Jump to content

Makinero

Members
  • Posts

    18
  • Joined

  • Last visited

Reputation

0 Neutral

Recent Profile Visitors

1,228 profile views
  1. Error installing Malwarebytes. This very strange window shows up! Windows 7 64-bit
  2. Report bugs/false False Information. The program is completely virus-free. It is simply unpopular, but it is an application known on the Internet! This is a very good tool!!! MasterSeeker.exe RiskWare.Suspicious.TaskExecution http://www.master-seeker.com/ Additionally, all other important entries (Task & Registry) you need related to MasterSeeker (UAC bypass) Isssu 2: Why can't I Maximize the window [HISTORY DETECT] to FULL HD WINDOW The reduced window is very uncomfortable on long paths.
  3. Some CAPTCHA is simple, but it still does not work, and asks for another CAPTCHA.
  4. How do I disable these silly CAPTCHA (when posting)? I do not want to play, I will not waste time. I fill CAPTCHA a million times, and it still shows that it's wrong and wrong and wrong and wrong and wrong !!! and wrong and wrong and wrong and wrong !!! and wrong and wrong and wrong and wrong !!!and wrong and wrong and wrong and wrong !!!and wrong and wrong and wrong and wrong !!!and wrong and wrong and wrong and wrong !!!and wrong and wrong and wrong and wrong !!!and wrong and wrong and wrong and wrong !!! and wrong and wrong and wrong and wrong !!! and wrong and wrong and wrong and wrong !!! and wrong and wrong and wrong and wrong !!! and wrong and wrong and wrong and wrong !!! This is a stupid CAPTCHA! It does not always work! Example: https://postimg.cc/xX0GjDWp
  5. Reproduce: Możesz pobrać Antimalwarebytes i Driver Genius 19 w wersji próbnej, jeśli się pojawi, spróbuj zamknąć aplikację na tacy systemowej. Pojawi się awaria / awaria. Całkowicie odinstalowałem MBAM i problem nie występuje. Nie będę już instalował problematycznego produktu MBAM. Czy możesz polecić mi inny, lepszy skaner antywirusowy? Reproduce: You can download Antimalwarebytes and Driver Genius 19 in the trial version, if it appears, try closing the application on the system tray. A failure / malfunction will appear. I completely uninstalled MBAM and the problem does not occur. I will no longer install the problematic MBAM product. Can you recommend me another, better antivirus scanner?
  6. Malwarebytes - one of the modules causes crashes in another program Driver Genius 19 ............. Loading unloaded module list .. This dump file has an exception of interest stored in it. The stored exception information can be accessed via .ecxr. (1248.124c): Unknown exception - code c000041d (first/second chance not available) eax=fffffffe ebx=000300aa ecx=00000000 edx=00000000 esi=0000a918 edi=00000000 eip=7614269a esp=0018d2b0 ebp=0018d2c8 iopl=0 nv up ei pl zr na pe nc cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00000246 user32!NtUserSetWindowRgn+0x15: 7614269a 83c404 add esp,4 0:000> !analyze -v ******************************************************************************* * * * Exception Analysis * * * ******************************************************************************* *** ERROR: Symbol file could not be found. Defaulted to export symbols for CodejockCommandBars.ocx - Unable to load image C:\Windows\System32\msvbvm60.dll, Win32 error 0n2 *** WARNING: Unable to verify timestamp for msvbvm60.dll *** ERROR: Module load completed but symbols could not be loaded for msvbvm60.dll *** ERROR: Module load completed but symbols could not be loaded for DriverGenius.exe GetUrlPageData2 (WinHttp) failed: 12002. DUMP_CLASS: 2 DUMP_QUALIFIER: 400 CONTEXT: (.ecxr) eax=fffffffe ebx=000300aa ecx=00000000 edx=00000000 esi=0000a918 edi=00000000 eip=7614269a esp=0018d2b0 ebp=0018d2c8 iopl=0 nv up ei pl zr na pe nc cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00000246 user32!NtUserSetWindowRgn+0x15: 7614269a 83c404 add esp,4 Resetting default scope FAULTING_IP: +0 74ac4eb9 41 inc ecx EXCEPTION_RECORD: (.exr -1) ExceptionAddress: 74ac4eb9 ExceptionCode: c000041d ExceptionFlags: 00000001 NumberParameters: 0 PROCESS_NAME: DriverGenius.exe ERROR_CODE: (NTSTATUS) 0xc000041d - <Unable to get error code text> EXCEPTION_CODE: (NTSTATUS) 0xc000041d - <Unable to get error code text> EXCEPTION_CODE_STR: c000041d WATSON_BKT_PROCSTAMP: 5c7655fd WATSON_BKT_PROCVER: 19.0.0.141 PROCESS_VER_PRODUCT: Driver Genius WATSON_BKT_MODULE: unknown WATSON_BKT_MODVER: 0.0.0.0 WATSON_BKT_MODOFFSET: 74ac4eb9 WATSON_BKT_MODSTAMP: bbbbbbb4 BUILD_VERSION_STRING: 6.1.7601.24358 (win7sp1_ldr_escrow.190208-1418) MODLIST_WITH_TSCHKSUM_HASH: 13cd66af50b898233d8daa870a15c3e172741cbe MODLIST_SHA1_HASH: 548e6a39c02a7fd4f25de36f63059534a1cb68bd NTGLOBALFLAG: 0 APPLICATION_VERIFIER_FLAGS: 0 DUMP_FLAGS: 94 DUMP_TYPE: 1 ANALYSIS_SESSION_HOST: KOMPUTER ANALYSIS_SESSION_TIME: 03-15-2019 10:55:24.0374 ANALYSIS_VERSION: 10.0.16299.15 amd64fre LAST_CONTROL_TRANSFER: from 7614266a to 7614269a THREAD_ATTRIBUTES: ADDITIONAL_DEBUG_TEXT: Followup set based on attribute [Heap_Error_Type] from Frame:[0] on thread:[PSEUDO_THREAD] ; Followup set based on attribute [Is_ChosenCrashFollowupThread] from Frame:[0] on thread:[PSEUDO_THREAD] FAULTING_THREAD: ffffffff THREAD_SHA1_HASH_MOD_FUNC: da137033e757f9c227ac24440f1dd33a46bae968 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: f158da5cd714a1cca9d8e7f6c80daa8baca9e50c OS_LOCALE: PLK PROBLEM_CLASSES: ID: [0n309] Type: [@APPLICATION_FAULT_STRING] Class: Primary Scope: DEFAULT_BUCKET_ID (Failure Bucket ID prefix) BUCKET_ID Name: Omit Data: Add String: [FATAL_USER_CALLBACK_EXCEPTION] PID: [Unspecified] TID: [Unspecified] Frame: [0] ID: [0n249] Type: [ACTIONABLE] Class: Addendum Scope: DEFAULT_BUCKET_ID (Failure Bucket ID prefix) BUCKET_ID Name: Add Data: Add String: [BlockNotBusy] PID: [Unspecified] TID: [Unspecified] Frame: [0] BUGCHECK_STR: FATAL_USER_CALLBACK_EXCEPTION_ACTIONABLE_BlockNotBusy DEFAULT_BUCKET_ID: FATAL_USER_CALLBACK_EXCEPTION_ACTIONABLE_BlockNotBusy PRIMARY_PROBLEM_CLASS: FATAL_USER_CALLBACK_EXCEPTION STACK_TEXT: 00000000 00000000 msvbvm60!unknown_function+0x0 THREAD_SHA1_HASH_MOD: 0cef3d9fcecdb389af592595886bd1fbb7665ed3 SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: msvbvm60!unknown_function FOLLOWUP_NAME: MachineOwner MODULE_NAME: msvbvm60 IMAGE_NAME: msvbvm60.dll DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bda6c STACK_COMMAND: .ecxr ; kb ; !heap ; ** Pseudo Context ** ManagedPseudo ** Value: 181db1c0 ** ; kb BUCKET_ID: FATAL_USER_CALLBACK_EXCEPTION_ACTIONABLE_BlockNotBusy_msvbvm60!unknown_function FAILURE_EXCEPTION_CODE: c000041d FAILURE_IMAGE_NAME: msvbvm60.dll BUCKET_ID_IMAGE_STR: msvbvm60.dll FAILURE_MODULE_NAME: msvbvm60 BUCKET_ID_MODULE_STR: msvbvm60 FAILURE_FUNCTION_NAME: unknown_function BUCKET_ID_FUNCTION_STR: unknown_function BUCKET_ID_OFFSET: 0 BUCKET_ID_MODTIMEDATESTAMP: 4a5bda6c BUCKET_ID_MODCHECKSUM: 15cf86 BUCKET_ID_MODVER_STR: 6.0.98.15 BUCKET_ID_PREFIX_STR: FATAL_USER_CALLBACK_EXCEPTION_ACTIONABLE_BlockNotBusy_ FAILURE_PROBLEM_CLASS: FATAL_USER_CALLBACK_EXCEPTION FAILURE_SYMBOL_NAME: msvbvm60.dll!unknown_function FAILURE_BUCKET_ID: FATAL_USER_CALLBACK_EXCEPTION_ACTIONABLE_BlockNotBusy_c000041d_msvbvm60.dll!unknown_function WATSON_STAGEONE_URL: http://watson.microsoft.com/StageOne/DriverGenius.exe/19.0.0.141/5c7655fd/unknown/0.0.0.0/bbbbbbb4/c000041d/74ac4eb9.htm?Retriage=1 TARGET_TIME: 2019-03-12T08:23:12.000Z OSBUILD: 7601 OSSERVICEPACK: 24358 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 256 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x86 OSNAME: Windows 7 OSEDITION: Windows 7 WinNt (Service Pack 1) SingleUserTS USER_LCID: 0 OSBUILD_TIMESTAMP: 2019-02-09 01:16:11 BUILDDATESTAMP_STR: 190208-1418 BUILDLAB_STR: win7sp1_ldr_escrow BUILDOSVER_STR: 6.1.7601.24358 ANALYSIS_SESSION_ELAPSED_TIME: f9f0 ANALYSIS_SOURCE: UM FAILURE_ID_HASH_STRING: um:fatal_user_callback_exception_actionable_blocknotbusy_c000041d_msvbvm60.dll!unknown_function FAILURE_ID_HASH: {869e77e4-389b-a658-2129-3e516bf0b981} Followup: MachineOwner --------- 0:000> lmvm msvbvm60 Browse full module list start end module name 72940000 72a93000 msvbvm60 T (no symbols) Loaded symbol image file: msvbvm60.dll Image path: C:\Windows\System32\msvbvm60.dll Image name: msvbvm60.dll Browse all global symbols functions data Timestamp: Tue Jul 14 03:07:56 2009 (4A5BDA6C) CheckSum: 0015CF86 ImageSize: 00153000 File version: 6.0.98.15 Product version: 6.0.98.15 File flags: 0 (Mask 3F) File OS: 4 Unknown Win32 File type: 2.0 Dll File date: 00000000.00000000 Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4 0:000> lmvm msvbvm60 Browse full module list start end module name 72940000 72a93000 msvbvm60 T (no symbols) Loaded symbol image file: msvbvm60.dll Image path: C:\Windows\System32\msvbvm60.dll Image name: msvbvm60.dll Browse all global symbols functions data Timestamp: Tue Jul 14 03:07:56 2009 (4A5BDA6C) CheckSum: 0015CF86 ImageSize: 00153000 File version: 6.0.98.15 Product version: 6.0.98.15 File flags: 0 (Mask 3F) File OS: 4 Unknown Win32 File type: 2.0 Dll File date: 00000000.00000000 Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
  7. It does not work because the active window (on top) blocks the GUI.
  8. In the log I found in the file name - my password and username MOJ and password members129, and other information that may leak. No other information is required, everything can be read from the DUMP file. Error Description Recommendation In adwcleaner_7.1.0.0.exe.7864.dmp the assembly instruction at msvcrt!memcpy+5a in C:\Windows\SysWOW64\msvcrt.dll from Microsoft Corporation has caused an access violation exception (0xC0000005) when trying to read from memory location 0x01a7c000 on thread 10 Please follow up with the vendor Microsoft Corporation for C:\Windows\SysWOW64\msvcrt.dll The following threads in adwcleaner_7.1.0.0.exe.7864.dmp are blocked by an unhandled exception I'm not an expert or developer, but the DUMP file has enabled me to get a lot of information and solve the problem quickly. I regret that having a log with DUMP you can not read anything and not suggest solving the problem. Having a DUMP file you can 100% solve each error. Now it is working
  9. Bug: Can not close application [X] is blocked. But I do not want to shut down the system right now. Only later. please fix this. https://postimg.cc/image/ew0yeh5az/
  10. DebugDiag Analysis Report Dumps: 0/0 Rules: 0/0 0 Error 0 Warning 0 Information 0 Notification Analysis Summary Error Description Recommendation In adwcleaner_7.1.0.0.exe.7864.dmp the assembly instruction at msvcrt!memcpy+5a in C:\Windows\SysWOW64\msvcrt.dll from Microsoft Corporation has caused an access violation exception (0xC0000005) when trying to read from memory location 0x01a7c000 on thread 10 Please follow up with the vendor Microsoft Corporation for C:\Windows\SysWOW64\msvcrt.dll The following threads in adwcleaner_7.1.0.0.exe.7864.dmp are blocked by an unhandled exception ( 10 ) 7,69% of threads blocked (1 threads) Please see the Recovered Call Stack for thread 10 based on the restored exception and context record passed to the exception filter. Analysis Details CrashHangAnalysis Report for adwcleaner_7.1.0.0.exe.7864.dmp Type of Analysis Performed Combined Crash/Hang Analysis Machine Name Operating System Windows 7Service Pack 1 Number Of Processors Process ID 7864 Process Image C:\Users\***\Downloads\adwcleaner_7.1.0.0.exe Command Line "C:\Users\***\Downloads\adwcleaner_7.1.0.0.exe" System Up-Time 00:00:00 Process Up-Time 00:00:12 Processor Type X86 Process Bitness 32-Bit Top 5 Threads by CPU time Note - Times include both user mode and kernel mode for each thread Extended thread information (including thread CPU times) is unavailable in this dump CLR Information Thread Report •Thread 2 •3 •7 •12 4 Threads (30% of all threads) have this same call stack. Note: Grouping of identical threads can be disabled in the 'Preferences' tab of the Analysis Options Thread 2 - System ID 7468 Thread 3 - System ID 5176 Thread 7 - System ID 4068 Thread 12 - System ID 6492 ntdll!NtWaitForWorkViaWorkerFactory+12 ntdll!TppWorkerThread+209 kernel32!BaseThreadInitThunk+e ntdll!__RtlUserThreadStart+70 ntdll!_RtlUserThreadStart+1b •Thread 5 •11 2 Threads (15% of all threads) have this same call stack. Note: Grouping of identical threads can be disabled in the 'Preferences' tab of the Analysis Options Thread 5 - System ID 1284 This thread is not fully resolved and may or may not be a problem. Further analysis of these threads may be required. Thread 11 - System ID 4972 This thread is not fully resolved and may or may not be a problem. Further analysis of these threads may be required. ntdll!ZwWaitForMultipleObjects+15 KERNELBASE!WaitForMultipleObjectsEx+100 kernel32!WaitForMultipleObjectsExImplementation+e0 user32!RealMsgWaitForMultipleObjectsEx+14d adwcleaner_7_1_0_0+17e724 adwcleaner_7_1_0_0+14965f adwcleaner_7_1_0_0+11c964 adwcleaner_7_1_0_0+8c9de1 kernel32!BaseThreadInitThunk+e ntdll!__RtlUserThreadStart+70 ntdll!_RtlUserThreadStart+1b Thread 0 - System ID 7136 This thread is not fully resolved and may or may not be a problem. Further analysis of these threads may be required. ntdll!ZwWaitForMultipleObjects+15 KERNELBASE!WaitForMultipleObjectsEx+100 kernel32!WaitForMultipleObjectsExImplementation+e0 user32!RealMsgWaitForMultipleObjectsEx+14d adwcleaner_7_1_0_0+17e724 adwcleaner_7_1_0_0+713954 adwcleaner_7_1_0_0+11939 adwcleaner_7_1_0_0+1199b adwcleaner_7_1_0_0+8c0d1b kernel32!BaseThreadInitThunk+e ntdll!__RtlUserThreadStart+70 ntdll!_RtlUserThreadStart+1b Thread 1 - System ID 4336 ntdll!ZwWaitForMultipleObjects+15 ntdll!TppWaiterpThread+32e kernel32!BaseThreadInitThunk+e ntdll!__RtlUserThreadStart+70 ntdll!_RtlUserThreadStart+1b Thread 4 - System ID 2024 ntdll!ZwDelayExecution+15 KERNELBASE!SleepEx+65 KERNELBASE!Sleep+f ole32!CROIDTable::WorkerThreadLoop+14 ole32!CRpcThreadCache::RpcWorkerThreadEntry+16 kernel32!BaseThreadInitThunk+e ntdll!__RtlUserThreadStart+70 ntdll!_RtlUserThreadStart+1b Thread 6 - System ID 7332 ntdll!ZwWaitForMultipleObjects+15 kernel32!BaseThreadInitThunk+e ntdll!__RtlUserThreadStart+70 ntdll!_RtlUserThreadStart+1b Thread 8 - System ID 1768 This thread is not fully resolved and may or may not be a problem. Further analysis of these threads may be required. ntdll!NtWaitForSingleObject+15 KERNELBASE!WaitForSingleObjectEx+98 kernel32!WaitForSingleObjectExImplementation+75 adwcleaner_7_1_0_0+1bf2b4 adwcleaner_7_1_0_0+1bf3cc adwcleaner_7_1_0_0+11c964 adwcleaner_7_1_0_0+8c9de1 kernel32!BaseThreadInitThunk+e ntdll!__RtlUserThreadStart+70 ntdll!_RtlUserThreadStart+1b Thread 9 - System ID 3768 ntdll!ZwRemoveIoCompletion+15 kernel32!BaseThreadInitThunk+e ntdll!__RtlUserThreadStart+70 ntdll!_RtlUserThreadStart+1b Thread 10 - System ID 6892 This thread is blocked by an unhandled exception ntdll!ZwWaitForMultipleObjects+15 KERNELBASE!WaitForMultipleObjectsEx+100 kernel32!WaitForMultipleObjectsExImplementation+e0 kernel32!WaitForMultipleObjects+18 kernel32!WerpReportFaultInternal+186 kernel32!WerpReportFault+70 kernel32!BasepReportFault+20 kernel32!UnhandledExceptionFilter+1af ntdll!__RtlUserThreadStart+62 ntdll!_RtlUserThreadStart+1b Could not restore the exception information passed to the exception filter. Crash analysis unavailable. Well-Known COM STA Threads Report STA Name Thread ID Thread Status Call Status Main STA 0 In-Call (bad symbols) not fully resolved and may or may not be a problem. Further analysis of this thread may be required Exception Information MSVCRT!MEMCPY+5AIn adwcleaner_7.1.0.0.exe.7864.dmp the assembly instruction at msvcrt!memcpy+5a in C:\Windows\SysWOW64\msvcrt.dll from Microsoft Corporation has caused an access violation exception (0xC0000005) when trying to read from memory location 0x01a7c000 on thread 10 Module Information Image Name: C:\Windows\SysWOW64\msvcrt.dll Symbol Type: PDB Base address: 0x00905a4d Time Stamp: Fri Dec 16 08:45:38 2011 Checksum: 0x00000000 Comments: COM DLL: False Company Name: Microsoft Corporation ISAPIExtension: False File Description: Windows NT CRT DLL ISAPIFilter: False File Version: 7.0.7601.17744 (win7sp1_gdr.111215-1535) Managed DLL: False Internal Name: msvcrt.dll VB DLL: False Legal Copyright: © Microsoft Corporation. All rights reserved. Loaded Image Name: msvcrt.dll Legal Trademarks: Mapped Image Name: c:\symbols\msvcrt.dll\4EEAF722ac000\msvcrt.dll Original filename: msvcrt.dll Module name: msvcrt Private Build: Single Threaded: False Product Name: Microsoft® Windows® Operating System Module Size: 688 KBytes Product Version: 7.0.7601.17744 Symbol File Name: c:\symbols\msvcrt.pdb\F1D253F9555C46DF8076400A52B3A9292\msvcrt.pdb Special Build: & Analysis Rule Summary Rule Name Status Details CrashHangAnalysis - v (2.2.0.14) Completed close close Table of Contents CrashHangAnalysis Report for adwcleaner_7.1.0.0.exe.7864.dmp Top 5 Threads by CPU time Thread Report Well-Known COM STA Threads Report
  11. Now, I know the solution to the problem: but I want it to be found by specialists and developers. I gave a dump and so everything is writing like a bull. Bad soultion : D !!!I want good solution
  12. [Window Title] AdwCleaner [Main Instruction] AdwCleaner has stopped working. [Content] The program has stopped working correctly due to a problem. [Close the program]
  13. The same situation. The old version works well, the new version has an internal bug.
  14. I know how to do it. Without errors Memtest 0% error . So what does this have to do with the mistake. Nothing, so please do not suggest bad solutions, because there were already many such and lost a lot of time. Such solutions to the left and the right will never solve the actual error. I tested on various devices and this is a bug that occurs on many computers and my friend PC. Please fix this bug. The old version works well, the new version has an internal bug. AdwCleaner 7.1 and 7.1.1 Loading module msvcrt.dll and CRASH
  15. AdwCleaner 7.1 new version CRASH /bug report Windows 7x64 AdwCleaner 7.1 new version crashes every time it scans Nazwa aplikacji powodującej błąd: adwcleaner_7.1.0.0.exe, wersja: 7.1.0.0, sygnatura czasowa: 0x5acf354e Nazwa modułu powodującego błąd: msvcrt.dll, wersja: 7.0.7601.17744, sygnatura czasowa: 0x4eeaf722 Kod wyjątku: 0xc0000005 Przesunięcie błędu: 0x00009b60 Identyfikator procesu powodującego błąd: 0x16e4 Godzina uruchomienia aplikacji powodującej błąd: 0x01d3d95dd74b366d Ścieżka aplikacji powodującej błąd: C:\Users\MOJA\Downloads\adwcleaner_7.1.0.0.exe Ścieżka modułu powodującego błąd: C:\Windows\syswow64\msvcrt.dll Identyfikator raportu: 1924734c-4551-11e8-beaf-0862662a261f FAULTING_IP: msvcrt!memcpy+5a 76979b60 f3a5 rep movs dword ptr es:[edi],dword ptr [esi] EXCEPTION_RECORD: ffffffff -- (.exr 0xffffffffffffffff) ExceptionAddress: 76979b60 (msvcrt!memcpy+0x0000005a) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 00000000 Parameter[1]: 023dc000 Attempt to read from address 023dc000 PROCESS_NAME: adwcleaner_7.1.0.0.exe ADDITIONAL_DEBUG_TEXT: Use '!findthebuild' command to search for the target build information. If the build information is available, run '!findthebuild -s ; .reload' to set symbol path and load symbols. FAULTING_MODULE: 75370000 kernel32 DEBUG_FLR_IMAGE_TIMESTAMP: 4eeaf722 MODULE_NAME: msvcrt ERROR_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo EXCEPTION_PARAMETER1: 00000000 EXCEPTION_PARAMETER2: 023dc000 READ_ADDRESS: 023dc000 FOLLOWUP_IP: msvcrt!memcpy+5a 76979b60 f3a5 rep movs dword ptr es:[edi],dword ptr [esi] EXCEPTION_DOESNOT_MATCH_CODE: This indicates a hardware error. Instruction at 76979b60 does not read/write to 023dc000 MOD_LIST: <ANALYSIS/> LAST_CONTROL_TRANSFER: from 754a73f6 to 76979b60 FAULTING_THREAD: 00001d4c BUGCHECK_STR: APPLICATION_FAULT_STRING_DEREFERENCE_CODE_ADDRESS_MISMATCH_INVALID_POINTER_READ_WRONG_SYMBOLS PRIMARY_PROBLEM_CLASS: STRING_DEREFERENCE DEFAULT_BUCKET_ID: STRING_DEREFERENCE STACK_TEXT: 1933f3f0 754a73f6 1a510038 020a99bc 0120ccf0 msvcrt!memcpy+0x5a 1933f410 775b4e62 1933f42c 1a51002c 1933f8f8 oleaut32!BSTR_UserMarshal+0x50 1933f44c 775b4df7 1933f8f8 6bc7337a 1a510028 rpcrt4!NdrpUserMarshalMarshall+0x4b 1933f47c 77596ff0 1933f4ec 1933f8f8 6bc7337a rpcrt4!NdrUserMarshalMarshall+0xd8 1933f4a8 7763013d bc36eefa 1933f8f4 08000265 rpcrt4!NdrpClientMarshal+0xf6 1933f8bc 7727d8e2 6bc717d8 6bc73090 1933f8f4 rpcrt4!NdrClientCall2+0x19a 1933f8dc 77179785 0000001c 00000014 1933f914 ole32!ObjectStublessClient+0xa2 [d:\w7rtm\com\rpc\ndrole\i386\stblsclt.cxx @ 474] 1933f8ec 01229e3a 18fd04ec 020a99bc 020b1110 ole32!ObjectStubless+0xf [d:\w7rtm\com\rpc\ndrole\i386\stubless.asm @ 154] WARNING: Stack unwind information not available. Following frames may be wrong. 1933f914 0123d287 00000000 1933f944 bf8724b2 adwcleaner_7_1_0_0+0x79e3a 1933f968 0122610d bf87247a 1528b130 00000001 adwcleaner_7_1_0_0+0x8d287 1933f9e0 01210cc0 bf872756 1528b130 1528b130 adwcleaner_7_1_0_0+0x7610d 1933facc 01211539 1933faf8 bf872682 1528b130 adwcleaner_7_1_0_0+0x60cc0 1933fb18 011f4d06 16524678 00000000 1933fc08 adwcleaner_7_1_0_0+0x61539 1933fb28 01267db7 1528b130 00000000 00000005 adwcleaner_7_1_0_0+0x44d06 1933fc1c 01a79cb9 1656b200 bf8721ce 00000000 adwcleaner_7_1_0_0+0xb7db7 00000000 00000000 00000000 00000000 00000000 adwcleaner_7_1_0_0+0x8c9cb9 STACK_COMMAND: .cxr 0000000000000000 ; kb ; ~11s; .ecxr ; kb SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: msvcrt!memcpy+5a FOLLOWUP_NAME: MachineOwner IMAGE_NAME: msvcrt.dll BUCKET_ID: WRONG_SYMBOLS FAILURE_BUCKET_ID: STRING_DEREFERENCE_c0000005_msvcrt.dll!memcpy Followup: MachineOwner --------- 0:011> lmvm msvcrt start end module name 76970000 76a1c000 msvcrt (pdb symbols) c:\symbols\msvcrt.pdb\F1D253F9555C46DF8076400A52B3A9292\msvcrt.pdb Loaded symbol image file: msvcrt.dll Mapped memory image file: c:\symbols\msvcrt.dll\4EEAF722ac000\msvcrt.dll Image path: C:\Windows\SysWOW64\msvcrt.dll Image name: msvcrt.dll Timestamp: Fri Dec 16 08:45:38 2011 (4EEAF722) CheckSum: 000A8F06 ImageSize: 000AC000 File version: 7.0.7601.17744 Product version: 6.1.8638.17744 File flags: 0 (Mask 3F) File OS: 40004 NT Win32 File type: 1.0 App File date: 00000000.00000000 Translations: 0409.04b0 CompanyName: Microsoft Corporation ProductName: Microsoft® Windows® Operating System InternalName: msvcrt.dll OriginalFilename: msvcrt.dll ProductVersion: 7.0.7601.17744 FileVersion: 7.0.7601.17744 (win7sp1_gdr.111215-1535) FileDescription: Windows NT CRT DLL LegalCopyright: © Microsoft Corporation. All rights reserved. 0:011> lmvm kernel32 start end module name 75370000 75480000 kernel32 (export symbols) kernel32.dll Loaded symbol image file: kernel32.dll Mapped memory image file: C:\Windows\SysWOW64\kernel32.dll Image path: C:\Windows\SysWOW64\kernel32.dll Image name: kernel32.dll Timestamp: Sat Mar 31 03:12:18 2018 (5ABEE072) CheckSum: 0011DEA5 ImageSize: 00110000 File version: 6.1.7601.24094 Product version: 6.1.7601.24094 File flags: 0 (Mask 3F) File OS: 40004 NT Win32 File type: 2.0 Dll File date: 00000000.00000000 Translations: 0409.04b0 CompanyName: Microsoft Corporation ProductName: Microsoft® Windows® Operating System InternalName: kernel32 OriginalFilename: kernel32 ProductVersion: 6.1.7601.24094 FileVersion: 6.1.7601.24094 (win7sp1_ldr_escrow.180330-1600) FileDescription: Windows NT BASE API Client DLL LegalCopyright: © Microsoft Corporation. All rights reserved.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.