load_dll looking for L"kernel32.dll" in L"Z:\\home\\yozz\\\0414\043e\043a\0443\043c\0435\043d\0442\044b;.;C:\\windows\\system32;C:\\windows\\system;C:\\windows;"
  236. 1806.513:0009:trace:module:load_dll Found L"C:\\windows\\system32\\KERNEL32.dll" for L"kernel32.dll" at 0x7b810000, count=17
  237. 1806.513:0009:trace:virtual:NtProtectVirtualMemory 0xffffffff 0x7e2f0660 00000088 00000004
  238. 1806.513:0009:trace:virtual:VIRTUAL_SetProt 0x7e2f0000-0x7e2f0fff c-rW-
  239. 1806.513:0009:trace:virtual:VIRTUAL_DumpView View: 0x7e2c0000 - 0x7e2f4fff (system)
  240. 1806.513:0009:trace:virtual:VIRTUAL_DumpView 0x7e2c0000 - 0x7e2c0fff c-r--
  241. 1806.513:0009:trace:virtual:VIRTUAL_DumpView 0x7e2c1000 - 0x7e2effff c-r-x
  242. 1806.513:0009:trace:virtual:VIRTUAL_DumpView 0x7e2f0000 - 0x7e2f0fff c-rW-
  243. 1806.513:0009:trace:virtual:VIRTUAL_DumpView 0x7e2f1000 - 0x7e2f4fff c-rw-
  244. 1806.513:0009:trace:imports:import_dll --- CloseHandle kernel32.dll.172 = 0x7b85c800
  245. 1806.513:0009:trace:imports:import_dll --- CreateEventW kernel32.dll.207 = 0x7b86cdd0
  246. 1806.513:0009:trace:imports:import_dll --- CreateThread kernel32.dll.239 = 0x7b872030
  247. 1806.513:0009:trace:imports:import_dll --- DelayLoadFailureHook kernel32.dll.257 = 0x7b854e50
  248. 1806.513:0009:trace:imports:import_dll --- DeleteCriticalSection kernel32.dll.259 = 0x7bc359f0
  249. 1806.513:0009:trace:imports:import_dll --- DisableThreadLibraryCalls kernel32.dll.269 = 0x7b8534d0
  250. 1806.513:0009:trace:imports:import_dll --- EnterCriticalSection kernel32.dll.279 = 0x7bc364f0
  251. 1806.513:0009:trace:imports:import_dll --- EnumResourceNamesW kernel32.dll.293 = 0x7b86a5e0
  252. 1806.513:0009:trace:imports:import_dll --- FindResourceW kernel32.dll.371 = 0x7b869d10
  253. 1806.513:0009:trace:imports:import_dll --- FreeLibrary kernel32.dll.391 = 0x7b854ce0
  254. 1806.513:0009:trace:imports:import_dll --- GetComputerNameExA kernel32.dll.421 = 0x7b82bc30
  255. 1806.513:0009:trace:imports:import_dll --- GetExitCodeThread kernel32.dll.494 = 0x7b8721e0
  256. 1806.513:0009:trace:imports:import_dll --- GetModuleFileNameW kernel32.dll.531 = 0x7b8540c0
  257. 1806.513:0009:trace:imports:import_dll --- GetModuleHandleA kernel32.dll.532 = 0x7b854000
  258. 1806.513:0009:trace:imports:import_dll --- GetProcAddress kernel32.dll.563 = 0x7b854d90
  259. 1806.513:0009:trace:imports:import_dll --- GetSystemTime kernel32.dll.607 = 0x7b874710
  260. 1806.513:0009:trace:imports:import_dll --- GlobalAlloc kernel32.dll.660 = 0x7b842a60
  261. 1806.513:0009:trace:imports:import_dll --- GlobalFree kernel32.dll.667 = 0x7b843190
  262. 1806.513:0009:trace:imports:import_dll --- HeapAlloc kernel32.dll.684 = 0x7bc48560
  263. 1806.513:0009:trace:imports:import_dll --- HeapFree kernel32.dll.690 = 0x7bc47c50
  264. 1806.513:0009:trace:imports:import_dll --- HeapReAlloc kernel32.dll.694 = 0x7bc48910
  265. 1806.513:0009:trace:imports:import_dll --- InitializeCriticalSection kernel32.dll.711 = 0x7b86ca70
  266. 1806.513:0009:trace:imports:import_dll --- LeaveCriticalSection kernel32.dll.789 = 0x7bc365e0
  267. 1806.513:0009:trace:imports:import_dll --- LoadLibraryA kernel32.dll.790 = 0x7b854c40
  268. 1806.513:0009:trace:imports:import_dll --- LoadLibraryW kernel32.dll.793 = 0x7b854c90
  269. 1806.513:0009:trace:imports:import_dll --- LoadResource kernel32.dll.795 = 0x7b86b0d0
  270. 1806.513:0009:trace:imports:import_dll --- LocalAlloc kernel32.dll.796 = 0x7b843990
  271. 1806.513:0009:trace:imports:import_dll --- MultiByteToWideChar kernel32.dll.834 = 0x7b84c160
  272. 1806.513:0009:trace:imports:import_dll --- QueueUserWorkItem kernel32.dll.892 = 0x7b872790
  273. 1806.513:0009:trace:imports:import_dll --- SetEvent kernel32.dll.1061 = 0x7b86d1d0
  274. 1806.513:0009:trace:imports:import_dll --- SizeofResource kernel32.dll.1120 = 0x7b86b1e0
  275. 1806.513:0009:trace:imports:import_dll --- WaitForMultipleObjects kernel32.dll.1184 = 0x7b86c630
  276. 1806.513:0009:trace:imports:import_dll --- WaitForSingleObject kernel32.dll.1186 = 0x7b86c5b0
  277. 1806.513:0009:trace:imports:import_dll --- WideCharToMultiByte kernel32.dll.1194 = 0x7b84c620
  278. 1806.513:0009:trace:virtual:NtProtectVirtualMemory 0xffffffff 0x7e2f0000 00001000 00000008
  279. 1806.513:0009:trace:virtual:VIRTUAL_SetProt 0x7e2f0000-0x7e2f0fff c-rW-
  280. 1806.513:0009:trace:virtual:VIRTUAL_DumpView View: 0x7e2c0000 - 0x7e2f4fff (system)
  281. 1806.513:0009:trace:virtual:VIRTUAL_DumpView 0x7e2c0000 - 0x7e2c0fff c-r--
  282. 1806.513:0009:trace:virtual:VIRTUAL_DumpView 0x7e2c1000 - 0x7e2effff c-r-x
  283. 1806.513:0009:trace:virtual:VIRTUAL_DumpView 0x7e2f0000 - 0x7e2f0fff c-rW-
  284. 1806.513:0009:trace:virtual:VIRTUAL_DumpView 0x7e2f1000 - 0x7e2f4fff c-rw-
  285. 1806.513:0009:trace:module:load_builtin_callback loaded winhttp.dll 0x122fa8 0x7e2c0000
  286. 0009: load_dll( mapping=0000, base=7e2c0000, name=00122fd0, size=217088, dbg_offset=0, dbg_size=0, filename=L"C:\\windows\\system32\\winhttp.dll" )
  287. 0009: load_dll() = 0
  288. 1806.514:0009:trace:loaddll:load_builtin_dll Loaded L"C:\\windows\\system32\\winhttp.dll" at 0x7e2c0000: builtin
  289. 1806.514:0009:trace:module:load_dll Loaded module L"C:\\windows\\system32\\WINHTTP.dll" (builtin) at 0x7e2c0000
  290. 1806.514:0009:trace:virtual:NtProtectVirtualMemory 0xffffffff 0x4bd484 00000038 00000004
  291. 1806.514:0009:trace:virtual:VIRTUAL_SetProt 0x4bd000-0x4bdfff c-rW-
  292. 1806.514:0009:trace:virtual:VIRTUAL_DumpView View: 0x400000 - 0x1e4afff 0x18
  293. 1806.514:0009:trace:virtual:VIRTUAL_DumpView 0x400000 - 0x400fff c-r--
  294. 1806.514:0009:trace:virtual:VIRTUAL_DumpView 0x401000 - 0x4bcfff c-r-x
  295. 1806.514:0009:trace:virtual:VIRTUAL_DumpView 0x4bd000 - 0x4bdfff c-rW-
  296. 1806.514:0009:trace:virtual:VIRTUAL_DumpView 0x4be000 - 0x553fff c-r--
  297. 1806.514:0009:trace:virtual:VIRTUAL_DumpView 0x554000 - 0x55efff c-rW-
  298. 1806.514:0009:trace:virtual:VIRTUAL_DumpView 0x55f000 - 0x1e4afff c-r--
  299. 1806.514:0009:trace:imports:import_dll --- WinHttpOpenRequest WINHTTP.dll.16 = 0x7e2ddb30
  300. 1806.514:0009:trace:imports:import_dll --- WinHttpCloseHandle WINHTTP.dll.7 = 0x7e2de2b0
  301. 1806.514:0009:trace:imports:import_dll --- WinHttpReceiveResponse WINHTTP.dll.22 = 0x7e2da970
  302. 1806.514:0009:trace:imports:import_dll --- WinHttpSetTimeouts WINHTTP.dll.28 = 0x7e2e0810
  303. 1806.514:0009:trace:imports:import_dll --- WinHttpReadData WINHTTP.dll.21 = 0x7e2dac20
  304. 1806.514:0009:trace:imports:import_dll --- WinHttpQueryDataAvailable WINHTTP.dll.18 = 0x7e2daac0
  305. 1806.514:0009:trace:imports:import_dll --- WinHttpQueryHeaders WINHTTP.dll.19 = 0x7e2d73b0
  306. 1806.514:0009:trace:imports:import_dll --- WinHttpCrackUrl WINHTTP.dll.9 = 0x7e2e1420
  307. 1806.514:0009:trace:imports:import_dll --- WinHttpSetOption WINHTTP.dll.26 = 0x7e2de510
  308. 1806.514:0009:trace:imports:import_dll --- WinHttpSetStatusCallback WINHTTP.dll.27 = 0x7e2e0740
  309. 1806.514:0009:trace:imports:import_dll --- WinHttpOpen WINHTTP.dll.15 = 0x7e2dee60
  310. 1806.514:0009:trace:imports:import_dll --- WinHttpSendRequest WINHTTP.dll.23 = 0x7e2d82f0
  311. 1806.514:0009:trace:imports:import_dll --- WinHttpQueryOption WINHTTP.dll.20 = 0x7e2de360
  312. 1806.514:0009:trace:imports:import_dll --- WinHttpConnect WINHTTP.dll.8 = 0x7e2dd840
  313. 1806.514:0009:trace:virtual:NtProtectVirtualMemory 0xffffffff 0x4bd000 00001000 00000002
  314. 1806.514:0009:trace:virtual:VIRTUAL_SetProt 0x4bd000-0x4bdfff c-r--
  315. 1806.514:0009:trace:virtual:VIRTUAL_DumpView View: 0x400000 - 0x1e4afff 0x18
  316. 1806.514:0009:trace:virtual:VIRTUAL_DumpView 0x400000 - 0x400fff c-r--
  317. 1806.514:0009:trace:virtual:VIRTUAL_DumpView 0x401000 - 0x4bcfff c-r-x
  318. 1806.514:0009:trace:virtual:VIRTUAL_DumpView 0x4bd000 - 0x553fff c-r--
  319. 1806.514:0009:trace:virtual:VIRTUAL_DumpView 0x554000 - 0x55efff c-rW-
  320. 1806.514:0009:trace:virtual:VIRTUAL_DumpView 0x55f000 - 0x1e4afff c-r--
  321. 1806.514:0009:trace:module:load_dll looking for L"CRYPT32.dll" in L"Z:\\home\\yozz\\\0414\043e\043a\0443\043c\0435\043d\0442\044b;.;C:\\windows\\system32;C:\\windows\\system;C:\\windows;"
  322. 1806.514:0009:trace:module:load_dll Found L"C:\\windows\\system32\\crypt32.dll" for L"CRYPT32.dll" at 0x7e300000, count=2
  323. 1806.514:0009:trace:virtual:NtProtectVirtualMemory 0xffffffff 0x4bd008 00000018 00000004
  324. 1806.514:0009:trace:virtual:VIRTUAL_SetProt 0x4bd000-0x4bdfff c-rW-
  325. 1806.514:0009:trace:virtual:VIRTUAL_DumpView View: 0x400000 - 0x1e4afff 0x18
  326. 1806.514:0009:trace:virtual:VIRTUAL_DumpView 0x400000 - 0x400fff c-r--
  327. 1806.514:0009:trace:virtual:VIRTUAL_DumpView 0x401000 - 0x4bcfff c-r-x
  328. 1806.514:0009:trace:virtual:VIRTUAL_DumpView 0x4bd000 - 0x4bdfff c-rW-
  329. 1806.514:0009:trace:virtual:VIRTUAL_DumpView 0x4be000 - 0x553fff c-r--
  330. 1806.514:0009:trace:virtual:VIRTUAL_DumpView 0x554000 - 0x55efff c-rW-
  331. 1806.514:0009:trace:virtual:VIRTUAL_DumpView 0x55f000 - 0x1e4afff c-r--
  332. 1806.514:0009:trace:imports:import_dll --- CertGetCertificateChain CRYPT32.dll.69 = 0x7e31be40
  333. 1806.514:0009:trace:imports:import_dll --- CertCreateCertificateChainEngine CRYPT32.dll.27 = 0x7e31b9a0
  334. 1806.514:0009:trace:imports:import_dll --- CertNameToStrW CRYPT32.dll.84 = 0x7e35cd90
  335. 1806.514:0009:trace:imports:import_dll --- CertFreeCertificateChainEngine CRYPT32.dll.62 = 0x7e31bb70
  336. 1806.514:0009:trace:imports:import_dll --- CertFreeCertificateContext CRYPT32.dll.64 = 0x7e30fdf0
  337. 1806.514:0009:trace:imports:import_dll --- CertFreeCertificateChain CRYPT32.dll.61 = 0x7e31bcd0
  338. 1806.514:0009:trace:virtual:NtProtectVirtualMemory 0xffffffff 0x4bd000 00001000 00000002
  339. 1806.514:0009:trace:virtual:VIRTUAL_SetProt 0x4bd000-0x4bdfff c-r--
  340. 1806.514:0009:trace:virtual:VIRTUAL_DumpView View: 0x400000 - 0x1e4afff 0x18
  341. 1806.514:0009:trace:virtual:VIRTUAL_DumpView 0x400000 - 0x400fff c-r--
  342. 1806.514:0009:trace:virtual:VIRTUAL_DumpView 0x401000 - 0x4bcfff c-r-x
  343. 1806.514:0009:trace:virtual:VIRTUAL_DumpView 0x4bd000 - 0x553fff c-r--
  344. 1806.514:0009:trace:virtual:VIRTUAL_DumpView 0x554000 - 0x55efff c-rW-
  345. 1806.514:0009:trace:virtual:VIRTUAL_DumpView 0x55f000 - 0x1e4afff c-r--
  346. 1806.514:0009:trace:seh:raise_exception code=c000013a flags=0 addr=0xf7736d70 ip=f7736d70 tid=0009
  347. 1806.514:0009:trace:seh:raise_exception eax=00000000 ebx=00000001 ecx=7bcd4cc0 edx=00000000 esi=00000008 edi=7bcb8c90
  348. 1806.514:0009:trace:seh:raise_exception ebp=0033ffe8 esp=0033ff14 cs=0023 ds=002b es=002b fs=0063 gs=006b flags=00000296
  349. 1806.514:0009:err:seh:raise_exception Unhandled exception code c000013a flags 0 addr 0xf7736d70
  350. 0009: terminate_process( handle=ffffffff, exit_code=-1073741510 )
  351. 0009: terminate_process() = 0 { self=1 }
  352. 0009: *killed* exit_code=-1073741510
  353. 0008: *process killed*
  354. root@zzz:/var/log# 0015: *wakeup* signaled=0
  355. 1807.359:0015:trace:heap:RtlAllocateHeap (0x110000,70000062,00000100): returning 0x111b00
  356. 0015: get_message( flags=04ff0001, get_win=00000000, get_first=00000000, get_last=ffffffff, hw_id=00000000, wake_mask=00000040, changed_mask=000004ff )
  357. 0015: get_message() = 0 { win=0001002e, msg=00000010, wparam=00000000, lparam=00000000, type=6, time=001b93ff, active_hooks=80000000, total=0, data={} }
  358. 1807.359:0015:trace:msg:peek_message got type 6 msg 10 (WM_CLOSE) hwnd 0x1002e wp 0 lp 0
  359. 1807.360:0015:trace:heap:RtlFreeHeap (0x110000,70000062,0x111b00): returning TRUE
  360. 1807.360:0015:trace:hook:HOOK_CallHooks skipping hook WH_GETMESSAGE mask 80000000
  361. 1807.360:0015:trace:class:GetClassNameW 0x1002e 0x34ef44 60
  362. 1807.360:0015:trace:message:SPY_EnterMessage (0x1002e) L"{#32769}" [0010] WM_CLOSE dispatched wp=00000000 lp=00000000
  363. 1807.360:0015:trace:explorer:desktop_wnd_proc got msg 0010 wp 0 lp 0
  364. 0015: post_quit_message( exit_code=0 )
  365. 0015: post_quit_message() = 0
  366. 1807.360:0015:trace:class:GetClassNameW 0x1002e 0x34f344 60
  367. 1807.360:0015:trace:message:SPY_ExitMessage (0x1002e) L"{#32769}" [0010] WM_CLOSE returned 00000000
  368. 1807.360:0015:trace:heap:RtlAllocateHeap (0x110000,70000062,00000100): returning 0x111cb8
  369. 0015: get_message( flags=04ff0001, get_win=00000000, get_first=00000000, get_last=ffffffff, hw_id=00000000, wake_mask=00000040, changed_mask=000004ff )
  370. 0015: get_message() = 0 { win=00000000, msg=00000012, wparam=00000000, lparam=00000000, type=6, time=001b9400, active_hooks=80000000, total=0, data={} }
  371. 1807.360:0015:trace:msg:peek_message got type 6 msg 12 (WM_QUIT) hwnd (nil) wp 0 lp 0
  372. 1807.361:0015:trace:heap:RtlFreeHeap (0x110000,70000062,0x111cb8): returning TRUE
  373. 1807.361:0015:trace:hook:HOOK_CallHooks skipping hook WH_GETMESSAGE mask 80000000
  374. 1807.361:0015:trace:explorer:manage_desktop desktop message loop exiting for hwnd 0x1002e
  375. 0015: terminate_process( handle=0000, exit_code=0 )
  376. 0015: terminate_process() = 0 { self=1 }
  377. 1807.361:0015:trace:module:LdrShutdownProcess ()
  378. 1807.361:0015:trace:module:MODULE_InitDLL (0x7e4f0000 L"shell32.dll",PROCESS_DETACH,0x1) - CALL
  379. 1807.361:0015:trace:shell:DllMain 0x7e4f0000 0x0 0x1
  380. 1807.361:0015:trace:module:MODULE_InitDLL (0x7e4f0000,PROCESS_DETACH,0x1) - RETURN 1
  381. 1807.361:0015:trace:module:MODULE_InitDLL (0x7e2a0000 L"ole32.dll",PROCESS_DETACH,0x1) - CALL
  382. 1807.361:0015:trace:ole:DllMain 0x7e2a0000 0x0 0x1
  383. 1807.361:0015:trace:module:MODULE_InitDLL (0x7e2a0000,PROCESS_DETACH,0x1) - RETURN 1
  384. 1807.361:0015:trace:module:MODULE_InitDLL (0x7e3f0000 L"comctl32.dll",PROCESS_DETACH,0x1) - CALL
  385. 1807.361:0015:trace:commctrl:DllMain 0x7e3f0000,0,0x1
  386. 1807.361:0015:trace:module:MODULE_InitDLL (0x7e3f0000,PROCESS_DETACH,0x1) - RETURN 1
  387. 1807.361:0015:trace:module:MODULE_InitDLL (0x7e3c0000 L"uxtheme.dll",PROCESS_DETACH,0x1) - CALL
  388. 1807.361:0015:trace:uxtheme:DllMain 0x7e3c0000 0x0 0x1: stub
  389. 1807.361:0015:trace:module:MODULE_InitDLL (0x7e3c0000,PROCESS_DETACH,0x1) - RETURN 1
  390. 1807.361:0015:trace:module:MODULE_InitDLL (0x7e8c0000 L"shlwapi.dll",PROCESS_DETACH,0x1) - CALL
  391. 1807.361:0015:trace:shell:DllMain 0x7e8c0000 0x0 0x1
  392. 1807.361:0015:trace:module:MODULE_InitDLL (0x7e8c0000,PROCESS_DETACH,0x1) - RETURN 1
  393. 1807.361:0015:trace:module:MODULE_InitDLL (0x7eba0000 L"user32.dll",PROCESS_DETACH,0x1) - CALL
  394. 1807.362:0015:trace:heap:RtlFreeHeap (0x110000,70000062,0x11d478): returning TRUE
  395. 1807.362:0015:trace:module:MODULE_InitDLL (0x7eba0000,PROCESS_DETACH,0x1) - RETURN 1
  396. 1807.362:0015:trace:module:MODULE_InitDLL (0x7eff0000 L"version.dll",PROCESS_DETACH,0x1) - CALL
  397. 1807.362:0015:trace:module:MODULE_InitDLL (0x7eff0000,PROCESS_DETACH,0x1) - RETURN 1
  398. 1807.362:0015:trace:module:MODULE_InitDLL (0x7ea80000 L"gdi32.dll",PROCESS_DETACH,0x1) - CALL
  399. 1807.362:0015:trace:module:MODULE_InitDLL (0x7ea80000,PROCESS_DETACH,0x1) - RETURN 1
  400. 1807.362:0015:trace:module:MODULE_InitDLL (0x7ed50000 L"rpcrt4.dll",PROCESS_DETACH,0x1) - CALL
  401. 1807.362:0015:trace:module:MODULE_InitDLL (0x7ed50000,PROCESS_DETACH,0x1) - RETURN 1
  402. 1807.362:0015:trace:module:MODULE_InitDLL (0x7ece0000 L"advapi32.dll",PROCESS_DETACH,0x1) - CALL
  403. 1807.362:0015:trace:module:MODULE_InitDLL (0x7ece0000,PROCESS_DETACH,0x1) - RETURN 1
  404. 1807.362:0015:trace:module:MODULE_InitDLL (0x7b810000 L"KERNEL32.dll",PROCESS_DETACH,0x1) - CALL
  405. 1807.362:0015:trace:module:MODULE_InitDLL (0x7b810000,PROCESS_DETACH,0x1) - RETURN 1
  406. 1807.362:0015:trace:module:MODULE_InitDLL (0x7bc10000 L"ntdll.dll",PROCESS_DETACH,0x1) - CALL
  407. 1807.362:0015:trace:module:MODULE_InitDLL (0x7bc10000,PROCESS_DETACH,0x1) - RETURN 1
  408. 0015: terminate_process( handle=ffffffff, exit_code=0 )
  409. 0015: terminate_process() = 0 { self=1 }
  410. 1807.362:0015:trace:module:LdrUnloadDll (0x7e2a0000)
  411. 1807.362:0015:trace:module:LdrUnloadDll (0x7e3c0000)
  412. 0015: *killed* exit_code=0
  413. 0014: *process killed*
  414. wineserver: shutting down
  415. 000d: *wakeup* signaled=0
  416. 0029: *wakeup* signaled=0
  417. 1810.367:0029:trace:service:QueryServiceStatus 0x114308 0x34fb50
  418. 1810.367:000d:trace:service:events_loop Wait returned 0
  419. 1810.367:000d:trace:service:events_loop Object signaled - wine shutdown
  420. 1810.367:0029:trace:service:QueryServiceStatusEx 0x114308 0 0x34fac8 36 0x34fac4
  421. 1810.367:0029:trace:rpc:NdrClientInitializeNew (pRpcMessage == ^0x34f78c, pStubMsg == ^0x34f86c, pStubDesc == ^0x7ede7e00, ProcNum == 40)
  422. 1810.367:0029:trace:ole:NDRCContextBinding 0x114308
  423. 1810.367:0029:trace:rpc:NdrGetBuffer (stubmsg == ^0x34f86c, buflen == 38, handle == 0x114340)
  424. 000d: close_handle( handle=0038 )
  425. 1810.367:0029:trace:rpc:I_RpcGetBuffer (0x34f78c): BufferLength=38
  426. 000d: close_handle() = 0
  427. 000d: close_handle( handle=003c )
  428. 000d: close_handle() = 0
  429. 000d: select( flags=2, cookie=0034f8c8, timeout=infinite, prev_apc=0000, result={}, data={WAIT,handles={007c}} )
  430. 000d: select() = PENDING { timeout=infinite, call={APC_NONE}, apc_handle=0000 }
  431. 1810.367:0029:trace:heap:RtlAllocateHeap (0x110000,70000062,00000026): returning 0x12aae8
  432. 1810.367:0029:trace:rpc:I_RpcGetBuffer Buffer=0x12aae8
  433. 1810.367:0029:trace:rpc:I_RpcNegotiateTransferSyntax (0x34f78c)
  434. 1810.367:0029:trace:rpc:RPCRT4_OpenBinding (Binding == ^0x114340)
  435. 1810.367:0029:trace:rpc:RpcAssoc_GetIdleConnection got connection from pool 0x1136f8
  436. 1810.367:0029:trace:ole:NdrClientContextMarshall (0x34f86c, 0x114308, 0)
  437. 1810.367:0029:trace:ole:NDRCContextMarshall 0x114308 0x12aae8
  438. 1810.367:0029:trace:ole:NdrBaseTypeMarshall pStubMsg 0x34f86c, pMemory 0x34f984, type 0x0d
  439. 1810.367:0029:trace:ole:NdrBaseTypeMarshall value: 0x0000
  440. 1810.367:0029:trace:rpc:NdrSendReceive (stubmsg == ^0x34f86c, buffer == ^0x12ab04)
  441. 1810.367:0029:trace:rpc:I_RpcSendReceive (0x34f78c)
  442. 1810.367:0029:trace:rpc:I_RpcSend (0x34f78c)
  443. 1810.367:0029:trace:rpc:UuidIsNil ({00000000-0000-0000-0000-000000000000})
  444. 1810.367:0029:trace:rpc:UuidCompare ({00000000-0000-0000-0000-000000000000},{00000000-0000-0000-0000-000000000000})
  445. 1810.367:0029:trace:heap:RtlAllocateHeap (0x110000,7000006a,00000018): returning 0x12ab20
  446. 1810.368:0029:trace:heap:RtlAllocateHeap (0x110000,7000006a,00000034): returning 0x12ab48
  447. 1810.368:0029:trace:file:WriteFile 0x10 0x12ab48 52 0x34f5a8 (nil)
  448. 1810.368:0029:trace:ntdll:NtWriteFile (0x10,(nil),(nil),(nil),0x34f534,0x12ab48,0x00000034,(nil),(nil))!
  449. 1810.368:0029:trace:ntdll:NtWriteFile = SUCCESS (52)
  450. 1810.368:002a:trace:ntdll:NtReadFile = SUCCESS (16)
  451. 1810.368:0029:trace:heap:RtlFreeHeap (0x110000,70000062,0x12ab48): returning TRUE
  452. 1810.368:002a:trace:heap:RtlAllocateHeap (0x110000,70000062,00000018): returning 0x11eb30
  453. 1810.368:002a:trace:file:ReadFile 0x34 0x11eb40 8 0x54e888 (nil)
  454. 1810.368:002a:trace:ntdll:NtReadFile (0x34,(nil),(nil),(nil),0x54e814,0x11eb40,0x00000008,(nil),(nil)),partial stub!
  455. 1810.368:0029:trace:heap:RtlFreeHeap (0x110000,70000062,0x12ab20): returning TRUE
  456. 1810.368:002a:trace:ntdll:NtReadFile = SUCCESS (8)
  457. 1810.368:0029:trace:rpc:I_RpcReceive (0x34f78c)
  458. 1810.368:0029:trace:rpc:RPCRT4_ReceiveWithAuth (0x1136f8, 0x34f698, 0x34f78c, (nil))
  459. 1810.368:0029:trace:rpc:RPCRT4_default_receive_fragment (0x1136f8, 0x34f698, 0x34f638)
  460. 1810.368:0029:trace:file:ReadFile 0x10 0x34f5ac 16 0x34f568 (nil)
  461. 1810.368:0029:trace:ntdll:NtReadFile (0x10,(nil),(nil),(nil),0x34f4f4,0x34f5ac,0x00000010,(nil),(nil)),partial stub!
  462. 1810.368:002a:trace:heap:RtlAllocateHeap (0x110000,70000062,0000001c): returning 0x11eb58
  463. 1810.368:002a:trace:file:ReadFile 0x34 0x11eb58 28 0x54e888 (nil)
  464. 1810.368:002a:trace:ntdll:NtReadFile (0x34,(nil),(nil),(nil),0x54e814,0x11eb58,0x0000001c,(nil),(nil)),partial stub!
  465. 1810.368:002a:trace:ntdll:NtReadFile = SUCCESS (28)
  466. 1810.368:002a:trace:rpc:RPCRT4_ReceiveWithAuth buffer length = 28
  467. 1810.368:002a:trace:heap:RtlAllocateHeap (0x110000,70000062,0000001c): returning 0x11eb88
  468. 1810.368:002a:trace:heap:RtlFreeHeap (0x110000,70000062,0x11eb58): returning TRUE
  469. 1810.368:002a:trace:rpc:RPCRT4_io_thread got request packet
  470. 1810.368:002a:trace:heap:RtlAllocateHeap (0x110000,70000062,00000014): returning 0x11ebb8
  471. 1810.368:002a:trace:thread:QueueUserWorkItem (0x7ed853f0,0x11ebb8,0x00000010)
  472. 1810.368:002a:trace:heap:RtlAllocateHeap (0x110000,70000062,00000010): returning 0x11ebe0
  473. 002a: release_semaphore( handle=0048, count=00000001 )
  474. 0027: *wakeup* signaled=0
  475. 002a: release_semaphore() = 0 { prev_count=00000000 }
  476. 1810.368:0027:trace:heap:RtlFreeHeap (0x110000,70000062,0x11ebe0): returning TRUE
  477. 1810.368:0027:trace:threadpool:worker_thread_proc executing 0x7ed853f0(0x11ebb8)
  478. 1810.368:0027:trace:rpc:RPCRT4_process_packet got request packet
  479. 1810.368:0027:trace:rpc:UuidIsNil ({367abb81-9844-35f1-ad32-98f038001003})
  480. 1810.368:0027:trace:rpc:UuidCompare ({367abb81-9844-35f1-ad32-98f038001003},{00000000-0000-0000-0000-000000000000})
  481. 1810.368:0027:trace:rpc:UuidEqual ({00000000-0000-0000-0000-000000000000},{00000000-0000-0000-0000-000000000000})
  482. 1810.368:0027:trace:rpc:UuidCompare ({00000000-0000-0000-0000-000000000000},{00000000-0000-0000-0000-000000000000})
  483. 1810.368:0027:trace:rpc:RPCRT4_find_interface returning 0x114c18 for object (null), if_id { 2.0 {367abb81-9844-35f1-ad32-98f038001003} }
  484. 1810.368:0027:trace:rpc:NdrServerInitializeNew (pRpcMsg == ^0x11b2e8, pStubMsg == ^0x84e704, pStubDesc == ^0x7eddfe40)
  485. 1810.368:002a:trace:heap:RtlAllocateHeap (0x110000,7000006a,0000002c): returning 0x11ec00
  486. 1810.368:0027:trace:ole:NdrServerContextNewUnmarshall (0x84e704, 0x7eddbc52)
  487. 1810.368:002a:trace:rpc:RPCRT4_ReceiveWithAuth (0x119728, 0x54e9b0, 0x11ec00, 0x54e9b4)
  488. 1810.368:0027:trace:ole:NDRSContextUnmarshall2 (0x1199c8 0x11eb88 00000010 (nil) 0)
  489. 1810.368:002a:trace:rpc:RPCRT4_default_receive_fragment (0x119728, 0x54e9b0, 0x54e958)
  490. 1810.368:002a:trace:file:ReadFile 0x34 0x54e8cc 16 0x54e888 (nil)
  491. 1810.368:0027:trace:rpc:UuidIsNil ({2f97d3b0-3dc8-4881-a3ec-a2198f379253})
  492. 1810.368:002a:trace:ntdll:NtReadFile (0x34,(nil),(nil),(nil),0x54e814,0x54e8cc,0x00000010,(nil),(nil)),partial stub!
  493. 1810.368:0027:trace:rpc:UuidCompare ({2f97d3b0-3dc8-4881-a3ec-a2198f379253},{00000000-0000-0000-0000-000000000000})
  494. 1810.368:0027:trace:rpc:RpcServerAssoc_FindContextHandle found 0x11a3a8
  495. 1810.369:0027:trace:heap:RtlAllocateHeap (0x110000,70000062,00000008): returning 0x11ec40
  496. 1810.369:0027:trace:ole:NdrSimpleTypeUnmarshall pMemory: 0x84e7e8
  497. 1810.369:0027:trace:ole:NdrSimpleTypeUnmarshall value: 0x00000000
  498. 1810.369:0027:trace:heap:RtlAllocateHeap (0x110000,70000062,00000038): returning 0x11ec58
  499. 1810.369:0027:trace:ole:NdrAllocate -- 0x11ec58
  500. 1810.369:0027:trace:ole:NdrConformantArrayBufferSize (0x84e704,0x11ec58,0x7eddbc56)
  501. 1810.369:0027:trace:ole:ComputeConformanceOrVariance toplevel conformance, ofs=12
  502. 1810.369:0027:trace:ole:ComputeConformanceOrVariance resulting conformance is 36
  503. 1810.369:0027:trace:ole:EmbeddedPointerBufferSize (0x84e704,0x11ec58,0x7eddbc5e)
  504. 1810.369:0027:trace:rpc:I_RpcGetBuffer (0x11b2e8): BufferLength=56
  505. 1810.369:0027:trace:heap:RtlAllocateHeap (0x110000,70000062,00000038): returning 0x11eca0
  506. 1810.369:0027:trace:rpc:I_RpcGetBuffer Buffer=0x11eca0
  507. 1810.369:0027:trace:ole:NdrConformantArrayMarshall (0x84e704,0x11ec58,0x7eddbc56)
  508. 1810.369:0027:trace:ole:ComputeConformanceOrVariance toplevel conformance, ofs=12
  509. 1810.369:0027:trace:ole:ComputeConformanceOrVariance resulting conformance is 36
  510. 1810.369:0027:trace:ole:EmbeddedPointerMarshall (0x84e704,0x11ec58,0x7eddbc5e)
  511. 1810.369:0027:trace:ole:NdrPointerFree (0x84e704,0x11ec58,0x7eddbc60)
  512. 1810.369:0027:trace:ole:PointerFree (0x84e704,0x11ec58,0x7eddbc60)
  513. 1810.369:0027:trace:ole:PointerFree type=0x11, attr=
  514. 1810.369:0027:trace:ole:NdrConformantArrayFree (0x84e704,0x11ec58,0x7eddbc56)
  515. 1810.369:0027:trace:ole:ComputeConformanceOrVariance toplevel conformance, ofs=12
  516. 1810.369:0027:trace:ole:ComputeConformanceOrVariance resulting conformance is 36
  517. 1810.369:0027:trace:ole:EmbeddedPointerFree (0x84e704,0x11ec58,0x7eddbc5e)
  518. 1810.369:0027:trace:ole:PointerFree freeing 0x11ec58
  519. 1810.369:0027:trace:ole:NdrFree (0x84e704, 0x11ec58)
  520. 1810.369:0027:trace:heap:RtlFreeHeap (0x110000,70000062,0x11ec58): returning TRUE
  521. 1810.369:0027:trace:heap:RtlFreeHeap (0x110000,70000062,0x11ec40): returning TRUE
  522. 1810.369:0027:trace:heap:RtlAllocateHeap (0x110000,7000006a,00000018): returning 0x11ece8
  523. 1810.369:0027:trace:heap:RtlAllocateHeap (0x110000,7000006a,00000048): returning 0x11ed10
  524. 1810.369:0027:trace:file:WriteFile 0x34 0x11ed10 72 0x84e778 (nil)
  525. 1810.369:0027:trace:ntdll:NtWriteFile (0x34,(nil),(nil),(nil),0x84e704,0x11ed10,0x00000048,(nil),(nil))!
  526. 1810.369:0027:trace:ntdll:NtWriteFile = SUCCESS (72)
  527. 1810.369:0029:trace:ntdll:NtReadFile = SUCCESS (16)
  528. 1810.370:0027:trace:heap:RtlFreeHeap (0x110000,70000062,0x11ed10): returning TRUE
  529. 1810.370:0029:trace:heap:RtlAllocateHeap (0x110000,70000062,00000018): returning 0x12ab90
  530. 1810.370:0029:trace:file:ReadFile 0x10 0x12aba0 8 0x34f568 (nil)
  531. 1810.370:0027:trace:heap:RtlFreeHeap (0x110000,70000062,0x11ece8): returning TRUE
  532. 1810.370:0029:trace:ntdll:NtReadFile (0x10,(nil),(nil),(nil),0x34f4f4,0x12aba0,0x00000008,(nil),(nil)),partial stub!
  533. 1810.370:0027:trace:rpc:process_request_packet freeing Buffer=0x11eb88
  534. 1810.370:0029:trace:ntdll:NtReadFile = SUCCESS (8)
  535. 1810.370:0027:trace:heap:RtlFreeHeap (0x110000,70000062,0x11eb88): returning TRUE
  536. 1810.370:0029:trace:heap:RtlAllocateHeap (0x110000,70000062,00000030): returning 0x12abb8
  537. 1810.370:0029:trace:file:ReadFile 0x10 0x12abb8 48 0x34f568 (nil)
  538. 1810.370:0029:trace:ntdll:NtReadFile (0x10,(nil),(nil),(nil),0x34f4f4,0x12abb8,0x00000030,(nil),(nil)),partial stub!
  539. 1810.370:0029:trace:ntdll:NtReadFile = SUCCESS (48)
  540. 1810.370:0029:trace:rpc:RPCRT4_ReceiveWithAuth buffer length = 48
  541. 1810.370:0027:trace:heap:RtlFreeHeap (0x110000,70000062,0x11eca0): returning TRUE
  542. 1810.370:0027:trace:heap:RtlFreeHeap (0x110000,70000062,0x11eb30): returning TRUE
  543. 1810.370:0029:trace:heap:RtlAllocateHeap (0x110000,70000062,00000030): returning 0x12abf8
  544. 1810.370:0027:trace:heap:RtlFreeHeap (0x110000,70000062,0x11b2e8): returning TRUE
  545. 1810.370:0029:trace:heap:RtlFreeHeap (0x110000,70000062,0x12abb8): returning TRUE
  546. 1810.370:0027:trace:heap:RtlFreeHeap (0x110000,70000062,0x11ebb8): returning TRUE
  547. 0027: select( flags=2, cookie=0084e708, timeout=+30.0000000, prev_apc=0000, result={}, data={WAIT,handles={0048}} )
  548. 0027: select() = PENDING { timeout=1d0a66fad4eee82 (+30.0000000), call={APC_NONE}, apc_handle=0000 }
  549. 1810.370:0029:trace:heap:RtlFreeHeap (0x110000,70000062,0x12ab90): returning TRUE
  550. 1810.371:0029:trace:heap:RtlFreeHeap (0x110000,70000062,0x12aae8): returning TRUE
  551. 1810.371:0029:trace:ole:NdrConformantArrayUnmarshall (0x34f86c,0x34f77c,0x7edd59d6,0)
  552. 1810.371:0029:trace:ole:ReadConformance unmarshalled conformance is 36
  553. 1810.371:0029:trace:ole:EmbeddedPointerUnmarshall (0x34f86c,0x12abfc,0x34fac8,0x7edd59de,0)
  554. 1810.371:0029:trace:ole:array_read_variance_and_unmarshall copying 0x12abfc to 0x34fac8
  555. 1810.371:0029:trace:rpc:NdrFreeBuffer (pStubMsg == ^0x34f86c)
  556. 1810.371:0029:trace:rpc:I_RpcFreeBuffer (0x34f78c) Buffer=0x12abf8
  557. 1810.371:0029:trace:rpc:RPCRT4_CloseBinding (Binding == ^0x114340)
  558. 1810.371:0029:trace:heap:RtlFreeHeap (0x110000,70000062,0x12abf8): returning TRUE
  559. 1810.371:0029:trace:service:service_handle_control L"MountMgr" control 5
  560. 1810.371:0029:trace:winedevice:service_handler shutting down L"MountMgr"
  561. 1810.371:0029:trace:service:SetServiceStatus 0x1140d0 30 3 0 0 0 0 0
  562. 1810.371:0029:trace:rpc:NdrClientInitializeNew (pRpcMessage == ^0x34f7ac, pStubMsg == ^0x34f88c, pStubDesc == ^0x7ede7e00, ProcNum == 7)
  563. 1810.371:0029:trace:ole:NDRCContextBinding 0x1140d0
  564. 1810.371:0029:trace:rpc:NdrGetBuffer (stubmsg == ^0x34f88c, buflen == 56, handle == 0x114108)
  565. 1810.371:0029:trace:rpc:I_RpcGetBuffer (0x34f7ac): BufferLength=56
  566. 1810.371:0029:trace:heap:RtlAllocateHeap (0x110000,70000062,00000038): returning 0x12ac38
  567. 1810.371:0029:trace:rpc:I_RpcGetBuffer Buffer=0x12ac38
  568. 1810.371:0029:trace:rpc:I_RpcNegotiateTransferSyntax (0x34f7ac)
  569. 1810.371:0029:trace:rpc:RPCRT4_OpenBinding (Binding == ^0x114108)
  570. 1810.371:0029:trace:rpc:RpcAssoc_GetIdleConnection got connection from pool 0x1136f8
  571. 1810.371:0029:trace:ole:NdrClientContextMarshall (0x34f88c, 0x1140d0, 0)
  572. 1810.371:0029:trace:ole:NDRCContextMarshall 0x1140d0 0x12ac38
  573. 1810.371:0029:trace:ole:NdrSimpleStructMarshall (0x34f88c,0x34fab0,0x7edd57b4)
  574. 1810.371:0029:trace:rpc:NdrSendReceive (stubmsg == ^0x34f88c, buffer == ^0x12ac68)
  575. 1810.371:0029:trace:rpc:I_RpcSendReceive (0x34f7ac)
  576. 1810.371:0029:trace:rpc:I_RpcSend (0x34f7ac)
  577. 1810.371:0029:trace:rpc:UuidIsNil ({00000000-0000-0000-0000-000000000000})
  578. 1810.371:0029:trace:rpc:UuidCompare ({00000000-0000-0000-0000-000000000000},{00000000-0000-0000-0000-000000000000})
  579. 1810.372:0029:trace:heap:RtlAllocateHeap (0x110000,7000006a,00000018): returning 0x12ac80
  580. 1810.372:0029:trace:heap:RtlAllocateHeap (0x110000,7000006a,00000048): returning 0x12aca8
  581. 1810.372:0029:trace:file:WriteFile 0x10 0x12aca8 72 0x34f5c8 (nil)
  582. 1810.372:0029:trace:ntdll:NtWriteFile (0x10,(nil),(nil),(nil),0x34f554,0x12aca8,0x00000048,(nil),(nil))!
  583. 1810.372:002a:trace:ntdll:NtReadFile = SUCCESS (16)
  584. 1810.372:002a:trace:heap:RtlAllocateHeap (0x110000,70000062,00000018): returning 0x11ed68
  585. 1810.372:002a:trace:file:ReadFile 0x34 0x11ed78 8 0x54e888 (nil)
  586. 1810.372:002a:trace:ntdll:NtReadFile (0x34,(nil),(nil),(nil),0x54e814,0x11ed78,0x00000008,(nil),(nil)),partial stub!
  587. 1810.372:002a:trace:ntdll:NtReadFile = SUCCESS (8)
  588. 1810.372:002a:trace:heap:RtlAllocateHeap (0x110000,70000062,00000030): returning 0x11ed90
  589. 1810.372:002a:trace:file:ReadFile 0x34 0x11ed90 48 0x54e888 (nil)
  590. 1810.372:002a:trace:ntdll:NtReadFile (0x34,(nil),(nil),(nil),0x54e814,0x11ed90,0x00000030,(nil),(nil)),partial stub!
  591. 1810.372:002a:trace:ntdll:NtReadFile = SUCCESS (48)
  592. 1810.372:002a:trace:rpc:RPCRT4_ReceiveWithAuth buffer length = 48
  593. 1810.372:002a:trace:heap:RtlAllocateHeap (0x110000,70000062,00000030): returning 0x11edd0
  594. 1810.372:002a:trace:heap:RtlFreeHeap (0x110000,70000062,0x11ed90): returning TRUE
  595. 1810.372:002a:trace:rpc:RPCRT4_io_thread got request packet
  596. 1810.373:002a:trace:heap:RtlAllocateHeap (0x110000,70000062,00000014): returning 0x11ee10
  597. 1810.373:002a:trace:thread:QueueUserWorkItem (0x7ed853f0,0x11ee10,0x00000010)
  598. 1810.373:002a:trace:heap:RtlAllocateHeap (0x110000,70000062,00000010): returning 0x11ee38
  599. 002a: release_semaphore( handle=0048, count=00000001 )
  600. 1810.373:0029:trace:ntdll:NtWriteFile = SUCCESS (72)
  601. 002c: *wakeup* signaled=0
  602. 002a: release_semaphore() = 0 { prev_count=00000000 }
  603. 1810.373:0029:trace:heap:RtlFreeHeap (0x110000,70000062,0x12aca8): returning TRUE
  604. 1810.373:002a:trace:heap:RtlAllocateHeap (0x110000,7000006a,0000002c): returning 0x11ee58
  605. 1810.373:002a:trace:rpc:RPCRT4_ReceiveWithAuth (0x119728, 0x54e9b0, 0x11ee58, 0x54e9b4)
  606. 1810.373:002a:trace:rpc:RPCRT4_default_receive_fragment (0x119728, 0x54e9b0, 0x54e958)
  607. 1810.373:002a:trace:file:ReadFile 0x34 0x54e8cc 16 0x54e888 (nil)
  608. 1810.373:0029:trace:heap:RtlFreeHeap (0x110000,70000062,0x12ac80): returning TRUE
  609. 1810.373:002a:trace:ntdll:NtReadFile (0x34,(nil),(nil),(nil),0x54e814,0x54e8cc,0x00000010,(nil),(nil)),partial stub!
  610. 1810.373:0029:trace:rpc:I_RpcReceive (0x34f7ac)
  611. 1810.373:0029:trace:rpc:RPCRT4_ReceiveWithAuth (0x1136f8, 0x34f6b8, 0x34f7ac, (nil))
  612. 1810.373:002c:trace:heap:RtlFreeHeap (0x110000,70000062,0x11ee38): returning TRUE
  613. 1810.373:0029:trace:rpc:RPCRT4_default_receive_fragment (0x1136f8, 0x34f6b8, 0x34f658)
  614. 1810.373:002c:trace:threadpool:worker_thread_proc executing 0x7ed853f0(0x11ee10)
  615. 1810.373:0029:trace:file:ReadFile 0x10 0x34f5cc 16 0x34f588 (nil)
  616. 1810.373:002c:trace:rpc:RPCRT4_process_packet got request packet
  617. 1810.373:0029:trace:ntdll:NtReadFile (0x10,(nil),(nil),(nil),0x34f514,0x34f5cc,0x00000010,(nil),(nil)),partial stub!
  618. 1810.373:002c:trace:rpc:UuidIsNil ({367abb81-9844-35f1-ad32-98f038001003})
  619. 1810.373:002c:trace:rpc:UuidCompare ({367abb81-9844-35f1-ad32-98f038001003},{00000000-0000-0000-0000-000000000000})
  620. 1810.373:002c:trace:rpc:UuidEqual ({00000000-0000-0000-0000-000000000000},{00000000-0000-0000-0000-000000000000})
  621. 1810.373:002c:trace:rpc:UuidCompare ({00000000-0000-0000-0000-000000000000},{00000000-0000-0000-0000-000000000000})
  622. 1810.373:002c:trace:rpc:RPCRT4_find_interface returning 0x114c18 for object (null), if_id { 2.0 {367abb81-9844-35f1-ad32-98f038001003} }
  623. 1810.373:002c:trace:rpc:NdrServerInitializeNew (pRpcMsg == ^0x11ec00, pStubMsg == ^0xa5e714, pStubDesc == ^0x7eddfe40)
  624. 1810.373:002c:trace:ole:NdrServerContextNewUnmarshall (0xa5e714, 0x7eddba30)
  625. 1810.373:002c:trace:ole:NDRSContextUnmarshall2 (0x1199c8 0x11edd0 00000010 (nil) 0)
  626. 1810.373:002c:trace:rpc:UuidIsNil ({92012f8d-c0c0-4122-9d47-70a5ee8c3e08})
  627. 1810.373:002c:trace:rpc:UuidCompare ({92012f8d-c0c0-4122-9d47-70a5ee8c3e08},{00000000-0000-0000-0000-000000000000})
  628. 1810.373:002c:trace:rpc:RpcServerAssoc_FindContextHandle found 0x11a0e0
  629. 1810.373:002c:trace:heap:RtlAllocateHeap (0x110000,70000062,00000008): returning 0x11ee98
  630. 1810.373:002c:trace:ole:NdrSimpleStructUnmarshall (0xa5e714,0xa5e7f8,0x7eddba34,0)
  631. 1810.373:002c:trace:ole:NdrSimpleStructUnmarshall copying 0x11ede4 to 0x11ede4
  632. 1810.373:002c:trace:service:svcctl_SetServiceStatus (0x11a198, 0x11ede4)
  633. 002c: event_op( handle=0060, op=1 )
  634. 002c: event_op() = 0
  635. 1810.374:002c:trace:rpc:I_RpcGetBuffer (0x11ec00): BufferLength=8
  636. 1810.374:002c:trace:heap:RtlAllocateHeap (0x110000,70000062,00000008): returning 0x11eeb0
  637. 1810.374:002c:trace:rpc:I_RpcGetBuffer Buffer=0x11eeb0
  638. 1810.374:002c:trace:heap:RtlFreeHeap (0x110000,70000062,0x11ee98): returning TRUE
  639. 1810.374:002c:trace:heap:RtlAllocateHeap (0x110000,7000006a,00000018): returning 0x11eec8
  640. 1810.374:002c:trace:heap:RtlAllocateHeap (0x110000,7000006a,0000001c): returning 0x11eef0
  641. 1810.374:002c:trace:file:WriteFile 0x34 0x11eef0 28 0xa5e778 (nil)
  642. 1810.374:002c:trace:ntdll:NtWriteFile (0x34,(nil),(nil),(nil),0xa5e704,0x11eef0,0x0000001c,(nil),(nil))!
  643. 1810.374:002c:trace:ntdll:NtWriteFile = SUCCESS (28)
  644. 1810.374:0029:trace:ntdll:NtReadFile = SUCCESS (16)
  645. 1810.374:002c:trace:heap:RtlFreeHeap (0x110000,70000062,0x11eef0): returning TRUE
  646. 1810.374:0029:trace:heap:RtlAllocateHeap (0x110000,70000062,00000018): returning 0x12ad00
  647. 1810.374:0029:trace:file:ReadFile 0x10 0x12ad10 8 0x34f588 (nil)
  648. 1810.374:0029:trace:ntdll:NtReadFile (0x10,(nil),(nil),(nil),0x34f514,0x12ad10,0x00000008,(nil),(nil)),partial stub!
  649. 1810.374:0029:trace:ntdll:NtReadFile = SUCCESS (8)
  650. 1810.374:002c:trace:heap:RtlFreeHeap (0x110000,70000062,0x11eec8): returning TRUE
  651. 1810.374:002c:trace:rpc:process_request_packet freeing Buffer=0x11edd0
  652. 1810.375:002c:trace:heap:RtlFreeHeap (0x110000,70000062,0x11edd0): returning TRUE
  653. 1810.375:0029:trace:heap:RtlAllocateHeap (0x110000,70000062,00000004): returning 0x12ad28
  654. 1810.375:0029:trace:file:ReadFile 0x10 0x12ad28 4 0x34f588 (nil)
  655. 1810.375:0029:trace:ntdll:NtReadFile (0x10,(nil),(nil),(nil),0x34f514,0x12ad28,0x00000004,(nil),(nil)),partial stub!
  656. 1810.375:0029:trace:ntdll:NtReadFile = SUCCESS (4)
  657. 1810.375:0029:trace:rpc:RPCRT4_ReceiveWithAuth buffer length = 4
  658. 1810.375:002c:trace:heap:RtlFreeHeap (0x110000,70000062,0x11eeb0): returning TRUE
  659. 1810.375:002c:trace:heap:RtlFreeHeap (0x110000,70000062,0x11ed68): returning TRUE
  660. 1810.375:0029:trace:heap:RtlAllocateHeap (0x110000,70000062,00000004): returning 0x12ad40
  661. 1810.375:002c:trace:heap:RtlFreeHeap (0x110000,70000062,0x11ec00): returning TRUE
  662. 1810.375:0029:trace:heap:RtlFreeHeap (0x110000,70000062,0x12ad28): returning TRUE
  663. 1810.375:002c:trace:heap:RtlFreeHeap (0x110000,70000062,0x11ee10): returning TRUE
  664. 002c: select( flags=2, cookie=00a5e708, timeout=+30.0000000, prev_apc=0000, result={}, data={WAIT,handles={0048}} )
  665. 002c: select() = PENDING { timeout=1d0a66fad4fb132 (+30.0000000), call={APC_NONE}, apc_handle=0000 }
  666. 1810.375:0029:trace:heap:RtlFreeHeap (0x110000,70000062,0x12ad00): returning TRUE
  667. 1810.375:0029:trace:heap:RtlFreeHeap (0x110000,70000062,0x12ac38): returning TRUE
  668. 1810.375:0029:trace:rpc:NdrFreeBuffer (pStubMsg == ^0x34f88c)
  669. 1810.375:0029:trace:rpc:I_RpcFreeBuffer (0x34f7ac) Buffer=0x12ad40
  670. 1810.375:0029:trace:rpc:RPCRT4_CloseBinding (Binding == ^0x114108)
  671. 1810.376:0029:trace:heap:RtlFreeHeap (0x110000,70000062,0x12ad40): returning TRUE
  672. 0029: event_op( handle=0038, op=1 )
  673. 002e: *wakeup* signaled=0
  674. 0029: event_op() = 0
  675. 1810.376:0029:trace:service:service_run_main_thread last user process exited, shutting down (timeout: 5000)
  676. 0029: select( flags=2, cookie=0034f6c8, timeout=+5.0000000, prev_apc=0000, result={}, data={WAIT_ALL,handles={0034}} )
  677. 0029: select() = PENDING { timeout=1d0a66f9e691258 (+5.0000000), call={APC_NONE}, apc_handle=0000 }
  678. 1810.376:002e:trace:heap:RtlFreeHeap (0x110000,70000062,0x116890): returning TRUE
  679. 1810.376:002e:trace:service:SetServiceStatus 0x1140d0 30 1 0 0 0 0 2710
  680. 1810.376:002e:trace:rpc:NdrClientInitializeNew (pRpcMessage == ^0x54e64c, pStubMsg == ^0x54e72c, pStubDesc == ^0x7ede7e00, ProcNum == 7)
  681. 1810.376:002e:trace:ole:NDRCContextBinding 0x1140d0
  682. 1810.376:002e:trace:rpc:NdrGetBuffer (stubmsg == ^0x54e72c, buflen == 56, handle == 0x114108)
  683. 1810.376:002e:trace:rpc:I_RpcGetBuffer (0x54e64c): BufferLength=56
  684. 1810.376:002e:trace:heap:RtlAllocateHeap (0x110000,70000062,00000038): returning 0x12ad58
  685. 1810.376:002e:trace:rpc:I_RpcGetBuffer Buffer=0x12ad58
  686. 1810.376:002e:trace:rpc:I_RpcNegotiateTransferSyntax (0x54e64c)
  687. 1810.376:002e:trace:rpc:RPCRT4_OpenBinding (Binding == ^0x114108)
  688. 1810.376:002e:trace:rpc:RpcAssoc_GetIdleConnection got connection from pool 0x1136f8
  689. 1810.376:002e:trace:ole:NdrClientContextMarshall (0x54e72c, 0x1140d0, 0)
  690. 1810.376:002e:trace:ole:NDRCContextMarshall 0x1140d0 0x12ad58
  691. 1810.376:002e:trace:ole:NdrSimpleStructMarshall (0x54e72c,0x54e950,0x7edd57b4)
  692. 1810.376:002e:trace:rpc:NdrSendReceive (stubmsg == ^0x54e72c, buffer == ^0x12ad88)
  693. 1810.376:002e:trace:rpc:I_RpcSendReceive (0x54e64c)
  694. 1810.376:002e:trace:rpc:I_RpcSend (0x54e64c)
  695. 1810.376:002e:trace:rpc:UuidIsNil ({00000000-0000-0000-0000-000000000000})
  696. 1810.376:002e:trace:rpc:UuidCompare ({00000000-0000-0000-0000-000000000000},{00000000-0000-0000-0000-000000000000})
  697. 1810.376:002e:trace:heap:RtlAllocateHeap (0x110000,7000006a,00000018): returning 0x12ada0
  698. 1810.376:002e:trace:heap:RtlAllocateHeap (0x110000,7000006a,00000048): returning 0x12adc8
  699. 1810.376:002e:trace:file:WriteFile 0x10 0x12adc8 72 0x54e468 (nil)
  700. 1810.376:002e:trace:ntdll:NtWriteFile (0x10,(nil),(nil),(nil),0x54e3f4,0x12adc8,0x00000048,(nil),(nil))!
  701. 1810.376:002e:trace:ntdll:NtWriteFile = SUCCESS (72)
  702. 1810.376:002a:trace:ntdll:NtReadFile = SUCCESS (16)
  703. 1810.376:002e:trace:heap:RtlFreeHeap (0x110000,70000062,0x12adc8): returning TRUE
  704. 1810.376:002a:trace:heap:RtlAllocateHeap (0x110000,70000062,00000018): returning 0x11ef20
  705. 1810.376:002a:trace:file:ReadFile 0x34 0x11ef30 8 0x54e888 (nil)
  706. 1810.376:002a:trace:ntdll:NtReadFile (0x34,(nil),(nil),(nil),0x54e814,0x11ef30,0x00000008,(nil),(nil)),partial stub!
  707. 1810.376:002e:trace:heap:RtlFreeHeap (0x110000,70000062,0x12ada0): returning TRUE
  708. 1810.376:002e:trace:rpc:I_RpcReceive (0x54e64c)
  709. 1810.376:002a:trace:ntdll:NtReadFile = SUCCESS (8)
  710. 1810.376:002e:trace:rpc:RPCRT4_ReceiveWithAuth (0x1136f8, 0x54e558, 0x54e64c, (nil))
  711. 1810.376:002e:trace:rpc:RPCRT4_default_receive_fragment (0x1136f8, 0x54e558, 0x54e4f8)
  712. 1810.376:002e:trace:file:ReadFile 0x10 0x54e46c 16 0x54e428 (nil)
  713. 1810.376:002e:trace:ntdll:NtReadFile (0x10,(nil),(nil),(nil),0x54e3b4,0x54e46c,0x00000010,(nil),(nil)),partial stub!
  714. 1810.376:002a:trace:heap:RtlAllocateHeap (0x110000,70000062,00000030): returning 0x11ef48
  715. 1810.376:002a:trace:file:ReadFile 0x34 0x11ef48 48 0x54e888 (nil)
  716. 1810.376:002a:trace:ntdll:NtReadFile (0x34,(nil),(nil),(nil),0x54e814,0x11ef48,0x00000030,(nil),(nil)),partial stub!
  717. 1810.376:002a:trace:ntdll:NtReadFile = SUCCESS (48)
  718. 1810.376:002a:trace:rpc:RPCRT4_ReceiveWithAuth buffer length = 48
  719. 1810.376:002a:trace:heap:RtlAllocateHeap (0x110000,70000062,00000030): returning 0x11ef88
  720. 1810.377:002a:trace:heap:RtlFreeHeap (0x110000,70000062,0x11ef48): returning TRUE
  721. 1810.377:002a:trace:rpc:RPCRT4_io_thread got request packet
  722. 1810.377:002a:trace:heap:RtlAllocateHeap (0x110000,70000062,00000014): returning 0x11efc8
  723. 1810.377:002a:trace:thread:QueueUserWorkItem (0x7ed853f0,0x11efc8,0x00000010)
  724. 1810.377:002a:trace:heap:RtlAllocateHeap (0x110000,70000062,00000010): returning 0x11eff0
  725. 002a: release_semaphore( handle=0048, count=00000001 )
  726. 0027: *wakeup* signaled=0
  727. 002a: release_semaphore() = 0 { prev_count=00000000 }
  728. 1810.377:0027:trace:heap:RtlFreeHeap (0x110000,70000062,0x11eff0): returning TRUE
  729. 1810.377:0027:trace:threadpool:worker_thread_proc executing 0x7ed853f0(0x11efc8)
  730. 1810.377:0027:trace:rpc:RPCRT4_process_packet got request packet
  731. 1810.377:0027:trace:rpc:UuidIsNil ({367abb81-9844-35f1-ad32-98f038001003})
  732. 1810.377:0027:trace:rpc:UuidCompare ({367abb81-9844-35f1-ad32-98f038001003},{00000000-0000-0000-0000-000000000000})
  733. 1810.377:0027:trace:rpc:UuidEqual ({00000000-0000-0000-0000-000000000000},{00000000-0000-0000-0000-000000000000})
  734. 1810.377:0027:trace:rpc:UuidCompare ({00000000-0000-0000-0000-000000000000},{00000000-0000-0000-0000-000000000000})
  735. 1810.377:0027:trace:rpc:RPCRT4_find_interface returning 0x114c18 for object (null), if_id { 2.0 {367abb81-9844-35f1-ad32-98f038001003} }
  736. 1810.377:0027:trace:rpc:NdrServerInitializeNew (pRpcMsg == ^0x11ee58, pStubMsg == ^0x84e714, pStubDesc == ^0x7eddfe40)
  737. 1810.377:0027:trace:ole:NdrServerContextNewUnmarshall (0x84e714, 0x7eddba30)
  738. 1810.377:0027:trace:ole:NDRSContextUnmarshall2 (0x1199c8 0x11ef88 00000010 (nil) 0)
  739. 1810.377:0027:trace:rpc:UuidIsNil ({92012f8d-c0c0-4122-9d47-70a5ee8c3e08})
  740. 1810.377:0027:trace:rpc:UuidCompare ({92012f8d-c0c0-4122-9d47-70a5ee8c3e08},{00000000-0000-0000-0000-000000000000})
  741. 1810.377:0027:trace:rpc:RpcServerAssoc_FindContextHandle found 0x11a0e0
  742. 1810.377:002a:trace:heap:RtlAllocateHeap (0x110000,7000006a,0000002c): returning 0x11f010
  743. 1810.377:002a:trace:rpc:RPCRT4_ReceiveWithAuth (0x119728, 0x54e9b0, 0x11f010, 0x54e9b4)
  744. 1810.377:002a:trace:rpc:RPCRT4_default_receive_fragment (0x119728, 0x54e9b0, 0x54e958)
  745. 1810.377:002a:trace:file:ReadFile 0x34 0x54e8cc 16 0x54e888 (nil)
  746. 1810.377:002a:trace:ntdll:NtReadFile (0x34,(nil),(nil),(nil),0x54e814,0x54e8cc,0x00000010,(nil),(nil)),partial stub!
  747. 1810.377:0027:trace:heap:RtlAllocateHeap (0x110000,70000062,00000008): returning 0x11f050
  748. 1810.377:0027:trace:ole:NdrSimpleStructUnmarshall (0x84e714,0x84e7f8,0x7eddba34,0)
  749. 1810.377:0027:trace:ole:NdrSimpleStructUnmarshall copying 0x11ef9c to 0x11ef9c
  750. 1810.377:0027:trace:service:svcctl_SetServiceStatus (0x11a198, 0x11ef9c)
  751. 1810.377:0027:trace:heap:RtlAllocateHeap (0x110000,70000062,00000018): returning 0x11f068
  752. 0027: event_op( handle=003c, op=1 )
  753. 0027: event_op() = INVALID_HANDLE
  754. 1810.377:0027:trace:rpc:I_RpcGetBuffer (0x11ee58): BufferLength=8
  755. 1810.378:0027:trace:heap:RtlAllocateHeap (0x110000,70000062,00000008): returning 0x11f090
  756. 1810.378:0027:trace:rpc:I_RpcGetBuffer Buffer=0x11f090
  757. 1810.378:0027:trace:heap:RtlFreeHeap (0x110000,70000062,0x11f050): returning TRUE
  758. 1810.378:0027:trace:heap:RtlAllocateHeap (0x110000,7000006a,00000018): returning 0x11f0a8
  759. 1810.378:0027:trace:heap:RtlAllocateHeap (0x110000,7000006a,0000001c): returning 0x11f0d0
  760. 1810.378:0027:trace:file:WriteFile 0x34 0x11f0d0 28 0x84e778 (nil)
  761. 1810.378:0027:trace:ntdll:NtWriteFile (0x34,(nil),(nil),(nil),0x84e704,0x11f0d0,0x0000001c,(nil),(nil))!
  762. 1810.378:0027:trace:ntdll:NtWriteFile = SUCCESS (28)
  763. 1810.378:002e:trace:ntdll:NtReadFile = SUCCESS (16)
  764. 1810.378:0027:trace:heap:RtlFreeHeap (0x110000,70000062,0x11f0d0): returning TRUE
  765. 1810.378:0027:trace:heap:RtlFreeHeap (0x110000,70000062,0x11f0a8): returning TRUE
  766. 1810.378:0027:trace:rpc:process_request_packet freeing Buffer=0x11ef88
  767. 1810.378:002e:trace:heap:RtlAllocateHeap (0x110000,70000062,00000018): returning 0x12ae20
  768. 1810.378:002e:trace:file:ReadFile 0x10 0x12ae30 8 0x54e428 (nil)
  769. 1810.378:002e:trace:ntdll:NtReadFile (0x10,(nil),(nil),(nil),0x54e3b4,0x12ae30,0x00000008,(nil),(nil)),partial stub!
  770. 1810.378:002e:trace:ntdll:NtReadFile = SUCCESS (8)
  771. 1810.378:0027:trace:heap:RtlFreeHeap (0x110000,70000062,0x11ef88): returning TRUE
  772. 1810.378:002e:trace:heap:RtlAllocateHeap (0x110000,70000062,00000004): returning 0x12ae48
  773. 1810.378:002e:trace:file:ReadFile 0x10 0x12ae48 4 0x54e428 (nil)
  774. 1810.378:0027:trace:heap:RtlFreeHeap (0x110000,70000062,0x11f090): returning TRUE
  775. 1810.378:002e:trace:ntdll:NtReadFile (0x10,(nil),(nil),(nil),0x54e3b4,0x12ae48,0x00000004,(nil),(nil)),partial stub!
  776. 1810.378:002e:trace:ntdll:NtReadFile = SUCCESS (4)
  777. 1810.378:002e:trace:rpc:RPCRT4_ReceiveWithAuth buffer length = 4
  778. 1810.378:0027:trace:heap:RtlFreeHeap (0x110000,70000062,0x11ef20): returning TRUE
  779. 1810.378:002e:trace:heap:RtlAllocateHeap (0x110000,70000062,00000004): returning 0x12ae60
  780. 1810.378:0027:trace:heap:RtlFreeHeap (0x110000,70000062,0x11ee58): returning TRUE
  781. 1810.378:0027:trace:heap:RtlFreeHeap (0x110000,70000062,0x11efc8): returning TRUE
  782. 1810.378:002e:trace:heap:RtlFreeHeap (0x110000,70000062,0x12ae48): returning TRUE
  783. 0027: select( flags=2, cookie=0084e708, timeout=+30.0000000, prev_apc=0000, result={}, data={WAIT,handles={0048}} )
  784. 0027: select() = PENDING { timeout=1d0a66fad502bf8 (+30.0000000), call={APC_NONE}, apc_handle=0000 }
  785. 1810.378:002e:trace:heap:RtlFreeHeap (0x110000,70000062,0x12ae20): returning TRUE
  786. 1810.378:002e:trace:heap:RtlFreeHeap (0x110000,70000062,0x12ad58): returning TRUE
  787. 1810.378:002e:trace:rpc:NdrFreeBuffer (pStubMsg == ^0x54e72c)
  788. 1810.378:002e:trace:rpc:I_RpcFreeBuffer (0x54e64c) Buffer=0x12ae60
  789. 1810.378:002e:trace:rpc:RPCRT4_CloseBinding (Binding == ^0x114108)
  790. 1810.379:002e:trace:heap:RtlFreeHeap (0x110000,70000062,0x12ae60): returning TRUE
  791. 002e: event_op( handle=0028, op=1 )
  792. 002e: event_op() = 0
  793. 1810.379:002e:trace:service:CloseServiceHandle 0x1140d0
  794. 1810.379:002e:trace:rpc:NdrClientInitializeNew (pRpcMessage == ^0x54e54c, pStubMsg == ^0x54e62c, pStubDesc == ^0x7ede7e00, ProcNum == 0)
  795. 1810.379:002e:trace:ole:NDRCContextBinding 0x1140d0
  796. 1810.379:002e:trace:rpc:NdrGetBuffer (stubmsg == ^0x54e62c, buflen == 24, handle == 0x114108)
  797. 1810.379:002e:trace:rpc:I_RpcGetBuffer (0x54e54c): BufferLength=24
  798. 1810.379:002e:trace:heap:RtlAllocateHeap (0x110000,70000062,00000018): returning 0x12ae78
  799. 1810.379:002e:trace:rpc:I_RpcGetBuffer Buffer=0x12ae78
  800. 1810.379:002e:trace:rpc:I_RpcNegotiateTransferSyntax (0x54e54c)
  801. 1810.379:002e:trace:rpc:RPCRT4_OpenBinding (Binding == ^0x114108)
  802. 1810.379:002e:trace:rpc:RpcAssoc_GetIdleConnection got connection from pool 0x1136f8
  803. 1810.379:002e:trace:ole:NdrClientContextMarshall (0x54e62c, 0x1140d0, 1)
  804. 1810.379:002e:trace:ole:NDRCContextMarshall 0x1140d0 0x12ae78
  805. 1810.379:002e:trace:rpc:NdrSendReceive (stubmsg == ^0x54e62c, buffer == ^0x12ae8c)
  806. 1810.379:002e:trace:rpc:I_RpcSendReceive (0x54e54c)
  807. 1810.379:002e:trace:rpc:I_RpcSend (0x54e54c)
  808. 1810.379:002e:trace:rpc:UuidIsNil ({00000000-0000-0000-0000-000000000000})
  809. 1810.379:002e:trace:rpc:UuidCompare ({00000000-0000-0000-0000-000000000000},{00000000-0000-0000-0000-000000000000})
  810. 1810.379:002e:trace:heap:RtlAllocateHeap (0x110000,7000006a,00000018): returning 0x12aea0
  811. 1810.379:002e:trace:heap:RtlAllocateHeap (0x110000,7000006a,0000002c): returning 0x12aec8
  812. 1810.379:002e:trace:file:WriteFile 0x10 0x12aec8 44 0x54e378 (nil)
  813. 1810.379:002e:trace:ntdll:NtWriteFile (0x10,(nil),(nil),(nil),0x54e304,0x12aec8,0x0000002c,(nil),(nil))!
  814. 1810.379:002e:trace:ntdll:NtWriteFile = SUCCESS (44)
  815. 1810.379:002a:trace:ntdll:NtReadFile = SUCCESS (16)
  816. 1810.379:002a:trace:heap:RtlAllocateHeap (0x110000,70000062,00000018): returning 0x11f100
  817. 1810.379:002a:trace:file:ReadFile 0x34 0x11f110 8 0x54e888 (nil)
  818. 1810.379:002e:trace:heap:RtlFreeHeap (0x110000,70000062,0x12aec8): returning TRUE
  819. 1810.379:002a:trace:ntdll:NtReadFile (0x34,(nil),(nil),(nil),0x54e814,0x11f110,0x00000008,(nil),(nil)),partial stub!
  820. 1810.379:002a:trace:ntdll:NtReadFile = SUCCESS (8)
  821. 1810.379:002a:trace:heap:RtlAllocateHeap (0x110000,70000062,00000014): returning 0x11f128
  822. 1810.379:002a:trace:file:ReadFile 0x34 0x11f128 20 0x54e888 (nil)
  823. 1810.379:002e:trace:heap:RtlFreeHeap (0x110000,70000062,0x12aea0): returning TRUE
  824. 1810.379:002a:trace:ntdll:NtReadFile (0x34,(nil),(nil),(nil),0x54e814,0x11f128,0x00000014,(nil),(nil)),partial stub!
  825. 1810.379:002e:trace:rpc:I_RpcReceive (0x54e54c)
  826. 1810.379:002a:trace:ntdll:NtReadFile = SUCCESS (20)
  827. 1810.379:002e:trace:rpc:RPCRT4_ReceiveWithAuth (0x1136f8, 0x54e468, 0x54e54c, (nil))
  828. 1810.379:002a:trace:rpc:RPCRT4_ReceiveWithAuth buffer length = 20
  829. 1810.379:002e:trace:rpc:RPCRT4_default_receive_fragment (0x1136f8, 0x54e468, 0x54e408)
  830. 1810.379:002e:trace:file:ReadFile 0x10 0x54e37c 16 0x54e338 (nil)
  831. 1810.379:002e:trace:ntdll:NtReadFile (0x10,(nil),(nil),(nil),0x54e2c4,0x54e37c,0x00000010,(nil),(nil)),partial stub!
  832. 1810.379:002a:trace:heap:RtlAllocateHeap (0x110000,70000062,00000014): returning 0x11f150
  833. 1810.379:002a:trace:heap:RtlFreeHeap (0x110000,70000062,0x11f128): returning TRUE
  834. 1810.379:002a:trace:rpc:RPCRT4_io_thread got request packet
  835. 1810.379:002a:trace:heap:RtlAllocateHeap (0x110000,70000062,00000014): returning 0x11f178
  836. 1810.379:002a:trace:thread:QueueUserWorkItem (0x7ed853f0,0x11f178,0x00000010)
  837. 1810.379:002a:trace:heap:RtlAllocateHeap (0x110000,70000062,00000010): returning 0x11f1a0
  838. 002a: release_semaphore( handle=0048, count=00000001 )
  839. 002c: *wakeup* signaled=0
  840. 002a: release_semaphore() = 0 { prev_count=00000000 }
  841. 1810.380:002c:trace:heap:RtlFreeHeap (0x110000,70000062,0x11f1a0): returning TRUE
  842. 1810.380:002c:trace:threadpool:worker_thread_proc executing 0x7ed853f0(0x11f178)
  843. 1810.380:002c:trace:rpc:RPCRT4_process_packet got request packet
  844. 1810.380:002c:trace:rpc:UuidIsNil ({367abb81-9844-35f1-ad32-98f038001003})
  845. 1810.380:002c:trace:rpc:UuidCompare ({367abb81-9844-35f1-ad32-98f038001003},{00000000-0000-0000-0000-000000000000})
  846. 1810.380:002c:trace:rpc:UuidEqual ({00000000-0000-0000-0000-000000000000},{00000000-0000-0000-0000-000000000000})
  847. 1810.380:002c:trace:rpc:UuidCompare ({00000000-0000-0000-0000-000000000000},{00000000-0000-0000-0000-000000000000})
  848. 1810.380:002c:trace:rpc:RPCRT4_find_interface returning 0x114c18 for object (null), if_id { 2.0 {367abb81-9844-35f1-ad32-98f038001003} }
  849. 1810.380:002c:trace:rpc:NdrServerInitializeNew (pRpcMsg == ^0x11f010, pStubMsg == ^0xa5e718, pStubDesc == ^0x7eddfe40)
  850. 1810.380:002a:trace:heap:RtlAllocateHeap (0x110000,7000006a,0000002c): returning 0x11f1c0
  851. 1810.380:002c:trace:ole:NdrServerContextNewUnmarshall (0xa5e718, 0x7eddba04)
  852. 1810.380:002a:trace:rpc:RPCRT4_ReceiveWithAuth (0x119728, 0x54e9b0, 0x11f1c0, 0x54e9b4)
  853. 1810.380:002c:trace:ole:NDRSContextUnmarshall2 (0x1199c8 0x11f150 00000010 (nil) 0)
  854. 1810.380:002a:trace:rpc:RPCRT4_default_receive_fragment (0x119728, 0x54e9b0, 0x54e958)
  855. 1810.380:002c:trace:rpc:UuidIsNil ({92012f8d-c0c0-4122-9d47-70a5ee8c3e08})
  856. 1810.380:002a:trace:file:ReadFile 0x34 0x54e8cc 16 0x54e888 (nil)
  857. 1810.380:002a:trace:ntdll:NtReadFile (0x34,(nil),(nil),(nil),0x54e814,0x54e8cc,0x00000010,(nil),(nil)),partial stub!
  858. 1810.380:002c:trace:rpc:UuidCompare ({92012f8d-c0c0-4122-9d47-70a5ee8c3e08},{00000000-0000-0000-0000-000000000000})
  859. 1810.380:002c:trace:rpc:RpcServerAssoc_FindContextHandle found 0x11a0e0
  860. 1810.380:002c:trace:heap:RtlAllocateHeap (0x110000,70000062,00000008): returning 0x11f200
  861. 1810.380:002c:trace:service:svcctl_CloseServiceHandle (&0x11a198)
  862. 1810.380:002c:trace:heap:RtlFreeHeap (0x110000,70000062,0x11a198): returning TRUE
  863. 1810.380:002c:trace:rpc:I_RpcGetBuffer (0x11f010): BufferLength=32
  864. 1810.380:002c:trace:heap:RtlAllocateHeap (0x110000,70000062,00000020): returning 0x11f218
  865. 1810.380:002c:trace:rpc:I_RpcGetBuffer Buffer=0x11f218
  866. 1810.380:002c:trace:ole:NdrServerContextNewMarshall (0xa5e718, 0x11a0e0, 0x7edd0770, 0x7eddba04)
  867. 1810.380:002c:trace:ole:NDRSContextMarshall2 (0x1199c8 0x11a0e0 0x11f218 0x7edd0770 (nil) 0)
  868. 1810.380:002c:trace:heap:RtlFreeHeap (0x110000,70000062,0x11f200): returning TRUE
  869. 1810.380:002c:trace:rpc:RpcContextHandle_Destroy freeing 0x11a0e0
  870. 002c: close_handle( handle=0088 )
  871. 002c: close_handle() = 0
  872. 002c: close_handle( handle=008c )
  873. 002c: close_handle() = 0
  874. 1810.380:002c:trace:heap:RtlFreeHeap (0x110000,70000062,0x11a150): returning TRUE
  875. 1810.380:002c:trace:heap:RtlFreeHeap (0x110000,70000062,0x11a0e0): returning TRUE
  876. 1810.380:002c:trace:heap:RtlAllocateHeap (0x110000,7000006a,00000018): returning 0x11f248
  877. 1810.380:002c:trace:heap:RtlAllocateHeap (0x110000,7000006a,00000030): returning 0x11f270
  878. 1810.380:002c:trace:file:WriteFile 0x34 0x11f270 48 0xa5e778 (nil)
  879. 1810.380:002c:trace:ntdll:NtWriteFile (0x34,(nil),(nil),(nil),0xa5e704,0x11f270,0x00000030,(nil),(nil))!
  880. 1810.380:002c:trace:ntdll:NtWriteFile = SUCCESS (48)
  881. 1810.380:002e:trace:ntdll:NtReadFile = SUCCESS (16)
  882. 1810.381:002c:trace:heap:RtlFreeHeap (0x110000,70000062,0x11f270): returning TRUE
  883. 1810.381:002e:trace:heap:RtlAllocateHeap (0x110000,70000062,00000018): returning 0x12af08
  884. 1810.381:002e:trace:file:ReadFile 0x10 0x12af18 8 0x54e338 (nil)
  885. 1810.381:002e:trace:ntdll:NtReadFile (0x10,(nil),(nil),(nil),0x54e2c4,0x12af18,0x00000008,(nil),(nil)),partial stub!
  886. 1810.381:002c:trace:heap:RtlFreeHeap (0x110000,70000062,0x11f248): returning TRUE
  887. 1810.381:002e:trace:ntdll:NtReadFile = SUCCESS (8)
  888. 1810.381:002c:trace:rpc:process_request_packet freeing Buffer=0x11f150
  889. 1810.381:002c:trace:heap:RtlFreeHeap (0x110000,70000062,0x11f150): returning TRUE
  890. 1810.381:002e:trace:heap:RtlAllocateHeap (0x110000,70000062,00000018): returning 0x12af30
  891. 1810.381:002e:trace:file:ReadFile 0x10 0x12af30 24 0x54e338 (nil)
  892. 1810.381:002e:trace:ntdll:NtReadFile (0x10,(nil),(nil),(nil),0x54e2c4,0x12af30,0x00000018,(nil),(nil)),partial stub!
  893. 1810.381:002e:trace:ntdll:NtReadFile = SUCCESS (24)
  894. 1810.381:002e:trace:rpc:RPCRT4_ReceiveWithAuth buffer length = 24
  895. 1810.381:002c:trace:heap:RtlFreeHeap (0x110000,70000062,0x11f218): returning TRUE
  896. 1810.381:002c:trace:heap:RtlFreeHeap (0x110000,70000062,0x11f100): returning TRUE
  897. 1810.381:002e:trace:heap:RtlAllocateHeap (0x110000,70000062,00000018): returning 0x12af58
  898. 1810.381:002c:trace:heap:RtlFreeHeap (0x110000,70000062,0x11f010): returning TRUE
  899. 1810.381:002e:trace:heap:RtlFreeHeap (0x110000,70000062,0x12af30): returning TRUE
  900. 1810.381:002c:trace:heap:RtlFreeHeap (0x110000,70000062,0x11f178): returning TRUE
  901. 002c: select( flags=2, cookie=00a5e708, timeout=+30.0000000, prev_apc=0000, result={}, data={WAIT,handles={0048}} )
  902. 1810.381:002e:trace:heap:RtlFreeHeap (0x110000,70000062,0x12af08): returning TRUE
  903. 002c: select() = PENDING { timeout=1d0a66fad5097c8 (+30.0000000), call={APC_NONE}, apc_handle=0000 }
  904. 1810.381:002e:trace:heap:RtlFreeHeap (0x110000,70000062,0x12ae78): returning TRUE
  905. 1810.381:002e:trace:ole:NdrClientContextUnmarshall (0x54e62c, 0x54e75c, 0x114108)
  906. 1810.381:002e:trace:ole:NDRCContextUnmarshall *0x54e75c=(0x1140d0) 0x114108 0x12af58 00000010
  907. 1810.381:002e:trace:rpc:RpcBindingFree (0x1140dc) = 0x114108
  908. 1810.381:002e:trace:heap:RtlFreeHeap (0x110000,70000062,0x1140d0): returning TRUE
  909. 1810.381:002e:trace:rpc:NdrFreeBuffer (pStubMsg == ^0x54e62c)
  910. 1810.381:002e:trace:rpc:I_RpcFreeBuffer (0x54e54c) Buffer=0x12af58
  911. 1810.381:002e:trace:rpc:RPCRT4_CloseBinding (Binding == ^0x114108)
  912. 1810.381:002e:trace:rpc:RPCRT4_ReleaseBinding binding: 0x114108
  913. 1810.381:002e:trace:heap:RtlFreeHeap (0x110000,70000062,0x114198): returning TRUE
  914. 1810.381:002e:trace:heap:RtlFreeHeap (0x110000,70000062,0x114180): returning TRUE
  915. 1810.381:002e:trace:heap:RtlFreeHeap (0x110000,70000062,0x114160): returning TRUE
  916. 1810.382:002e:trace:heap:RtlFreeHeap (0x110000,70000062,0x114108): returning TRUE
  917. 1810.382:002e:trace:heap:RtlFreeHeap (0x110000,70000062,0x12af58): returning TRUE
  918. 1810.382:002e:trace:winedevice:ServiceMain service L"MountMgr" stopped
  919. 1810.382:002e:trace:heap:RtlFreeHeap (0x110000,70000062,0x114418): returning TRUE
  920. 1810.382:002e:trace:module:LdrShutdownThread ()
  921. 1810.382:002e:trace:module:MODULE_InitDLL (0x7e7c0000 L"user32.dll",THREAD_DETACH,(nil)) - CALL
  922. 002e: close_handle( handle=0000 )
  923. 002e: close_handle() = INVALID_HANDLE
  924. 1810.382:002e:trace:module:MODULE_InitDLL (0x7e7c0000,THREAD_DETACH,(nil)) - RETURN 1
  925. 1810.382:002e:trace:module:MODULE_InitDLL (0x7ecd0000 L"rpcrt4.dll",THREAD_DETACH,(nil)) - CALL
  926. 1810.382:002e:trace:heap:RtlFreeHeap (0x110000,70000062,0x1144e0): returning TRUE
  927. 1810.382:002e:trace:heap:RtlFreeHeap (0x110000,70000062,0x1144a0): returning TRUE
  928. 1810.382:002e:trace:module:MODULE_InitDLL (0x7ecd0000,THREAD_DETACH,(nil)) - RETURN 1
  929. 002e: *killed* exit_code=0
  930. 0029: *wakeup* signaled=0
  931. 0029: terminate_process( handle=0000, exit_code=0 )
  932. 002d: *killed* exit_code=0
  933. 002d: *sent signal* signal=3
  934. 002f: *killed* exit_code=0
  935. 002f: *sent signal* signal=3
  936. 0029: terminate_process() = 0 { self=1 }
  937. 1810.382:0029:trace:module:LdrShutdownProcess ()
  938. 1810.382:0029:trace:module:MODULE_InitDLL (0x7e7c0000 L"user32.dll",PROCESS_DETACH,0x1) - CALL
  939. 1810.383:0029:trace:heap:RtlFreeHeap (0x110000,70000062,0x1220d0): returning TRUE
  940. 1810.383:0029:trace:module:MODULE_InitDLL (0x7e7c0000,PROCESS_DETACH,0x1) - RETURN 1
  941. 1810.383:0029:trace:module:MODULE_InitDLL (0x7ec90000 L"version.dll",PROCESS_DETACH,0x1) - CALL
  942. 1810.383:0029:trace:module:MODULE_InitDLL (0x7ec90000,PROCESS_DETACH,0x1) - RETURN 1
  943. 1810.383:0029:trace:module:MODULE_InitDLL (0x7e6a0000 L"gdi32.dll",PROCESS_DETACH,0x1) - CALL
  944. 1810.383:0029:trace:module:MODULE_InitDLL (0x7e6a0000,PROCESS_DETACH,0x1) - RETURN 1
  945. 1810.383:0029:trace:module:MODULE_InitDLL (0x7ecd0000 L"rpcrt4.dll",PROCESS_DETACH,0x1) - CALL
  946. 1810.383:0029:trace:module:MODULE_InitDLL (0x7ecd0000,PROCESS_DETACH,0x1) - RETURN 1
  947. 1810.383:0029:trace:module:MODULE_InitDLL (0x7ed40000 L"ntoskrnl.exe",PROCESS_DETACH,0x1) - CALL
  948. 1810.383:0029:trace:module:MODULE_InitDLL (0x7ed40000,PROCESS_DETACH,0x1) - RETURN 1
  949. 1810.383:0029:trace:module:MODULE_InitDLL (0x7ed90000 L"advapi32.dll",PROCESS_DETACH,0x1) - CALL
  950. 1810.383:0029:trace:module:MODULE_InitDLL (0x7ed90000,PROCESS_DETACH,0x1) - RETURN 1
  951. 1810.383:0029:trace:module:MODULE_InitDLL (0x7b810000 L"KERNEL32.dll",PROCESS_DETACH,0x1) - CALL
  952. 1810.383:0029:trace:module:MODULE_InitDLL (0x7b810000,PROCESS_DETACH,0x1) - RETURN 1
  953. 1810.383:0029:trace:module:MODULE_InitDLL (0x7bc10000 L"ntdll.dll",PROCESS_DETACH,0x1) - CALL
  954. 1810.383:0029:trace:module:MODULE_InitDLL (0x7bc10000,PROCESS_DETACH,0x1) - RETURN 1
  955. 0029: terminate_process( handle=ffffffff, exit_code=0 )
  956. 0029: terminate_process() = 0 { self=1 }
  957. 1810.383:0029:trace:module:LdrUnloadDll (0x7ecd0000)
  958. 1810.383:0029:trace:module:LdrUnloadDll (0x7e7c0000)
  959. 0029: *killed* exit_code=0
  960. 1810.384:002a:trace:ntdll:NtReadFile = 0xc000014b
  961. 000d: *wakeup* signaled=0
  962. 1810.384:002a:warn:rpc:RPCRT4_default_receive_fragment Short read of header, -1 bytes
  963. 1810.384:002a:warn:rpc:RPCRT4_io_thread receive failed with error 6be
  964. 0028: *process killed*
  965. 000d: close_handle( handle=007c )
  966. 000d: close_handle() = 0
  967. 000d: close_handle( handle=001c )
  968. 000d: close_handle() = 0
  969. 1810.385:002a:trace:heap:RtlFreeHeap (0x110000,70000062,0x11f1c0): returning TRUE
  970. 1810.385:002a:trace:rpc:RPCRT4_ReleaseConnection destroying connection 0x119728
  971. 1810.385:002a:trace:rpc:RPCRT4_CloseConnection (Connection == ^0x119728)
  972. 002a: flush_file( handle=0034 )
  973. 002a: flush_file() = 0 { event=0000 }
  974. 1810.385:000d:trace:heap:RtlFreeHeap (0x110000,70000062,0x1149f0): returning TRUE
  975. 002a: close_handle( handle=0034 )
  976. 002a: close_handle() = 0
  977. 002a: close_handle( handle=0040 )
  978. 002a: close_handle() = 0
  979. 1810.385:000d:trace:heap:RtlFreeHeap (0x110000,70000062,0x1149b8): returning TRUE
  980. 1810.385:000d:trace:userenv:DestroyEnvironmentBlock 0x850000
  981. 1810.385:000d:trace:environ:RtlDestroyEnvironment (0x850000)!
  982. 1810.385:000d:trace:virtual:NtFreeVirtualMemory 0xffffffff 0x850000 00000000 8000
  983. 1810.385:002a:trace:heap:RtlFreeHeap (0x110000,70000062,0x1197c0): returning TRUE
  984. 1810.385:002a:trace:rpc:RPCRT4_ReleaseBinding binding: 0x1199c8
  985. 1810.385:002a:trace:rpc:RpcAssoc_Release destroying assoc 0x119a60
  986. 1810.385:002a:trace:rpc:RpcContextHandle_Destroy freeing 0x119db0
  987. 1810.385:002a:trace:rpc:RpcContextHandle_Destroy calling rundown routine 0x7edd0770 with user context 0x119e68
  988. 1810.385:002a:trace:heap:RtlFreeHeap (0x110000,70000062,0x119e68): returning TRUE
  989. 002a: close_handle( handle=0078 )
  990. 002a: close_handle() = 0
  991. 002a: close_handle( handle=0084 )
  992. 002a: close_handle() = 0
  993. 1810.385:002a:trace:heap:RtlFreeHeap (0x110000,70000062,0x119e20): returning TRUE
  994. 1810.385:002a:trace:heap:RtlFreeHeap (0x110000,70000062,0x119db0): returning TRUE
  995. 1810.385:002a:trace:rpc:RpcContextHandle_Destroy freeing 0x11a3a8
  996. 1810.385:002a:trace:rpc:RpcContextHandle_Destroy calling rundown routine 0x7edd0770 with user context 0x11a460
  997. 1810.385:002a:trace:heap:RtlFreeHeap (0x110000,70000062,0x11a460): returning TRUE
  998. 002a: close_handle( handle=0090 )
  999. 002a: close_handle() = 0
  1000. 002a: close_handle( handle=0094 )
  1001. 002a: close_handle() = 0
  1002. 1810.385:002a:trace:heap:RtlFreeHeap (0x110000,70000062,0x11a418): returning TRUE
  1003. 1810.386:002a:trace:heap:RtlFreeHeap (0x110000,70000062,0x11a3a8): returning TRUE
  1004. 1810.386:002a:trace:heap:RtlFreeHeap (0x110000,70000062,0x119b18): returning TRUE
  1005. 1810.386:002a:trace:heap:RtlFreeHeap (0x110000,70000062,0x119af8): returning TRUE
  1006. 1810.386:002a:trace:heap:RtlFreeHeap (0x110000,70000062,0x119ac8): returning TRUE
  1007. 1810.386:002a:trace:heap:RtlFreeHeap (0x110000,70000062,0x119a60): returning TRUE
  1008. 1810.386:002a:trace:heap:RtlFreeHeap (0x110000,70000062,0x119a40): returning TRUE
  1009. 1810.386:002a:trace:heap:RtlFreeHeap (0x110000,70000062,0x119a20): returning TRUE
  1010. 1810.386:002a:trace:heap:RtlFreeHeap (0x110000,70000062,0x1199c8): returning TRUE
  1011. 1810.386:002a:trace:heap:RtlFreeHeap (0x110000,70000062,0x119728): returning TRUE
  1012. 1810.386:002a:trace:module:LdrShutdownThread ()
  1013. 1810.386:002a:trace:module:MODULE_InitDLL (0x7ed50000 L"rpcrt4.dll",THREAD_DETACH,(nil)) - CALL
  1014. 1810.386:002a:trace:heap:RtlFreeHeap (0x110000,70000062,0x1198c0): returning TRUE
  1015. 1810.386:002a:trace:heap:RtlFreeHeap (0x110000,70000062,0x119880): returning TRUE
  1016. 1810.386:002a:trace:module:MODULE_InitDLL (0x7ed50000,THREAD_DETACH,(nil)) - RETURN 1
  1017. 1810.386:002a:trace:virtual:NtFreeVirtualMemory 0xffffffff 0x550000 00000000 8000
  1018. 1810.386:000d:trace:heap:RtlFreeHeap (0xffbf0000,70000061,0xffbf1588): returning TRUE
  1019. 1810.386:000d:trace:service:main services.exe exited with code 0
  1020. 000d: terminate_process( handle=0000, exit_code=0 )
  1021. 000e: *killed* exit_code=0
  1022. 0027: *killed* exit_code=0
  1023. 002a: *killed* exit_code=0
  1024. 002a: *sent signal* signal=3
  1025. 002b: *killed* exit_code=0
  1026. 002c: *killed* exit_code=0
  1027. 000d: terminate_process() = 0 { self=1 }
  1028. 1810.387:000d:trace:module:LdrShutdownProcess ()
  1029. 1810.387:000d:trace:module:MODULE_InitDLL (0x7eff0000 L"userenv.dll",PROCESS_DETACH,0x1) - CALL
  1030. 1810.387:000d:trace:userenv:DllMain 0x7eff0000 0 0x1
  1031. 1810.387:000d:trace:module:MODULE_InitDLL (0x7eff0000,PROCESS_DETACH,0x1) - RETURN 1
  1032. 1810.387:000d:trace:module:MODULE_InitDLL (0x7ed50000 L"rpcrt4.dll",PROCESS_DETACH,0x1) - CALL
  1033. 1810.387:000d:trace:module:MODULE_InitDLL (0x7ed50000,PROCESS_DETACH,0x1) - RETURN 1
  1034. 1810.387:000d:trace:module:MODULE_InitDLL (0x7ece0000 L"advapi32.dll",PROCESS_DETACH,0x1) - CALL
  1035. 1810.387:000d:trace:module:MODULE_InitDLL (0x7ece0000,PROCESS_DETACH,0x1) - RETURN 1
  1036. 1810.387:000d:trace:module:MODULE_InitDLL (0x7b810000 L"KERNEL32.dll",PROCESS_DETACH,0x1) - CALL
  1037. 1810.387:000d:trace:module:MODULE_InitDLL (0x7b810000,PROCESS_DETACH,0x1) - RETURN 1
  1038. 1810.387:000d:trace:module:MODULE_InitDLL (0x7bc10000 L"ntdll.dll",PROCESS_DETACH,0x1) - CALL
  1039. 1810.387:000d:trace:module:MODULE_InitDLL (0x7bc10000,PROCESS_DETACH,0x1) - RETURN 1
  1040. 000d: terminate_process( handle=ffffffff, exit_code=0 )
  1041. 000d: terminate_process() = 0 { self=1 }
  1042. 000d: *killed* exit_code=0
  1043. 000c: *process killed*
  1044. wineserver: exiting (pid=12566)
  1045. ^C
RAW Paste Data