Jump to content

Makinero

Members
  • Posts

    18
  • Joined

  • Last visited

Posts posted by Makinero

  1. Report bugs/false

     

    False Information. The program is completely virus-free.
    It is simply unpopular, but it is an application known on the Internet! This is a very good tool!!!

    MasterSeeker.exe

     RiskWare.Suspicious.TaskExecution

    http://www.master-seeker.com/

    Additionally, all other important entries (Task & Registry) you need related to MasterSeeker
    (UAC bypass)

     

    Isssu 2:

    Why can't I Maximize the window [HISTORY DETECT] to FULL HD WINDOW
    The reduced window is very uncomfortable on long paths.

  2. How do I disable these silly CAPTCHA (when posting)? I do not want to play, I will not waste time.
    I fill CAPTCHA a million times, and it still shows that it's wrong and wrong and wrong and wrong and wrong !!! and wrong and wrong and wrong and wrong !!! and wrong and wrong and wrong and wrong !!!and wrong and wrong and wrong and wrong !!!and wrong and wrong and wrong and wrong !!!and wrong and wrong and wrong and wrong !!!and wrong and wrong and wrong and wrong !!!and wrong and wrong and wrong and wrong !!! and wrong and wrong and wrong and wrong !!! and wrong and wrong and wrong and wrong !!! and wrong and wrong and wrong and wrong !!! and wrong and wrong and wrong and wrong !!!

     

    This is a stupid CAPTCHA! It does not always work!

     

    Example: https://postimg.cc/xX0GjDWp

  3. Reproduce: Możesz pobrać Antimalwarebytes i Driver Genius 19 w wersji próbnej, jeśli się pojawi, spróbuj zamknąć aplikację na tacy systemowej. Pojawi się awaria / awaria.

     

    Całkowicie odinstalowałem MBAM i problem nie występuje.
    Nie będę już instalował problematycznego produktu MBAM.
    Czy możesz polecić mi inny, lepszy skaner antywirusowy?

     

     

     

    Reproduce: You can download Antimalwarebytes and Driver Genius 19 in the trial version, if it appears, try closing the application on the system tray. A failure / malfunction will appear.

     

    I completely uninstalled MBAM and the problem does not occur.
    I will no longer install the problematic MBAM product.
    Can you recommend me another, better antivirus scanner?

     

  4. Malwarebytes - one of the modules causes crashes in another program Driver Genius 19
     

    .............
    Loading unloaded module list
    ..
    This dump file has an exception of interest stored in it.
    The stored exception information can be accessed via .ecxr.
    (1248.124c): Unknown exception - code c000041d (first/second chance not available)
    eax=fffffffe ebx=000300aa ecx=00000000 edx=00000000 esi=0000a918 edi=00000000
    eip=7614269a esp=0018d2b0 ebp=0018d2c8 iopl=0         nv up ei pl zr na pe nc
    cs=0023  ss=002b  ds=002b  es=002b  fs=0053  gs=002b             efl=00000246
    user32!NtUserSetWindowRgn+0x15:
    7614269a 83c404          add     esp,4
    0:000> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Exception Analysis                                   *
    *                                                                             *
    *******************************************************************************
    
    *** ERROR: Symbol file could not be found.  Defaulted to export symbols for CodejockCommandBars.ocx - 
    Unable to load image C:\Windows\System32\msvbvm60.dll, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for msvbvm60.dll
    *** ERROR: Module load completed but symbols could not be loaded for msvbvm60.dll
    *** ERROR: Module load completed but symbols could not be loaded for DriverGenius.exe
    GetUrlPageData2 (WinHttp) failed: 12002.
    
    DUMP_CLASS: 2
    
    DUMP_QUALIFIER: 400
    
    CONTEXT:  (.ecxr)
    eax=fffffffe ebx=000300aa ecx=00000000 edx=00000000 esi=0000a918 edi=00000000
    eip=7614269a esp=0018d2b0 ebp=0018d2c8 iopl=0         nv up ei pl zr na pe nc
    cs=0023  ss=002b  ds=002b  es=002b  fs=0053  gs=002b             efl=00000246
    user32!NtUserSetWindowRgn+0x15:
    7614269a 83c404          add     esp,4
    Resetting default scope
    
    FAULTING_IP: 
    +0
    74ac4eb9 41              inc     ecx
    
    EXCEPTION_RECORD:  (.exr -1)
    ExceptionAddress: 74ac4eb9
       ExceptionCode: c000041d
      ExceptionFlags: 00000001
    NumberParameters: 0
    
    PROCESS_NAME:  DriverGenius.exe
    
    ERROR_CODE: (NTSTATUS) 0xc000041d - <Unable to get error code text>
    
    EXCEPTION_CODE: (NTSTATUS) 0xc000041d - <Unable to get error code text>
    
    EXCEPTION_CODE_STR:  c000041d
    
    WATSON_BKT_PROCSTAMP:  5c7655fd
    
    WATSON_BKT_PROCVER:  19.0.0.141
    
    PROCESS_VER_PRODUCT:  Driver Genius
    
    WATSON_BKT_MODULE:  unknown
    
    WATSON_BKT_MODVER:  0.0.0.0
    
    WATSON_BKT_MODOFFSET:  74ac4eb9
    
    WATSON_BKT_MODSTAMP:  bbbbbbb4
    
    BUILD_VERSION_STRING:  6.1.7601.24358 (win7sp1_ldr_escrow.190208-1418)
    
    MODLIST_WITH_TSCHKSUM_HASH:  13cd66af50b898233d8daa870a15c3e172741cbe
    
    MODLIST_SHA1_HASH:  548e6a39c02a7fd4f25de36f63059534a1cb68bd
    
    NTGLOBALFLAG:  0
    
    APPLICATION_VERIFIER_FLAGS:  0
    
    DUMP_FLAGS:  94
    
    DUMP_TYPE:  1
    
    ANALYSIS_SESSION_HOST:  KOMPUTER
    
    ANALYSIS_SESSION_TIME:  03-15-2019 10:55:24.0374
    
    ANALYSIS_VERSION: 10.0.16299.15 amd64fre
    
    LAST_CONTROL_TRANSFER:  from 7614266a to 7614269a
    
    THREAD_ATTRIBUTES: 
    ADDITIONAL_DEBUG_TEXT:  Followup set based on attribute [Heap_Error_Type] from Frame:[0] on thread:[PSEUDO_THREAD] ; Followup set based on attribute [Is_ChosenCrashFollowupThread] from Frame:[0] on thread:[PSEUDO_THREAD]
    
    FAULTING_THREAD:  ffffffff
    
    THREAD_SHA1_HASH_MOD_FUNC:  da137033e757f9c227ac24440f1dd33a46bae968
    
    THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  f158da5cd714a1cca9d8e7f6c80daa8baca9e50c
    
    OS_LOCALE:  PLK
    
    PROBLEM_CLASSES: 
    
        ID:     [0n309]
        Type:   [@APPLICATION_FAULT_STRING]
        Class:  Primary
        Scope:  DEFAULT_BUCKET_ID (Failure Bucket ID prefix)
                BUCKET_ID
        Name:   Omit
        Data:   Add
                String: [FATAL_USER_CALLBACK_EXCEPTION]
        PID:    [Unspecified]
        TID:    [Unspecified]
        Frame:  [0]
    
        ID:     [0n249]
        Type:   [ACTIONABLE]
        Class:  Addendum
        Scope:  DEFAULT_BUCKET_ID (Failure Bucket ID prefix)
                BUCKET_ID
        Name:   Add
        Data:   Add
                String: [BlockNotBusy]
        PID:    [Unspecified]
        TID:    [Unspecified]
        Frame:  [0]
    
    BUGCHECK_STR:  FATAL_USER_CALLBACK_EXCEPTION_ACTIONABLE_BlockNotBusy
    
    DEFAULT_BUCKET_ID:  FATAL_USER_CALLBACK_EXCEPTION_ACTIONABLE_BlockNotBusy
    
    PRIMARY_PROBLEM_CLASS:  FATAL_USER_CALLBACK_EXCEPTION
    
    STACK_TEXT:  
    00000000 00000000 msvbvm60!unknown_function+0x0
    
    
    THREAD_SHA1_HASH_MOD:  0cef3d9fcecdb389af592595886bd1fbb7665ed3
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  msvbvm60!unknown_function
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: msvbvm60
    
    IMAGE_NAME:  msvbvm60.dll
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bda6c
    
    STACK_COMMAND:  .ecxr ; kb ; !heap ; ** Pseudo Context ** ManagedPseudo ** Value: 181db1c0 ** ; kb
    
    BUCKET_ID:  FATAL_USER_CALLBACK_EXCEPTION_ACTIONABLE_BlockNotBusy_msvbvm60!unknown_function
    
    FAILURE_EXCEPTION_CODE:  c000041d
    
    FAILURE_IMAGE_NAME:  msvbvm60.dll
    
    BUCKET_ID_IMAGE_STR:  msvbvm60.dll
    
    FAILURE_MODULE_NAME:  msvbvm60
    
    BUCKET_ID_MODULE_STR:  msvbvm60
    
    FAILURE_FUNCTION_NAME:  unknown_function
    
    BUCKET_ID_FUNCTION_STR:  unknown_function
    
    BUCKET_ID_OFFSET:  0
    
    BUCKET_ID_MODTIMEDATESTAMP:  4a5bda6c
    
    BUCKET_ID_MODCHECKSUM:  15cf86
    
    BUCKET_ID_MODVER_STR:  6.0.98.15
    
    BUCKET_ID_PREFIX_STR:  FATAL_USER_CALLBACK_EXCEPTION_ACTIONABLE_BlockNotBusy_
    
    FAILURE_PROBLEM_CLASS:  FATAL_USER_CALLBACK_EXCEPTION
    
    FAILURE_SYMBOL_NAME:  msvbvm60.dll!unknown_function
    
    FAILURE_BUCKET_ID:  FATAL_USER_CALLBACK_EXCEPTION_ACTIONABLE_BlockNotBusy_c000041d_msvbvm60.dll!unknown_function
    
    WATSON_STAGEONE_URL:  http://watson.microsoft.com/StageOne/DriverGenius.exe/19.0.0.141/5c7655fd/unknown/0.0.0.0/bbbbbbb4/c000041d/74ac4eb9.htm?Retriage=1
    
    TARGET_TIME:  2019-03-12T08:23:12.000Z
    
    OSBUILD:  7601
    
    OSSERVICEPACK:  24358
    
    SERVICEPACK_NUMBER: 0
    
    OS_REVISION: 0
    
    SUITE_MASK:  256
    
    PRODUCT_TYPE:  1
    
    OSPLATFORM_TYPE:  x86
    
    OSNAME:  Windows 7
    
    OSEDITION:  Windows 7 WinNt (Service Pack 1) SingleUserTS
    
    USER_LCID:  0
    
    OSBUILD_TIMESTAMP:  2019-02-09 01:16:11
    
    BUILDDATESTAMP_STR:  190208-1418
    
    BUILDLAB_STR:  win7sp1_ldr_escrow
    
    BUILDOSVER_STR:  6.1.7601.24358
    
    ANALYSIS_SESSION_ELAPSED_TIME:  f9f0
    
    ANALYSIS_SOURCE:  UM
    
    FAILURE_ID_HASH_STRING:  um:fatal_user_callback_exception_actionable_blocknotbusy_c000041d_msvbvm60.dll!unknown_function
    
    FAILURE_ID_HASH:  {869e77e4-389b-a658-2129-3e516bf0b981}
    
    Followup:     MachineOwner
    ---------
    
    0:000> lmvm msvbvm60
    Browse full module list
    start    end        module name
    72940000 72a93000   msvbvm60 T (no symbols)           
        Loaded symbol image file: msvbvm60.dll
        Image path: C:\Windows\System32\msvbvm60.dll
        Image name: msvbvm60.dll
        Browse all global symbols  functions  data
        Timestamp:        Tue Jul 14 03:07:56 2009 (4A5BDA6C)
        CheckSum:         0015CF86
        ImageSize:        00153000
        File version:     6.0.98.15
        Product version:  6.0.98.15
        File flags:       0 (Mask 3F)
        File OS:          4 Unknown Win32
        File type:        2.0 Dll
        File date:        00000000.00000000
        Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
    0:000> lmvm msvbvm60
    Browse full module list
    start    end        module name
    72940000 72a93000   msvbvm60 T (no symbols)           
        Loaded symbol image file: msvbvm60.dll
        Image path: C:\Windows\System32\msvbvm60.dll
        Image name: msvbvm60.dll
        Browse all global symbols  functions  data
        Timestamp:        Tue Jul 14 03:07:56 2009 (4A5BDA6C)
        CheckSum:         0015CF86
        ImageSize:        00153000
        File version:     6.0.98.15
        Product version:  6.0.98.15
        File flags:       0 (Mask 3F)
        File OS:          4 Unknown Win32
        File type:        2.0 Dll
        File date:        00000000.00000000
        Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4

     

  5. In the log I found in the file name - my password and username MOJ and password members129, and other information that may leak.
    No other information is required, everything can be read from the DUMP file.

     Error 


    Description Recommendation 

    In adwcleaner_7.1.0.0.exe.7864.dmp the assembly instruction at msvcrt!memcpy+5a in C:\Windows\SysWOW64\msvcrt.dll from Microsoft Corporation has caused an access violation exception (0xC0000005) when trying to read from memory location 0x01a7c000 on thread 10
     Please follow up with the vendor Microsoft Corporation for C:\Windows\SysWOW64\msvcrt.dll
     
    The following threads in adwcleaner_7.1.0.0.exe.7864.dmp are blocked by an unhandled exception

    I'm not an expert or developer, but the DUMP file has enabled me to get a lot of information and solve the problem quickly. I regret that having a log with DUMP you can not read anything and not suggest solving the problem. Having a DUMP file you can 100% solve each error. Now it is working :)

     

    Screen_Shot_05-02-18_at_10.59_AM.jpg

  6. DebugDiag Analysis Report 


       Dumps: 
    0/0 


       Rules: 
    0/0 


     

    0

    Error
     


    0

    Warning
     


    0

    Information
     


    0

    Notification
      

     


    Analysis Summary
     

     Error 


    Description Recommendation 

    In adwcleaner_7.1.0.0.exe.7864.dmp the assembly instruction at msvcrt!memcpy+5a in C:\Windows\SysWOW64\msvcrt.dll from Microsoft Corporation has caused an access violation exception (0xC0000005) when trying to read from memory location 0x01a7c000 on thread 10
     Please follow up with the vendor Microsoft Corporation for C:\Windows\SysWOW64\msvcrt.dll
     
    The following threads in adwcleaner_7.1.0.0.exe.7864.dmp are blocked by an unhandled exception

    ( 10 )

    7,69% of threads blocked (1 threads)

     Please see the Recovered Call Stack for thread 10 based on the restored exception and context record passed to the exception filter. 
     

     


    Analysis Details 


    CrashHangAnalysis

    Report for adwcleaner_7.1.0.0.exe.7864.dmp

    Type of Analysis Performed   Combined Crash/Hang Analysis 
    Machine Name    
    Operating System   Windows 7Service Pack 1 
    Number Of Processors    
    Process ID   7864 
    Process Image   C:\Users\***\Downloads\adwcleaner_7.1.0.0.exe 
    Command Line   "C:\Users\***\Downloads\adwcleaner_7.1.0.0.exe"  
    System Up-Time   00:00:00 
    Process Up-Time   00:00:12 
    Processor Type   X86 
    Process Bitness   32-Bit 

    Top 5 Threads by CPU time


    Note - Times include both user mode and kernel mode for each thread 
    Extended thread information (including thread CPU times) is unavailable in this dump 


    CLR Information

    Thread Report


    •Thread 2
    •3
    •7
    •12

    4 Threads (30% of all threads) have this same call stack.
    Note: Grouping of identical threads can be disabled in the 'Preferences' tab of the Analysis Options


    Thread 2 - System ID 7468

    Thread 3 - System ID 5176

    Thread 7 - System ID 4068

    Thread 12 - System ID 6492

    ntdll!NtWaitForWorkViaWorkerFactory+12 
    ntdll!TppWorkerThread+209 
    kernel32!BaseThreadInitThunk+e 
    ntdll!__RtlUserThreadStart+70 
    ntdll!_RtlUserThreadStart+1b 

    •Thread 5
    •11

    2 Threads (15% of all threads) have this same call stack.
    Note: Grouping of identical threads can be disabled in the 'Preferences' tab of the Analysis Options


    Thread 5 - System ID 1284


    This thread is not fully resolved and may or may not be a problem. Further analysis of these threads may be required.

    Thread 11 - System ID 4972


    This thread is not fully resolved and may or may not be a problem. Further analysis of these threads may be required.

    ntdll!ZwWaitForMultipleObjects+15 
    KERNELBASE!WaitForMultipleObjectsEx+100 
    kernel32!WaitForMultipleObjectsExImplementation+e0 
    user32!RealMsgWaitForMultipleObjectsEx+14d 
    adwcleaner_7_1_0_0+17e724 
    adwcleaner_7_1_0_0+14965f 
    adwcleaner_7_1_0_0+11c964 
    adwcleaner_7_1_0_0+8c9de1 
    kernel32!BaseThreadInitThunk+e 
    ntdll!__RtlUserThreadStart+70 
    ntdll!_RtlUserThreadStart+1b 


    Thread 0 - System ID 7136


    This thread is not fully resolved and may or may not be a problem. Further analysis of these threads may be required.

    ntdll!ZwWaitForMultipleObjects+15 
    KERNELBASE!WaitForMultipleObjectsEx+100 
    kernel32!WaitForMultipleObjectsExImplementation+e0 
    user32!RealMsgWaitForMultipleObjectsEx+14d 
    adwcleaner_7_1_0_0+17e724 
    adwcleaner_7_1_0_0+713954 
    adwcleaner_7_1_0_0+11939 
    adwcleaner_7_1_0_0+1199b 
    adwcleaner_7_1_0_0+8c0d1b 
    kernel32!BaseThreadInitThunk+e 
    ntdll!__RtlUserThreadStart+70 
    ntdll!_RtlUserThreadStart+1b 


    Thread 1 - System ID 4336

    ntdll!ZwWaitForMultipleObjects+15 
    ntdll!TppWaiterpThread+32e 
    kernel32!BaseThreadInitThunk+e 
    ntdll!__RtlUserThreadStart+70 
    ntdll!_RtlUserThreadStart+1b 


    Thread 4 - System ID 2024

    ntdll!ZwDelayExecution+15 
    KERNELBASE!SleepEx+65 
    KERNELBASE!Sleep+f 
    ole32!CROIDTable::WorkerThreadLoop+14 
    ole32!CRpcThreadCache::RpcWorkerThreadEntry+16 
    kernel32!BaseThreadInitThunk+e 
    ntdll!__RtlUserThreadStart+70 
    ntdll!_RtlUserThreadStart+1b 


    Thread 6 - System ID 7332

    ntdll!ZwWaitForMultipleObjects+15 
    kernel32!BaseThreadInitThunk+e 
    ntdll!__RtlUserThreadStart+70 
    ntdll!_RtlUserThreadStart+1b 


    Thread 8 - System ID 1768


    This thread is not fully resolved and may or may not be a problem. Further analysis of these threads may be required.

    ntdll!NtWaitForSingleObject+15 
    KERNELBASE!WaitForSingleObjectEx+98 
    kernel32!WaitForSingleObjectExImplementation+75 
    adwcleaner_7_1_0_0+1bf2b4 
    adwcleaner_7_1_0_0+1bf3cc 
    adwcleaner_7_1_0_0+11c964 
    adwcleaner_7_1_0_0+8c9de1 
    kernel32!BaseThreadInitThunk+e 
    ntdll!__RtlUserThreadStart+70 
    ntdll!_RtlUserThreadStart+1b 


    Thread 9 - System ID 3768

    ntdll!ZwRemoveIoCompletion+15 
    kernel32!BaseThreadInitThunk+e 
    ntdll!__RtlUserThreadStart+70 
    ntdll!_RtlUserThreadStart+1b 


    Thread 10 - System ID 6892


    This thread is blocked by an unhandled exception

    ntdll!ZwWaitForMultipleObjects+15 
    KERNELBASE!WaitForMultipleObjectsEx+100 
    kernel32!WaitForMultipleObjectsExImplementation+e0 
    kernel32!WaitForMultipleObjects+18 
    kernel32!WerpReportFaultInternal+186 
    kernel32!WerpReportFault+70 
    kernel32!BasepReportFault+20 
    kernel32!UnhandledExceptionFilter+1af 
    ntdll!__RtlUserThreadStart+62 
    ntdll!_RtlUserThreadStart+1b 
    Could not restore the exception information passed to the exception filter. Crash analysis unavailable.

    Well-Known COM STA Threads Report


    STA Name   

    Thread ID   

    Thread Status   

    Call Status

    Main STA    0 In-Call (bad symbols)    not fully resolved and may or may not be a problem. Further analysis of this thread may be required 


    Exception Information


    MSVCRT!MEMCPY+5AIn adwcleaner_7.1.0.0.exe.7864.dmp the assembly instruction at msvcrt!memcpy+5a in C:\Windows\SysWOW64\msvcrt.dll from Microsoft Corporation has caused an access violation exception (0xC0000005) when trying to read from memory location 0x01a7c000 on thread 10


    Module Information 

    Image Name: C:\Windows\SysWOW64\msvcrt.dll   Symbol Type:  PDB 
    Base address: 0x00905a4d   Time Stamp:  Fri Dec 16 08:45:38 2011  
    Checksum: 0x00000000   Comments:   
    COM DLL: False   Company Name:  Microsoft Corporation 
    ISAPIExtension: False   File Description:  Windows NT CRT DLL 
    ISAPIFilter: False   File Version:  7.0.7601.17744 (win7sp1_gdr.111215-1535) 
    Managed DLL: False   Internal Name:  msvcrt.dll 
    VB DLL: False   Legal Copyright:  Â© Microsoft Corporation. All rights reserved. 
    Loaded Image Name:  msvcrt.dll   Legal Trademarks:   
    Mapped Image Name:  c:\symbols\msvcrt.dll\4EEAF722ac000\msvcrt.dll   Original filename:  msvcrt.dll 
    Module name:  msvcrt   Private Build:   
    Single Threaded:  False   Product Name:  Microsoft® Windows® Operating System 
    Module Size:  688 KBytes   Product Version:  7.0.7601.17744 
    Symbol File Name:  c:\symbols\msvcrt.pdb\F1D253F9555C46DF8076400A52B3A9292\msvcrt.pdb   Special Build:  & 


      

     

    Analysis Rule Summary 
     

    Rule Name Status Details 

    CrashHangAnalysis - v (2.2.0.14) Completed   
     


    close


     

    close


     


     
    Table of Contents


    CrashHangAnalysis


    Report for adwcleaner_7.1.0.0.exe.7864.dmp


    Top 5 Threads by CPU time

    Thread Report


    Well-Known COM STA Threads Report
     

     

  7. I know how to do it. Without errors Memtest 0% error . So what does this have to do with the mistake. Nothing, so please do not suggest bad solutions, because there were already many such and lost a lot of time. Such solutions to the left and the right will never solve the actual error. I tested on various devices and this is a bug that occurs on many computers and my friend PC.
    Please fix this bug.
    The old version works well, the new version has an internal bug.

     

     

    AdwCleaner 7.1 and 7.1.1 

    Loading module msvcrt.dll and CRASH

     

     

  8. AdwCleaner 7.1 new version CRASH /bug report

    Windows 7x64

     

     

    AdwCleaner 7.1 new version
    crashes every time it scans

    Nazwa aplikacji powodującej błąd: adwcleaner_7.1.0.0.exe, wersja: 7.1.0.0, sygnatura czasowa: 0x5acf354e
    Nazwa modułu powodującego błąd: msvcrt.dll, wersja: 7.0.7601.17744, sygnatura czasowa: 0x4eeaf722
    Kod wyjątku: 0xc0000005
    Przesunięcie błędu: 0x00009b60
    Identyfikator procesu powodującego błąd: 0x16e4
    Godzina uruchomienia aplikacji powodującej błąd: 0x01d3d95dd74b366d
    Ścieżka aplikacji powodującej błąd: C:\Users\MOJA\Downloads\adwcleaner_7.1.0.0.exe
    Ścieżka modułu powodującego błąd: C:\Windows\syswow64\msvcrt.dll
    Identyfikator raportu: 1924734c-4551-11e8-beaf-0862662a261f

    Screen_Shot_04-21-18_at_12.45_PM.jpg

    FAULTING_IP: 
    msvcrt!memcpy+5a
    76979b60 f3a5            rep movs dword ptr es:[edi],dword ptr [esi]

    EXCEPTION_RECORD:  ffffffff -- (.exr 0xffffffffffffffff)
    ExceptionAddress: 76979b60 (msvcrt!memcpy+0x0000005a)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 00000000
       Parameter[1]: 023dc000
    Attempt to read from address 023dc000

    PROCESS_NAME:  adwcleaner_7.1.0.0.exe

    ADDITIONAL_DEBUG_TEXT:  
    Use '!findthebuild' command to search for the target build information.
    If the build information is available, run '!findthebuild -s ; .reload' to set symbol path and load symbols.

    FAULTING_MODULE: 75370000 kernel32

    DEBUG_FLR_IMAGE_TIMESTAMP:  4eeaf722

    MODULE_NAME: msvcrt

    ERROR_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo

    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo

    EXCEPTION_PARAMETER1:  00000000

    EXCEPTION_PARAMETER2:  023dc000

    READ_ADDRESS:  023dc000 

    FOLLOWUP_IP: 
    msvcrt!memcpy+5a
    76979b60 f3a5            rep movs dword ptr es:[edi],dword ptr [esi]

    EXCEPTION_DOESNOT_MATCH_CODE:  This indicates a hardware error.
    Instruction at 76979b60 does not read/write to 023dc000

    MOD_LIST: <ANALYSIS/>

    LAST_CONTROL_TRANSFER:  from 754a73f6 to 76979b60

    FAULTING_THREAD:  00001d4c

    BUGCHECK_STR:  APPLICATION_FAULT_STRING_DEREFERENCE_CODE_ADDRESS_MISMATCH_INVALID_POINTER_READ_WRONG_SYMBOLS

    PRIMARY_PROBLEM_CLASS:  STRING_DEREFERENCE

    DEFAULT_BUCKET_ID:  STRING_DEREFERENCE

    STACK_TEXT:  
    1933f3f0 754a73f6 1a510038 020a99bc 0120ccf0 msvcrt!memcpy+0x5a
    1933f410 775b4e62 1933f42c 1a51002c 1933f8f8 oleaut32!BSTR_UserMarshal+0x50
    1933f44c 775b4df7 1933f8f8 6bc7337a 1a510028 rpcrt4!NdrpUserMarshalMarshall+0x4b
    1933f47c 77596ff0 1933f4ec 1933f8f8 6bc7337a rpcrt4!NdrUserMarshalMarshall+0xd8
    1933f4a8 7763013d bc36eefa 1933f8f4 08000265 rpcrt4!NdrpClientMarshal+0xf6
    1933f8bc 7727d8e2 6bc717d8 6bc73090 1933f8f4 rpcrt4!NdrClientCall2+0x19a
    1933f8dc 77179785 0000001c 00000014 1933f914 ole32!ObjectStublessClient+0xa2 [d:\w7rtm\com\rpc\ndrole\i386\stblsclt.cxx @ 474]
    1933f8ec 01229e3a 18fd04ec 020a99bc 020b1110 ole32!ObjectStubless+0xf [d:\w7rtm\com\rpc\ndrole\i386\stubless.asm @ 154]
    WARNING: Stack unwind information not available. Following frames may be wrong.
    1933f914 0123d287 00000000 1933f944 bf8724b2 adwcleaner_7_1_0_0+0x79e3a
    1933f968 0122610d bf87247a 1528b130 00000001 adwcleaner_7_1_0_0+0x8d287
    1933f9e0 01210cc0 bf872756 1528b130 1528b130 adwcleaner_7_1_0_0+0x7610d
    1933facc 01211539 1933faf8 bf872682 1528b130 adwcleaner_7_1_0_0+0x60cc0
    1933fb18 011f4d06 16524678 00000000 1933fc08 adwcleaner_7_1_0_0+0x61539
    1933fb28 01267db7 1528b130 00000000 00000005 adwcleaner_7_1_0_0+0x44d06
    1933fc1c 01a79cb9 1656b200 bf8721ce 00000000 adwcleaner_7_1_0_0+0xb7db7
    00000000 00000000 00000000 00000000 00000000 adwcleaner_7_1_0_0+0x8c9cb9


    STACK_COMMAND:  .cxr 0000000000000000 ; kb ; ~11s; .ecxr ; kb

    SYMBOL_STACK_INDEX:  0

    SYMBOL_NAME:  msvcrt!memcpy+5a

    FOLLOWUP_NAME:  MachineOwner

    IMAGE_NAME:  msvcrt.dll

    BUCKET_ID:  WRONG_SYMBOLS

    FAILURE_BUCKET_ID:  STRING_DEREFERENCE_c0000005_msvcrt.dll!memcpy

    Followup: MachineOwner
    ---------

    0:011> lmvm msvcrt
    start    end        module name
    76970000 76a1c000   msvcrt     (pdb symbols)          c:\symbols\msvcrt.pdb\F1D253F9555C46DF8076400A52B3A9292\msvcrt.pdb
        Loaded symbol image file: msvcrt.dll
        Mapped memory image file: c:\symbols\msvcrt.dll\4EEAF722ac000\msvcrt.dll
        Image path: C:\Windows\SysWOW64\msvcrt.dll
        Image name: msvcrt.dll
        Timestamp:        Fri Dec 16 08:45:38 2011 (4EEAF722)
        CheckSum:         000A8F06
        ImageSize:        000AC000
        File version:     7.0.7601.17744
        Product version:  6.1.8638.17744
        File flags:       0 (Mask 3F)
        File OS:          40004 NT Win32
        File type:        1.0 App
        File date:        00000000.00000000
        Translations:     0409.04b0
        CompanyName:      Microsoft Corporation
        ProductName:      Microsoft® Windows® Operating System
        InternalName:     msvcrt.dll
        OriginalFilename: msvcrt.dll
        ProductVersion:   7.0.7601.17744
        FileVersion:      7.0.7601.17744 (win7sp1_gdr.111215-1535)
        FileDescription:  Windows NT CRT DLL
        LegalCopyright:   © Microsoft Corporation. All rights reserved.
    0:011> lmvm kernel32
    start    end        module name
    75370000 75480000   kernel32   (export symbols)       kernel32.dll
        Loaded symbol image file: kernel32.dll
        Mapped memory image file: C:\Windows\SysWOW64\kernel32.dll
        Image path: C:\Windows\SysWOW64\kernel32.dll
        Image name: kernel32.dll
        Timestamp:        Sat Mar 31 03:12:18 2018 (5ABEE072)
        CheckSum:         0011DEA5
        ImageSize:        00110000
        File version:     6.1.7601.24094
        Product version:  6.1.7601.24094
        File flags:       0 (Mask 3F)
        File OS:          40004 NT Win32
        File type:        2.0 Dll
        File date:        00000000.00000000
        Translations:     0409.04b0
        CompanyName:      Microsoft Corporation
        ProductName:      Microsoft® Windows® Operating System
        InternalName:     kernel32
        OriginalFilename: kernel32
        ProductVersion:   6.1.7601.24094
        FileVersion:      6.1.7601.24094 (win7sp1_ldr_escrow.180330-1600)
        FileDescription:  Windows NT BASE API Client DLL
        LegalCopyright:   © Microsoft Corporation. All rights reserved.
     

     

     

  9. Application dissatisfaction.

     

    The application blocks many pages. I will not report every day a good site that should not block, because it will be a waste of time and waste.
    For comparison ESET SMART Security never fails to block good pages (better detection?)

    3.2.2 Malware Bytes will corrupt my system and lock my system restore.:angry:

    Never use this most under-developed tool, more problems than the utility.

     

    Many errorssŁ

    Example 1

    Wywołanie ScRegSetValueExW dla Security nie powiodło się i wystąpił następujący błąd: 
    Odmowa dostępu..

     

    Example 2

    Menedżer sterowania usługami próbował podjąć akcję korekcyjną (Uruchom usługę ponownie) po nieoczekiwanym zakończeniu usługi Serwer, ale ta akcja nie powiodła się przy następującym błędzie: 
    Jedno wystąpienie usługi już działa..

     

    Example 3

    Wystąpił nieokreślony błąd podczas przywracania systemu: (Zaplanowany punkt kontrolny). Informacje dodatkowe: 0x80070005.

     

    Screen_Shot_11-15-17_at_01.14_PM.jpg

     

     

  10. JDownloader 2 + Malwarebytes = CRASH! (log). Please help.

    ## A fatal error has been detected by the Java Runtime Environment:##  EXCEPTION_ACCESS_VIOLATION (0xc0000005) at pc=0x000007fed814360f, pid=6500, tid=11128## JRE version: Java(TM) SE Runtime Environment (7.0_45-b18) (build 1.7.0_45-b18)# Java VM: Java HotSpot(TM) 64-Bit Server VM (24.45-b08 mixed mode windows-amd64 compressed oops)# Problematic frame:# C  [MBAE64.dll+0x360f]## Failed to write core dump. Minidumps are not enabled by default on client versions of Windows## If you would like to submit a bug report, please visit:#   http://bugreport.sun.com/bugreport/crash.jsp# The crash happened outside the Java Virtual Machine in native code.# See problematic frame for where to report the bug.#---------------  T H R E A D  ---------------Current thread (0x00000000188cc800):  JavaThread "WatchDog: downloadWatchDog" daemon [_thread_in_native, id=11128, stack(0x000000001c100000,0x000000001c200000)]siginfo: ExceptionCode=0xc0000005, reading address 0x0000000000000010Registers:RAX=0x0000000000000000, RBX=0x00000000188cc9e8, RCX=0x000007fed81f9de8, RDX=0x0000000023919be0RSP=0x000000001c1fe150, RBP=0x0000000000000000, RSI=0x000000001de516c0, RDI=0x000000001c1fe1b0R8 =0x0000000000000000, R9 =0xffffffffffffffff, R10=0x006b00610074006e, R11=0x000000001e049e30R12=0x0000000000000000, R13=0x0000000664b7a9f0, R14=0x000000001c1fe5d8, R15=0x00000000188cc800RIP=0x000007fed814360f, EFLAGS=0x0000000000010206Top of Stack: (sp=0x000000001c1fe150)0x000000001c1fe150:   cccccccccccccccc cccccccccccccccc0x000000001c1fe160:   cccccccccccccccc cccccccccccccccc0x000000001c1fe170:   cccccccccccccccc cccccccccccccccc0x000000001c1fe180:   cccccccccccccccc cccccccccccccccc0x000000001c1fe190:   cccccccccccccccc fffffffffffffffe0x000000001c1fe1a0:   cccccccccccccccc cccccccccccccccc0x000000001c1fe1b0:   00000000238e9c1a 000007fed816f2780x000000001c1fe1c0:   000007fed81f9de8 0000000023919be00x000000001c1fe1d0:   000000001de51ea0 ffffffffffffffff0x000000001c1fe1e0:   000000000000003d cccccccccccccccc0x000000001c1fe1f0:   cccccccccccccccc cccccccccccccccc0x000000001c1fe200:   006e006f006b0076 0074006b006100740x000000001c1fe210:   00750072002e0065 0067006f006c002e0x000000001c1fe220:   fefe00000033002e fefefefefefefefe0x000000001c1fe230:   fefefefefefefefe fefefefefefefefe0x000000001c1fe240:   fefefefefefefefe fefefefefefefefe Instructions: (pc=0x000007fed814360f)0x000007fed81435ef:   08 e9 a9 00 00 00 48 8b 44 24 70 48 8b 4c 24 700x000007fed81435ff:   48 8b 09 48 89 48 08 48 8b 44 24 70 48 8b 40 080x000007fed814360f:   48 83 78 10 00 74 18 48 8b 44 24 70 48 8b 40 080x000007fed814361f:   48 8b 4c 24 70 48 8b 40 10 48 89 41 08 eb d8 b9 Register to memory mapping:RAX=0x0000000000000000 is an unknown valueRBX=0x00000000188cc9e8 is an unknown valueRCX=0x000007fed81f9de8 is an unknown valueRDX=0x0000000023919be0 is an unknown valueRSP=0x000000001c1fe150 is pointing into the stack for thread: 0x00000000188cc800RBP=0x0000000000000000 is an unknown valueRSI=0x000000001de516c0 is an unknown valueRDI=0x000000001c1fe1b0 is pointing into the stack for thread: 0x00000000188cc800R8 =0x0000000000000000 is an unknown valueR9 =0xffffffffffffffff is an unknown valueR10=0x006b00610074006e is an unknown valueR11=0x000000001e049e30 is an unknown valueR12=0x0000000000000000 is an unknown valueR13=0x0000000664b7a9f0 is an oop{method}  - klass: {other class}R14=0x000000001c1fe5d8 is pointing into the stack for thread: 0x00000000188cc800R15=0x00000000188cc800 is a threadStack: [0x000000001c100000,0x000000001c200000],  sp=0x000000001c1fe150,  free space=1016kNative frames: (J=compiled Java code, j=interpreted, Vv=VM code, C=native code)C  [MBAE64.dll+0x360f][error occurred during error reporting (printing native stack), id 0xc0000005]Java frames: (J=compiled Java code, j=interpreted, Vv=VM code)j  java.io.WinNTFileSystem.rename0(Ljava/io/File;Ljava/io/File;)Z+0j  java.io.Win32FileSystem.rename(Ljava/io/File;Ljava/io/File;)Z+17j  java.io.File.renameTo(Ljava/io/File;)Z+57j  java.util.logging.FileHandler.rotate()V+68j  java.util.logging.FileHandler.access$100(Ljava/util/logging/FileHandler;)V+1j  java.util.logging.FileHandler$1.run()Ljava/lang/Object;+4v  ~StubRoutines::call_stubJ  java.security.AccessController.doPrivileged(Ljava/security/PrivilegedAction;)Ljava/lang/Object;J  org.appwork.utils.logging2.LogSource.flush()Vj  org.appwork.utils.logging2.LogSource.close()V+1j  jd.controlling.downloadcontroller.DownloadWatchDog$22.execute(Ljd/controlling/downloadcontroller/DownloadSession;)V+341J  jd.controlling.downloadcontroller.DownloadWatchDog$29.processJobs()Vj  jd.controlling.downloadcontroller.DownloadWatchDog$29.run()V+282v  ~StubRoutines::call_stub---------------  P R O C E S S  ---------------Java Threads: ( => current thread )  0x000000001931f800 JavaThread "DownloadChunkRAF:jyZokbrDe9I.jpg" daemon [_thread_in_native, id=12248, stack(0x0000000017d60000,0x0000000017e60000)]  0x000000001745c000 JavaThread "DownloadChunkRAF:L4kAFfRZwcE.jpg" daemon [_thread_in_native, id=13096, stack(0x0000000019c60000,0x0000000019d60000)]  0x00000000188cb800 JavaThread "DownloadChunkRAF:Dpzqo9Et2ME.jpg" daemon [_thread_in_native, id=4588, stack(0x000000001d490000,0x000000001d590000)]  0x000000001745d000 JavaThread "DownloadChunkRAF:fOhACc7GWKY.jpg" daemon [_thread_in_native, id=11396, stack(0x000000001d190000,0x000000001d290000)]  0x0000000017462000 JavaThread "Download: 137050961_313909639_vkontakte.ru" daemon [_thread_in_native, id=5324, stack(0x000000001c6f0000,0x000000001c7f0000)]  0x00000000188d1000 JavaThread "Scheduler:org.appwork.storage.config.MinTimeWeakReference" daemon [_thread_blocked, id=13300, stack(0x0000000020930000,0x0000000020a30000)]  0x0000000017460000 JavaThread "Download: 137050961_313909577_vkontakte.ru" daemon [_thread_blocked, id=2956, stack(0x000000001f190000,0x000000001f290000)]  0x000000001745f000 JavaThread "Download: 137050961_313909322_vkontakte.ru" daemon [_thread_blocked, id=13136, stack(0x0000000017e80000,0x0000000017f80000)]  0x0000000018b18800 JavaThread "Download: 137050961_313909265_vkontakte.ru" daemon [_thread_blocked, id=11464, stack(0x000000001f8b0000,0x000000001f9b0000)]  0x0000000018b17000 JavaThread "Download: 137050961_313906256_vkontakte.ru" daemon [_thread_in_native, id=5416, stack(0x000000001d6c0000,0x000000001d7c0000)]  0x00000000188c9000 JavaThread "Download: 137050961_313904990_vkontakte.ru" daemon [_thread_in_native, id=12108, stack(0x000000001d8d0000,0x000000001d9d0000)]  0x00000000188c7800 JavaThread "Download: 137050961_307702177_vkontakte.ru" daemon [_thread_blocked, id=8908, stack(0x0000000020580000,0x0000000020680000)]  0x0000000017460800 JavaThread "Download: 134342942_292284161_vkontakte.ru" daemon [_thread_in_native, id=8768, stack(0x000000001ad40000,0x000000001ae40000)]  0x0000000018b14000 JavaThread "Download: 134342942_292283937_vkontakte.ru" daemon [_thread_in_native, id=12240, stack(0x0000000020240000,0x0000000020340000)]  0x0000000018b18000 JavaThread "Download: 134342942_292283915_vkontakte.ru" daemon [_thread_in_native, id=9212, stack(0x000000001ec90000,0x000000001ed90000)]  0x000000001745b800 JavaThread "Scheduler:jd.gui.swing.jdgui.components.premiumbar.ServicePanel" daemon [_thread_blocked, id=6344, stack(0x000000001d5b0000,0x000000001d6b0000)]  0x0000000018b15800 JavaThread "Download: 134342942_295360710_vkontakte.ru" daemon [_thread_in_native, id=11336, stack(0x0000000020440000,0x0000000020540000)]  0x000000001931e000 JavaThread "Download: 134342942_295360673_vkontakte.ru" daemon [_thread_in_native, id=8072, stack(0x000000001d320000,0x000000001d420000)]  0x0000000018b15000 JavaThread "Download: 134342942_295360490_vkontakte.ru" daemon [_thread_in_native, id=9916, stack(0x000000001bd40000,0x000000001be40000)]  0x0000000018b16800 JavaThread "DownloadSpeedManager" daemon [_thread_blocked, id=3376, stack(0x0000000019d90000,0x0000000019e90000)]  0x000000001745e800 JavaThread "Scheduler:org.jdownloader.gui.views.components.packagetable.PackageControllerTable$2" daemon [_thread_blocked, id=1240, stack(0x000000001c000000,0x000000001c100000)]  0x0000000019322000 JavaThread "Scheduler:org.appwork.storage.config.MinTimeWeakReference" daemon [_thread_blocked, id=10972, stack(0x000000001ea20000,0x000000001eb20000)]  0x000000001931c000 JavaThread "Scheduler:org.jdownloader.gui.views.downloads.action.GenericDeleteFromDownloadlistAction$2" daemon [_thread_blocked, id=2696, stack(0x000000001f620000,0x000000001f720000)]  0x00000000188c7000 JavaThread "Scheduler:org.jdownloader.gui.views.downloads.action.GenericDeleteFromDownloadlistAction$2" daemon [_thread_blocked, id=7980, stack(0x000000001f750000,0x000000001f850000)]  0x0000000019187000 JavaThread "Scheduler:org.jdownloader.gui.views.downloads.action.GenericDeleteFromDownloadlistAction$2" daemon [_thread_blocked, id=1912, stack(0x000000001f500000,0x000000001f600000)]  0x0000000019181000 JavaThread "Scheduler:org.jdownloader.gui.views.downloads.action.GenericDeleteFromDownloadlistAction$2" daemon [_thread_blocked, id=3208, stack(0x000000001f2c0000,0x000000001f3c0000)]  0x0000000019185800 JavaThread "Scheduler:org.jdownloader.gui.views.downloads.action.GenericDeleteFromDownloadlistAction$2" daemon [_thread_blocked, id=7680, stack(0x000000001cd40000,0x000000001ce40000)]  0x0000000019185000 JavaThread "Scheduler:jd.controlling.downloadcontroller.DownloadController" daemon [_thread_in_native, id=10936, stack(0x000000001eda0000,0x000000001eea0000)]  0x000000001931c800 JavaThread "Queue:TaskQueue" daemon [_thread_blocked, id=13288, stack(0x000000001c4e0000,0x000000001c5e0000)]  0x00000000188c5800 JavaThread "Speedmeter updater" daemon [_thread_blocked, id=4732, stack(0x000000001a990000,0x000000001aa90000)]=>0x00000000188cc800 JavaThread "WatchDog: downloadWatchDog" daemon [_thread_in_native, id=11128, stack(0x000000001c100000,0x000000001c200000)]  0x0000000019188000 JavaThread "pool-1-thread-1" [_thread_blocked, id=10304, stack(0x000000001eea0000,0x000000001efa0000)]  0x0000000019182000 JavaThread "Thread-25" [_thread_blocked, id=8136, stack(0x000000001d7d0000,0x000000001d8d0000)]  0x00000000188d1800 JavaThread "HttpServerThread:9666:true" [_thread_in_native, id=11436, stack(0x000000001c5e0000,0x000000001c6e0000)]  0x00000000188ce800 JavaThread "DestroyJavaVM" [_thread_blocked, id=6784, stack(0x00000000025d0000,0x00000000026d0000)]  0x00000000188ce000 JavaThread "stresstest" [_thread_blocked, id=11804, stack(0x000000001cf90000,0x000000001d090000)]  0x00000000188cd000 JavaThread "UpdateChecker" [_thread_blocked, id=2168, stack(0x000000001ce90000,0x000000001cf90000)]  0x00000000188c4000 JavaThread "Swing-Shell" daemon [_thread_blocked, id=11144, stack(0x000000001c9b0000,0x000000001cab0000)]  0x00000000188c8800 JavaThread "Queue:jd.controlling.downloadcontroller.DownloadController" daemon [_thread_blocked, id=11368, stack(0x000000001af00000,0x000000001b000000)]  0x00000000188c6000 JavaThread "Scheduler:org.jdownloader.gui.views.downloads.table.DownloadsTableModel" daemon [_thread_blocked, id=9944, stack(0x000000001ab30000,0x000000001ac30000)]  0x00000000188c4800 JavaThread "TimerQueue" daemon [_thread_blocked, id=8588, stack(0x000000001a880000,0x000000001a980000)]  0x00000000188c2800 JavaThread "SyntheticaCleanerThread" daemon [_thread_blocked, id=9356, stack(0x000000001a520000,0x000000001a620000)]  0x0000000018923800 JavaThread "Scheduler:org.appwork.utils.swing.SlowEDTDetector$1" daemon [_thread_blocked, id=4624, stack(0x000000001a310000,0x000000001a410000)]  0x0000000018a80800 JavaThread "AWT-EventQueue-0" [_thread_blocked, id=1720, stack(0x000000001a1d0000,0x000000001a2d0000)]  0x0000000018a80000 JavaThread "AWT-Shutdown" [_thread_blocked, id=5996, stack(0x000000001a010000,0x000000001a110000)]  0x0000000017299000 JavaThread "SingleAppInstance: JD2" daemon [_thread_in_native, id=516, stack(0x0000000018200000,0x0000000018300000)]  0x000000001729e000 JavaThread "LogFlushThread" daemon [_thread_blocked, id=11056, stack(0x0000000017bc0000,0x0000000017cc0000)]  0x0000000017299800 JavaThread "AWT-Windows" daemon [_thread_in_native, id=7088, stack(0x0000000017a70000,0x0000000017b70000)]  0x0000000017298000 JavaThread "Java2D Disposer" daemon [_thread_blocked, id=11812, stack(0x0000000017800000,0x0000000017900000)]  0x000000001522c000 JavaThread "Service Thread" daemon [_thread_blocked, id=7196, stack(0x0000000016fd0000,0x00000000170d0000)]  0x0000000015220000 JavaThread "C2 CompilerThread1" daemon [_thread_blocked, id=2012, stack(0x0000000016d60000,0x0000000016e60000)]  0x000000001521e000 JavaThread "C2 CompilerThread0" daemon [_thread_blocked, id=8060, stack(0x0000000016bc0000,0x0000000016cc0000)]  0x000000001521c800 JavaThread "Attach Listener" daemon [_thread_blocked, id=9876, stack(0x0000000016a60000,0x0000000016b60000)]  0x0000000015215800 JavaThread "Signal Dispatcher" daemon [_thread_blocked, id=12132, stack(0x00000000168a0000,0x00000000169a0000)]  0x00000000151c3000 JavaThread "Finalizer" daemon [_thread_blocked, id=11392, stack(0x0000000016680000,0x0000000016780000)]  0x00000000151bc000 JavaThread "Reference Handler" daemon [_thread_blocked, id=5108, stack(0x00000000164d0000,0x00000000165d0000)]Other Threads:  0x00000000151b6000 VMThread [stack: 0x0000000016360000,0x0000000016460000] [id=4300]  0x0000000015236800 WatcherThread [stack: 0x0000000016e60000,0x0000000016f60000] [id=12268]VM state:not at safepoint (normal execution)VM Mutex/Monitor currently owned by a thread: NoneHeap PSYoungGen      total 2097664K, used 1130481K [0x0000000778900000, 0x0000000800000000, 0x0000000800000000)  eden space 1986048K, 56% used [0x0000000778900000,0x00000007bd8fc6e8,0x00000007f1c80000)  from space 111616K, 0% used [0x00000007f1c80000,0x00000007f1c80000,0x00000007f8980000)  to   space 113664K, 0% used [0x00000007f9100000,0x00000007f9100000,0x0000000800000000) ParOldGen       total 812544K, used 295997K [0x0000000669c00000, 0x000000069b580000, 0x0000000778900000)  object space 812544K, 36% used [0x0000000669c00000,0x000000067bd0f5f8,0x000000069b580000) PSPermGen       total 83968K, used 46182K [0x0000000664a00000, 0x0000000669c00000, 0x0000000669c00000)  object space 83968K, 55% used [0x0000000664a00000,0x0000000667719b80,0x0000000669c00000)Card table byte_map: [0x00000000058d0000,0x00000000065b0000] byte_map_base: 0x00000000025ab000Polling page: 0x0000000000690000Code Cache  [0x00000000028d0000, 0x0000000003320000, 0x00000000058d0000) total_blobs=3910 nmethods=3251 adapters=610 free_code_cache=38804Kb largest_free_block=39572800Compilation events (10 events):Event: 2485.675 Thread 0x000000001521e000 3642             jd.controlling.downloadcontroller.DownloadWatchDog::handleFinalLinkStates (364 bytes)Event: 2486.079 Thread 0x000000001521e000 nmethod 3642 0x00000000032fe410 code [0x00000000032feec0, 0x0000000003307c20]Event: 2515.971 Thread 0x0000000015220000 3643 % !         org.appwork.utils.formatter.TimeFormatter::parseDateString @ 17 (58 bytes)Event: 2515.978 Thread 0x0000000015220000 nmethod 3643% 0x0000000003236c90 code [0x0000000003236e40, 0x00000000032373d8]Event: 2516.328 Thread 0x000000001521e000 3644   !         org.appwork.utils.formatter.TimeFormatter::parseDateString (58 bytes)Event: 2516.336 Thread 0x000000001521e000 nmethod 3644 0x0000000003043850 code [0x0000000003043a00, 0x0000000003043ed8]Event: 2548.207 Thread 0x0000000015220000 3645   !         java.awt.Component$BltBufferStrategy::showSubRegion (176 bytes)Event: 2548.230 Thread 0x0000000015220000 nmethod 3645 0x0000000003044a50 code [0x0000000003044c60, 0x00000000030455c0]Event: 2580.978 Thread 0x000000001521e000 3646   !         sun.font.GlyphLayout::layout (668 bytes)Event: 2581.042 Thread 0x000000001521e000 nmethod 3646 0x00000000032f8690 code [0x00000000032f8ae0, 0x00000000032fb168]GC Heap History (10 events):Event: 2568.289 GC heap before{Heap before GC invocations=331 (full 7): PSYoungGen      total 2085376K, used 2038664K [0x0000000778900000, 0x00000007ff800000, 0x0000000800000000)  eden space 1964032K, 100% used [0x0000000778900000,0x00000007f0700000,0x00000007f0700000)  from space 121344K, 61% used [0x00000007f0700000,0x00000007f4fe2218,0x00000007f7d80000)  to   space 118272K, 0% used [0x00000007f8480000,0x00000007f8480000,0x00000007ff800000) ParOldGen       total 787456K, used 400778K [0x0000000669c00000, 0x0000000699d00000, 0x0000000778900000)  object space 787456K, 50% used [0x0000000669c00000,0x00000006823629c8,0x0000000699d00000) PSPermGen       total 83968K, used 82714K [0x0000000664a00000, 0x0000000669c00000, 0x0000000669c00000)  object space 83968K, 98% used [0x0000000664a00000,0x0000000669ac6bb8,0x0000000669c00000)Event: 2568.358 GC heap afterHeap after GC invocations=331 (full 7): PSYoungGen      total 2093056K, used 89310K [0x0000000778900000, 0x00000007ffc00000, 0x0000000800000000)  eden space 1974784K, 0% used [0x0000000778900000,0x0000000778900000,0x00000007f1180000)  from space 118272K, 75% used [0x00000007f8480000,0x00000007fdbb7970,0x00000007ff800000)  to   space 117760K, 0% used [0x00000007f1180000,0x00000007f1180000,0x00000007f8480000) ParOldGen       total 787456K, used 400858K [0x0000000669c00000, 0x0000000699d00000, 0x0000000778900000)  object space 787456K, 50% used [0x0000000669c00000,0x00000006823769c8,0x0000000699d00000) PSPermGen       total 83968K, used 82714K [0x0000000664a00000, 0x0000000669c00000, 0x0000000669c00000)  object space 83968K, 98% used [0x0000000664a00000,0x0000000669ac6bb8,0x0000000669c00000)}Event: 2573.237 GC heap before{Heap before GC invocations=332 (full 7): PSYoungGen      total 2093056K, used 2064094K [0x0000000778900000, 0x00000007ffc00000, 0x0000000800000000)  eden space 1974784K, 100% used [0x0000000778900000,0x00000007f1180000,0x00000007f1180000)  from space 118272K, 75% used [0x00000007f8480000,0x00000007fdbb7970,0x00000007ff800000)  to   space 117760K, 0% used [0x00000007f1180000,0x00000007f1180000,0x00000007f8480000) ParOldGen       total 787456K, used 400858K [0x0000000669c00000, 0x0000000699d00000, 0x0000000778900000)  object space 787456K, 50% used [0x0000000669c00000,0x00000006823769c8,0x0000000699d00000) PSPermGen       total 83968K, used 83215K [0x0000000664a00000, 0x0000000669c00000, 0x0000000669c00000)  object space 83968K, 99% used [0x0000000664a00000,0x0000000669b43ed8,0x0000000669c00000)Event: 2573.299 GC heap afterHeap after GC invocations=332 (full 7): PSYoungGen      total 2092544K, used 78200K [0x0000000778900000, 0x00000007ff980000, 0x0000000800000000)  eden space 1974784K, 0% used [0x0000000778900000,0x0000000778900000,0x00000007f1180000)  from space 117760K, 66% used [0x00000007f1180000,0x00000007f5dde308,0x00000007f8480000)  to   space 114688K, 0% used [0x00000007f8980000,0x00000007f8980000,0x00000007ff980000) ParOldGen       total 787456K, used 400922K [0x0000000669c00000, 0x0000000699d00000, 0x0000000778900000)  object space 787456K, 50% used [0x0000000669c00000,0x00000006823869c8,0x0000000699d00000) PSPermGen       total 83968K, used 83215K [0x0000000664a00000, 0x0000000669c00000, 0x0000000669c00000)  object space 83968K, 99% used [0x0000000664a00000,0x0000000669b43ed8,0x0000000669c00000)}Event: 2579.078 GC heap before{Heap before GC invocations=333 (full 7): PSYoungGen      total 2092544K, used 2052984K [0x0000000778900000, 0x00000007ff980000, 0x0000000800000000)  eden space 1974784K, 100% used [0x0000000778900000,0x00000007f1180000,0x00000007f1180000)  from space 117760K, 66% used [0x00000007f1180000,0x00000007f5dde308,0x00000007f8480000)  to   space 114688K, 0% used [0x00000007f8980000,0x00000007f8980000,0x00000007ff980000) ParOldGen       total 787456K, used 400922K [0x0000000669c00000, 0x0000000699d00000, 0x0000000778900000)  object space 787456K, 50% used [0x0000000669c00000,0x00000006823869c8,0x0000000699d00000) PSPermGen       total 83968K, used 83841K [0x0000000664a00000, 0x0000000669c00000, 0x0000000669c00000)  object space 83968K, 99% used [0x0000000664a00000,0x0000000669be06c0,0x0000000669c00000)Event: 2579.147 GC heap afterHeap after GC invocations=333 (full 7): PSYoungGen      total 2098176K, used 82491K [0x0000000778900000, 0x00000007ff700000, 0x0000000800000000)  eden space 1986048K, 0% used [0x0000000778900000,0x0000000778900000,0x00000007f1c80000)  from space 112128K, 73% used [0x00000007f8980000,0x00000007fda0ee88,0x00000007ff700000)  to   space 111616K, 0% used [0x00000007f1c80000,0x00000007f1c80000,0x00000007f8980000) ParOldGen       total 787456K, used 400994K [0x0000000669c00000, 0x0000000699d00000, 0x0000000778900000)  object space 787456K, 50% used [0x0000000669c00000,0x00000006823989c8,0x0000000699d00000) PSPermGen       total 83968K, used 83841K [0x0000000664a00000, 0x0000000669c00000, 0x0000000669c00000)  object space 83968K, 99% used [0x0000000664a00000,0x0000000669be06c0,0x0000000669c00000)}Event: 2579.795 GC heap before{Heap before GC invocations=334 (full 7): PSYoungGen      total 2098176K, used 262024K [0x0000000778900000, 0x00000007ff700000, 0x0000000800000000)  eden space 1986048K, 9% used [0x0000000778900000,0x0000000783853490,0x00000007f1c80000)  from space 112128K, 73% used [0x00000007f8980000,0x00000007fda0ee88,0x00000007ff700000)  to   space 111616K, 0% used [0x00000007f1c80000,0x00000007f1c80000,0x00000007f8980000) ParOldGen       total 787456K, used 400994K [0x0000000669c00000, 0x0000000699d00000, 0x0000000778900000)  object space 787456K, 50% used [0x0000000669c00000,0x00000006823989c8,0x0000000699d00000) PSPermGen       total 83968K, used 83966K [0x0000000664a00000, 0x0000000669c00000, 0x0000000669c00000)  object space 83968K, 99% used [0x0000000664a00000,0x0000000669bffb88,0x0000000669c00000)Event: 2579.838 GC heap afterHeap after GC invocations=334 (full 7): PSYoungGen      total 2097664K, used 53309K [0x0000000778900000, 0x0000000800000000, 0x0000000800000000)  eden space 1986048K, 0% used [0x0000000778900000,0x0000000778900000,0x00000007f1c80000)  from space 111616K, 47% used [0x00000007f1c80000,0x00000007f508f620,0x00000007f8980000)  to   space 113664K, 0% used [0x00000007f9100000,0x00000007f9100000,0x0000000800000000) ParOldGen       total 787456K, used 401082K [0x0000000669c00000, 0x0000000699d00000, 0x0000000778900000)  object space 787456K, 50% used [0x0000000669c00000,0x00000006823ae9c8,0x0000000699d00000) PSPermGen       total 83968K, used 83966K [0x0000000664a00000, 0x0000000669c00000, 0x0000000669c00000)  object space 83968K, 99% used [0x0000000664a00000,0x0000000669bffb88,0x0000000669c00000)}Event: 2579.838 GC heap before{Heap before GC invocations=335 (full 8): PSYoungGen      total 2097664K, used 53309K [0x0000000778900000, 0x0000000800000000, 0x0000000800000000)  eden space 1986048K, 0% used [0x0000000778900000,0x0000000778900000,0x00000007f1c80000)  from space 111616K, 47% used [0x00000007f1c80000,0x00000007f508f620,0x00000007f8980000)  to   space 113664K, 0% used [0x00000007f9100000,0x00000007f9100000,0x0000000800000000) ParOldGen       total 787456K, used 401082K [0x0000000669c00000, 0x0000000699d00000, 0x0000000778900000)  object space 787456K, 50% used [0x0000000669c00000,0x00000006823ae9c8,0x0000000699d00000) PSPermGen       total 83968K, used 83966K [0x0000000664a00000, 0x0000000669c00000, 0x0000000669c00000)  object space 83968K, 99% used [0x0000000664a00000,0x0000000669bffb88,0x0000000669c00000)Event: 2580.292 GC heap afterHeap after GC invocations=335 (full 8): PSYoungGen      total 2097664K, used 0K [0x0000000778900000, 0x0000000800000000, 0x0000000800000000)  eden space 1986048K, 0% used [0x0000000778900000,0x0000000778900000,0x00000007f1c80000)  from space 111616K, 0% used [0x00000007f1c80000,0x00000007f1c80000,0x00000007f8980000)  to   space 113664K, 0% used [0x00000007f9100000,0x00000007f9100000,0x0000000800000000) ParOldGen       total 812544K, used 295997K [0x0000000669c00000, 0x000000069b580000, 0x0000000778900000)  object space 812544K, 36% used [0x0000000669c00000,0x000000067bd0f5f8,0x000000069b580000) PSPermGen       total 83968K, used 45832K [0x0000000664a00000, 0x0000000669c00000, 0x0000000669c00000)  object space 83968K, 54% used [0x0000000664a00000,0x00000006676c2130,0x0000000669c00000)}Deoptimization events (10 events):Event: 2195.464 Thread 0x00000000188ce000 Uncommon trap: reason=bimorphic action=maybe_recompile pc=0x0000000002bb1ef4 method=org.codehaus.jackson.map.ObjectMapper._readMapAndClose(Lorg/codehaus/jackson/JsonParser;Lorg/codehaus/jackson/type/JavaType;)Ljava/lang/Object; @ 106Event: 2205.321 Thread 0x00000000188cb800 Uncommon trap: reason=class_check action=maybe_recompile pc=0x00000000030341e4 method=org.codehaus.jackson.map.ser.std.MapSerializer.serialize(Ljava/lang/Object;Lorg/codehaus/jackson/JsonGenerator;Lorg/codehaus/jackson/map/SerializerProvider;)V @ 2Event: 2230.806 Thread 0x0000000018b15800 Uncommon trap: reason=unloaded action=reinterpret pc=0x00000000032e32bc method=java.util.GregorianCalendar.computeTime()V @ 867Event: 2253.956 Thread 0x00000000188c8800 Uncommon trap: reason=class_check action=maybe_recompile pc=0x000000000314f020 method=jd.plugins.FilePackageView.getConditionalSkipReason(Ljd/plugins/DownloadLink;)Lorg/jdownloader/plugins/ConditionalSkipReason; @ 10Event: 2253.993 Thread 0x00000000188cc800 Uncommon trap: reason=unreached action=reinterpret pc=0x0000000002c7af54 method=jd.controlling.downloadcontroller.DownloadWatchDog.finalize(Ljd/controlling/downloadcontroller/DownloadLinkCandidateSelector;)V @ 73Event: 2254.087 Thread 0x00000000188cc800 Uncommon trap: reason=unreached action=reinterpret pc=0x0000000002b3074c method=jd.controlling.downloadcontroller.DownloadWatchDog.finalizeConditionalSkipReasons(Ljd/controlling/downloadcontroller/DownloadSession;)Ljava/util/HashSet; @ 87Event: 2254.263 Thread 0x00000000188c8800 Uncommon trap: reason=class_check action=maybe_recompile pc=0x000000000314f020 method=jd.plugins.FilePackageView.getConditionalSkipReason(Ljd/plugins/DownloadLink;)Lorg/jdownloader/plugins/ConditionalSkipReason; @ 10Event: 2254.398 Thread 0x00000000188cc800 Uncommon trap: reason=unreached action=reinterpret pc=0x0000000002c78358 method=jd.controlling.downloadcontroller.DownloadWatchDog.activateDownloads()Ljava/util/List; @ 163Event: 2254.422 Thread 0x00000000188cc800 Uncommon trap: reason=unreached action=reinterpret pc=0x0000000003128c1c method=jd.controlling.downloadcontroller.DownloadWatchDog.canIgnore(Ljd/controlling/downloadcontroller/DownloadLinkCandidateSelector;Ljd/plugins/DownloadLink;Z)Z @ 35Event: 2254.441 Thread 0x00000000188c8800 Uncommon trap: reason=class_check action=maybe_recompile pc=0x000000000314f020 method=jd.plugins.FilePackageView.getConditionalSkipReason(Ljd/plugins/DownloadLink;)Lorg/jdownloader/plugins/ConditionalSkipReason; @ 10Internal exceptions (10 events):Event: 2583.001 Thread 0x000000001745d800 Threw 0x00000007b214d9c8 at C:\re\jdk7u45\229\hotspot\src\share\vm\prims\jni.cpp:717Event: 2583.053 Thread 0x000000001745c000 Threw 0x000000079a2057c0 at C:\re\jdk7u45\229\hotspot\src\share\vm\prims\jni.cpp:717Event: 2583.053 Thread 0x000000001745c000 Threw 0x000000079a205990 at C:\re\jdk7u45\229\hotspot\src\share\vm\prims\jni.cpp:717Event: 2583.053 Thread 0x000000001745c000 Threw 0x000000079a205b30 at C:\re\jdk7u45\229\hotspot\src\share\vm\prims\jni.cpp:717Event: 2583.095 Thread 0x0000000017460000 Threw 0x00000007b387f258 at C:\re\jdk7u45\229\hotspot\src\share\vm\prims\jni.cpp:717Event: 2583.095 Thread 0x0000000017460000 Threw 0x00000007b387f428 at C:\re\jdk7u45\229\hotspot\src\share\vm\prims\jni.cpp:717Event: 2583.095 Thread 0x0000000017460000 Threw 0x00000007b387f5c8 at C:\re\jdk7u45\229\hotspot\src\share\vm\prims\jni.cpp:717Event: 2583.096 Thread 0x000000001745f000 Threw 0x00000007b49f7ea0 at C:\re\jdk7u45\229\hotspot\src\share\vm\prims\jni.cpp:717Event: 2583.096 Thread 0x000000001745f000 Threw 0x00000007b49f8070 at C:\re\jdk7u45\229\hotspot\src\share\vm\prims\jni.cpp:717Event: 2583.097 Thread 0x000000001745f000 Threw 0x00000007b49f8210 at C:\re\jdk7u45\229\hotspot\src\share\vm\prims\jni.cpp:717Events (10 events):Event: 2582.603 Thread 0x000000001745d000 Thread exited: 0x000000001745d000Event: 2582.606 Thread 0x0000000017462000 Thread exited: 0x0000000017462000Event: 2582.732 Thread 0x0000000017462000 Thread added: 0x0000000017462000Event: 2582.813 Thread 0x000000001745d000 Thread added: 0x000000001745d000Event: 2582.908 Thread 0x00000000188cb800 Thread added: 0x00000000188cb800Event: 2583.001 Thread 0x00000000188ca000 Thread added: 0x00000000188ca000Event: 2583.053 Thread 0x0000000018b1a000 Thread exited: 0x0000000018b1a000Event: 2583.055 Thread 0x000000001745c000 Thread exited: 0x000000001745c000Event: 2583.095 Thread 0x000000001745c000 Thread added: 0x000000001745c000Event: 2583.097 Thread 0x000000001931f800 Thread added: 0x000000001931f800Dynamic libraries:0x000000013ffd0000 - 0x0000000140003000 	C:\Program Files\Java\jre7\bin\javaw.exe0x00000000778b0000 - 0x0000000077a59000 	C:\Windows\SYSTEM32\ntdll.dll0x0000000077690000 - 0x00000000777af000 	C:\Windows\system32\kernel32.dll0x000007fefd7a0000 - 0x000007fefd80b000 	C:\Windows\system32\KERNELBASE.dll0x000007fefe350000 - 0x000007fefe42b000 	C:\Windows\system32\ADVAPI32.dll0x000007fefdf10000 - 0x000007fefdfaf000 	C:\Windows\system32\msvcrt.dll0x000007fefdd10000 - 0x000007fefdd2f000 	C:\Windows\SYSTEM32\sechost.dll0x000007fefe180000 - 0x000007fefe2ad000 	C:\Windows\system32\RPCRT4.dll0x00000000777b0000 - 0x00000000778aa000 	C:\Windows\system32\USER32.dll0x000007fefe110000 - 0x000007fefe177000 	C:\Windows\system32\GDI32.dll0x000007fefe430000 - 0x000007fefe43e000 	C:\Windows\system32\LPK.dll0x000007fefde40000 - 0x000007fefdf09000 	C:\Windows\system32\USP10.dll0x000007fefbfd0000 - 0x000007fefc1c4000 	C:\Windows\WinSxS\amd64_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_fa396087175ac9ac\COMCTL32.dll0x000007fefe930000 - 0x000007fefe9a1000 	C:\Windows\system32\SHLWAPI.dll0x000007feff910000 - 0x000007feff93e000 	C:\Windows\system32\IMM32.DLL0x000007fefdd30000 - 0x000007fefde39000 	C:\Windows\system32\MSCTF.dll0x000007fed8140000 - 0x000007fed8211000 	C:\Program Files\Malwarebytes Anti-Exploit\MBAE64.dll0x0000000077a70000 - 0x0000000077a77000 	C:\Windows\system32\PSAPI.DLL0x000007fefeb10000 - 0x000007feff898000 	C:\Windows\system32\SHELL32.dll0x000000006bd90000 - 0x000000006bf5d000 	C:\Windows\system32\MSVCR100D.dll0x0000000073200000 - 0x00000000732fc000 	C:\Windows\system32\MSVCP100D.dll0x00000000714d0000 - 0x00000000715a2000 	C:\Program Files\Java\jre7\bin\msvcr100.dll0x000000005b900000 - 0x000000005c0c9000 	C:\Program Files\Java\jre7\bin\server\jvm.dll0x000007fefabf0000 - 0x000007fefabf9000 	C:\Windows\system32\WSOCK32.dll0x000007fefe8e0000 - 0x000007fefe92d000 	C:\Windows\system32\WS2_32.dll0x000007feff900000 - 0x000007feff908000 	C:\Windows\system32\NSI.dll0x000007fefb300000 - 0x000007fefb33b000 	C:\Windows\system32\WINMM.dll0x0000000075210000 - 0x000000007521f000 	C:\Program Files\Java\jre7\bin\verify.dll0x0000000075190000 - 0x00000000751b8000 	C:\Program Files\Java\jre7\bin\java.dll0x0000000074090000 - 0x00000000740a5000 	C:\Program Files\Java\jre7\bin\zip.dll0x0000000073fa0000 - 0x0000000073fb9000 	C:\Program Files\Java\jre7\bin\net.dll0x000007fefcec0000 - 0x000007fefcf15000 	C:\Windows\system32\mswsock.dll0x000007fefceb0000 - 0x000007fefceb7000 	C:\Windows\System32\wship6.dll0x0000000073f80000 - 0x0000000073f91000 	C:\Program Files\Java\jre7\bin\nio.dll0x0000000067110000 - 0x00000000672a5000 	C:\Program Files\Java\jre7\bin\awt.dll0x000007fefe9b0000 - 0x000007fefea87000 	C:\Windows\system32\OLEAUT32.dll0x000007fefe440000 - 0x000007fefe643000 	C:\Windows\system32\ole32.dll0x000007fefbb90000 - 0x000007fefbbe6000 	C:\Windows\system32\uxtheme.dll0x0000000180000000 - 0x0000000180015000 	C:\Program Files (x86)\Ad Muncher\AM64-33707.dll0x000007fefb540000 - 0x000007fefb558000 	C:\Windows\system32\dwmapi.dll0x000007fefd5c0000 - 0x000007fefd5cf000 	C:\Windows\system32\CRYPTBASE.dll0x000007fefc8a0000 - 0x000007fefc8a7000 	C:\Windows\System32\wshtcpip.dll0x000007fefd560000 - 0x000007fefd5b7000 	C:\Windows\system32\apphelp.dll0x0000000074560000 - 0x000000007456b000 	C:\Program Files\Java\jre7\bin\management.dll0x000007fefcf20000 - 0x000007fefcf37000 	C:\Windows\system32\CRYPTSP.dll0x000007fefcc20000 - 0x000007fefcc67000 	C:\Windows\system32\rsaenh.dll0x000007fefc9d0000 - 0x000007fefc9ee000 	C:\Windows\system32\USERENV.dll0x000007fefd690000 - 0x000007fefd69f000 	C:\Windows\system32\profapi.dll0x000007fefb570000 - 0x000007fefb585000 	C:\Windows\system32\NLAapi.dll0x000007fef84b0000 - 0x000007fef84c5000 	C:\Windows\system32\napinsp.dll0x000007fef8490000 - 0x000007fef84a9000 	C:\Windows\system32\pnrpnsp.dll0x000007fefcd40000 - 0x000007fefcd9b000 	C:\Windows\system32\DNSAPI.dll0x000007fef8410000 - 0x000007fef841b000 	C:\Windows\System32\winrnr.dll0x000007fefb1b0000 - 0x000007fefb1d7000 	C:\Windows\system32\IPHLPAPI.DLL0x000007fefb1a0000 - 0x000007fefb1ab000 	C:\Windows\system32\WINNSI.DLL0x000007fefb070000 - 0x000007fefb0c3000 	C:\Windows\System32\fwpuclnt.dll0x000007fef8620000 - 0x000007fef8628000 	C:\Windows\system32\rasadhlp.dll0x000007fef9f60000 - 0x000007fef9f97000 	C:\Users\MOJA\AppData\Local\Temp\jna-MOJA\jna1719979102019780610.dll0x000007fefae20000 - 0x000007fefae31000 	C:\Windows\system32\dhcpcsvc6.DLL0x000007fefae00000 - 0x000007fefae18000 	C:\Windows\system32\dhcpcsvc.DLL0x00000000725b0000 - 0x0000000072652000 	C:\Program Files\Java\jre7\bin\mlib_image.dll0x0000000073db0000 - 0x0000000073dda000 	C:\Program Files\Java\jre7\bin\dcpr.dll0x0000000072a50000 - 0x0000000072a96000 	C:\Program Files\Java\jre7\bin\fontmanager.dll0x0000000072550000 - 0x0000000072591000 	C:\Program Files\Java\jre7\bin\t2k.dll0x0000000073d30000 - 0x0000000073d54000 	C:\Program Files\Java\jre7\bin\sunec.dll0x000007feffb20000 - 0x000007feffbb9000 	C:\Windows\system32\CLBCatQ.DLL0x000007fefaea0000 - 0x000007fefb001000 	C:\Windows\system32\WindowsCodecs.dll0x000007fef5fa0000 - 0x000007fef5fd5000 	C:\Windows\system32\EhStorShell.dll0x000007feff940000 - 0x000007feffb17000 	C:\Windows\system32\SETUPAPI.dll0x000007fefd9c0000 - 0x000007fefd9f6000 	C:\Windows\system32\CFGMGR32.dll0x00000000026d0000 - 0x00000000026ea000 	C:\Windows\system32\DEVOBJ.dll0x000007fefbc50000 - 0x000007fefbd7c000 	C:\Windows\system32\PROPSYS.dll0x000000001bb10000 - 0x000000001bd05000 	C:\ProgramData\GG\ggdrive\ggdrive-overlay.dll0x000007fef5f20000 - 0x000007fef5f9e000 	C:\Windows\System32\cscui.dll0x000007fef5f10000 - 0x000007fef5f1c000 	C:\Windows\System32\CSCDLL.dll0x000007fef8fc0000 - 0x000007fef8fcf000 	C:\Windows\system32\CSCAPI.dll0x000007fef5e90000 - 0x000007fef5f10000 	C:\Windows\system32\ntshrui.dll0x000007fefd1e0000 - 0x000007fefd203000 	C:\Windows\system32\srvcli.dll0x000007fefb340000 - 0x000007fefb34b000 	C:\Windows\system32\slc.dll0x000007fefb840000 - 0x000007fefb86d000 	C:\Windows\system32\ntmarta.dll0x0000000007410000 - 0x0000000007462000 	C:\Windows\system32\WLDAP32.dll0x000007fefa040000 - 0x000007fefa0e0000 	C:\Windows\WinSxS\amd64_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.18201_none_a4d3b9377117c3df\comctl32.dll0x000007fee9710000 - 0x000007fee98ac000 	C:\Windows\system32\NetworkExplorer.dll0x000007fef6fd0000 - 0x000007fef7004000 	C:\Windows\System32\shdocvw.dll0x000007fef8140000 - 0x000007fef8158000 	C:\Windows\system32\MPR.dll0x000007fefa270000 - 0x000007fefa27a000 	C:\Windows\System32\drprov.dll0x000007fefd130000 - 0x000007fefd16d000 	C:\Windows\System32\WINSTA.dll0x000007fef9ed0000 - 0x000007fef9ef2000 	C:\Windows\System32\ntlanman.dll0x000007fee81a0000 - 0x000007fee81bd000 	C:\Windows\System32\davclnt.dll0x000007fefa260000 - 0x000007fefa26a000 	C:\Windows\System32\DAVHLPR.dll0x000007fefac10000 - 0x000007fefac25000 	C:\Windows\system32\wkscli.dll0x000007fefac30000 - 0x000007fefac3c000 	C:\Windows\system32\netutils.dll0x000007fefa280000 - 0x000007fefa4f1000 	C:\Windows\system32\wpdshext.dll0x000007fefb970000 - 0x000007fefbb86000 	C:\Windows\WinSxS\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.18120_none_2b25b14c71ebf230\gdiplus.dll0x000007fef82b0000 - 0x000007fef836d000 	C:\Windows\system32\PortableDeviceApi.dll0x000007fefd750000 - 0x000007fefd78a000 	C:\Windows\system32\WINTRUST.dll0x000000001c800000 - 0x000000001c96c000 	C:\Windows\system32\CRYPT32.dll0x000007fefd730000 - 0x000007fefd73f000 	C:\Windows\system32\MSASN1.dll0x000007fef9e90000 - 0x000007fef9eb7000 	C:\Windows\system32\EhStorAPI.dll0x000007fef6fc0000 - 0x000007fef6fcc000 	C:\Windows\system32\LINKINFO.dll0x000007fef4e00000 - 0x000007fef4ed7000 	C:\Windows\system32\SearchFolder.dll0x000007fef7e80000 - 0x000007fef7efb000 	C:\Windows\System32\StructuredQuery.dll0x000007fefd360000 - 0x000007fefd36b000 	C:\Windows\System32\Secur32.dll0x000007fefd530000 - 0x000007fefd555000 	C:\Windows\system32\SSPICLI.DLL0x000000006cec0000 - 0x000000006cf41000 	Z:\jdownloader2\tmp\7zip\SevenZipJBinding-FKPz9\libgcc_s_sjlj-1.dll0x000000006a2c0000 - 0x000000006a5d7000 	Z:\jdownloader2\tmp\7zip\SevenZipJBinding-FKPz9\lib7-Zip-JBinding.dll0x000007fefa130000 - 0x000007fefa1cc000 	C:\Windows\system32\mscms.dll0x000007fedc7f0000 - 0x000007fedc832000 	C:\Windows\system32\icm32.dll0x00000000731f0000 - 0x00000000731fb000 	C:\Program Files\Java\jre7\bin\sunmscapi.dll0x000007fefc690000 - 0x000007fefc7b5000 	C:\Windows\system32\dbghelp.dllVM Arguments:jvm_args: -Xmx6500m java_command: Z:\JDownloader2\JDownloader.jar -brdebugLauncher Type: SUN_STANDARDEnvironment Variables:PATH=C:\Program Files (x86)\NVIDIA Corporation\PhysX\Common;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\PROGRA~1\CONDUS~1\DISKEE~1\;C:\Program Files (x86)\Common Files\Acronis\SnapAPI\;C:\Program Files (x86)\IDM Computer Solutions\UltraEdit\USERNAME=MOJAOS=Windows_NTPROCESSOR_IDENTIFIER=Intel64 Family 6 Model 30 Stepping 5, GenuineIntel---------------  S Y S T E M  ---------------OS: Windows 7 , 64 bit Build 7601 Service Pack 1CPU:total 4 (4 cores per cpu, 1 threads per core) family 6 model 30 stepping 5, cmov, cx8, fxsr, mmx, sse, sse2, sse3, ssse3, sse4.1, sse4.2, popcnt, tsc, tscinvbitMemory: 4k page, physical 10476984k(3343964k free), swap 10475120k(2933984k free)vm_info: Java HotSpot(TM) 64-Bit Server VM (24.45-b08) for windows-amd64 JRE (1.7.0_45-b18), built on Oct  8 2013 05:47:22 by "java_re" with unknown MS VC++:1600
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.