Server IP : 180.180.241.3 / Your IP : 216.73.216.252 Web Server : Microsoft-IIS/7.5 System : Windows NT NETWORK-NHRC 6.1 build 7601 (Windows Server 2008 R2 Standard Edition Service Pack 1) i586 User : IUSR ( 0) PHP Version : 5.3.28 Disable Function : NONE MySQL : ON | cURL : ON | WGET : OFF | Perl : OFF | Python : OFF | Sudo : OFF | Pkexec : OFF Directory : /Windows/System32/ |
Upload File : |
MZ @ !L!This program cannot be run in DOS mode. $ 'OFʫOFʫOFʫF>_JFʫF>NLFʫF>YLFʫOF˫FʫF>XNFʫF>IlFʫF>^NFʫF>[NFʫRichOFʫ PE L *[J ! & ` @ $ @ 2 ,$ ( ( < hQ @ x .text % & `.data @ * @ .rsrc ( D @ @.reloc # $ @ B[J ntdll.dll ѻw5w ww`VwUww\wwZw@kw~kwBwUwUwUw`UwVwew Gw Tw@VwTw<hw Nw`Sw=www1wfww Qw)wuw[{wYwwdvw)/wwHw0w 1w@WwawB-wٯw2w]wwwL2w'w5w ww@w&w_w wwګwUw^wwGw@Dw@wwLwՋwwҮww~1w4w1wTwfvwpUwLwwJwwwRwwwIwXw\wPRw:wwwZw`Nw5[w ZwwIw Iw։w|wzwzww}w$ww+wwEewRwnwvwKwvwBwT~w`^w@^wPJwPQwpPw0KwRw ^w[wwhww [J % Q E * F a u l t I n j e c t i o n P r o b a b i l i t y F a u l t I n j e c t i o n T i m e O u t F a u l t I n j e c t i o n E x c l u d e D l l s F a u l t I n j e c t i o n I n c l u d e D l l s AVRF: fault injecting call made from %p AVRF:FINJ: invalid fault injection class %X multithreaded access in HEAP_NO_SERIALIZE heap Heap handle Last thread that used the heap Current thread using the heap Not used. heap handle with incorrect signature Page heap: pid 0x%X: page heap enabled with flags 0x%X. \ K e r n e l O b j e c t s \ H i g h C o m m i t C o n d i t i o n attempt to destroy process heap Process heap handle extreme size request Size requested Page heap: freeing a null pointer HeapRoot Address process heap list count is wrong Actual count Page heap count corrupted heap block exception raised while verifying block Exception code corrupted end stamp corrupted start stamp Corrupted stamp corrupted prefix pattern corrupted suffix pattern corrupted heap pointer or using wrong heap Heap used in the call Heap owning the block corrupted infix pattern for freed block corruption address block already freed corrupted header Heap block Block size Corruption Address heap block heap signature AVRF: EntryContents.Blink = %p, expected %p heap list entry AVRF: Reached the end of heap list without finding heap index %x. Total number of heaps %x list count list head AVRF: Spy [%s, %u]: %X VerifierRegisterLayer VerifierRegisterBasicsLayers VerifierUnregisterLayer VerifierUnregisterBasicsLayers AVRF: Terminate process after verifier stop failed with %X AVRF: Noncontinuable verifier stop %p encountered. Terminating process ... =========================================================== %s =========================================================== VERIFIER STOP %p: pid 0x%X: %s %p : %s %p : %s %p : %s %p : %s =========================================================== This verifier stop is not continuable. Process will be terminated when you use the `go' debugger command. This verifier stop is continuable. After debugging it use `go' to continue. %s AVRF: Failed to initialize logging and stop support AVRF: Invalid Stop code 0x%X passed to VerifierStopMessageEx AVRF: Invalid LayerDescriptor or BreakDecriptor passed for Stop code 0x%X AVRF:Failed to save message into stop list AVRF:bogus string length, overflow stop code StopProcessing a d v a p i 3 2 . d l l RegDeleteValueW RegSetValueExW RegQueryValueExW RegCloseKey RegCreateKeyExW S O F T W A R E \ M i c r o s o f t \ W i n d o w s N T \ C u r r e n t V e r s i o n \ I m a g e F i l e E x e c u t i o n O p t i o n s \ %x AVRF: settings: result %u G l o b a l F l a g 0 x % 0 8 X V e r i f i e r F l a g s L e a k { 8 1 E E C 8 D A - 0 E 6 1 - 4 9 4 2 - 8 0 3 7 - 9 A 6 C 4 A 8 6 5 1 0 D } I n p u t O u t p u t { 5 F E 3 2 3 7 2 - C E 7 1 - 4 3 f 9 - B 7 5 D - 6 A D 4 B 1 B 0 8 D 6 A } T h r e a d p o o l { F 1 5 F C 2 4 E - 5 3 A 0 - 4 4 4 D - 8 D 2 8 - F 7 6 9 7 E D D 9 C 8 3 } T i m e R o l l O v e r { d e 3 5 a 0 c 0 - d 3 b 8 - 1 1 d 9 - 8 c d 5 - 0 8 0 0 2 0 0 c 9 a 6 6 } D a n g e r o u s A P I s { 0 2 A 5 B 4 0 C - 2 F 2 2 - 4 4 0 9 - B B 3 7 - 7 E F 0 D 3 F 3 4 A 8 8 } M i s c e l l a n e o u s D i r t y S t a c k s { 9 7 0 b d 2 8 7 - 2 e 5 a - 4 a 0 6 - 9 0 8 4 - 9 e 3 9 4 d 4 c 2 6 9 7 } E x c e p t i o n s { F 8 6 B 0 2 2 F - E 5 8 9 - 4 e 8 f - B 0 D D - 6 B 7 A F 9 D 7 1 A 5 9 } M e m o r y { 8 A 7 0 B 8 A 4 - 4 F A 6 - 4 1 c 3 - 8 5 E E - 5 9 5 F C B 3 E 1 0 5 1 } T L S { E D D A 9 6 D B - D 2 1 6 - 4 6 7 d - B E 3 C - 8 6 0 3 7 4 5 E D A 4 3 } L o c k s { 1 5 9 D 6 0 E C - F 4 5 9 - 4 5 6 b - A 2 7 B - 1 0 7 6 A D 5 9 F 8 F 4 } B a s i c s H a n d l e s { 9 7 6 0 9 4 1 A - 8 D A 5 - 4 d b e - 8 4 3 B - 0 E B D 3 7 6 C A B 0 2 } T h r e a d P a g e H e a p C o m m i t M e m o r y P e r c e n t P a g e H e a p V i r t u a l M e m o r y P e r c e n t P a g e H e a p T a r g e t D l l s P a g e H e a p D l l R a n g e E n d P a g e H e a p D l l R a n g e S t a r t P a g e H e a p R a n d o m P r o b a b i l i t y P a g e H e a p S i z e R a n g e E n d P a g e H e a p S i z e R a n g e S t a r t AVRF: Exception during verifier.dll init for %ws with flags 0x%X. AVRF: verifier.dll provider initialized for %ws with flags 0x%X AVRF: Failed to initialize verifier.dll provider for %ws with flags 0x%X. AVRF: failed to define OANOCACHE variable (%X). 1 O A N O C A C H E AVRF: NtQuerySystemInformation (SystemBasicInformation) failed, status %#x AVRF: VerifierLoadEssentialStrings failed, status %#x AVRF: VerifierRegisterBasicsLayers failed. AVRF: failed to initialize FreeMemoryCallBacks (%X). AVRF: failed to initialize call trackers (%X). ' c'0d'NtResumeProcess NtSuspendProcess ntdll.dll = AVRF: failed to create verifier heap. AVRF: failed to initialize verifier stop logic (%X). AVRF: failed to allocated a verifier TLS slot. first chance access violation for current stack trace Invalid address being accessed Code performing invalid access Exception record. Use .exr to display it. Context record. Use .cxr to display it. AVRF: failed to add free memory callback @ %p AVRF: attempt to delete invalid free memory callback @ %p Unloading DLL inside current thread's stack address range DLL memory base address DLL memory range size DLL name address. Use du to dump it. Stack low limit address AVRF: Read just %Ix out of %Ix bytes of %s @ %p AVRF: Couldn't read %s @ %p RtlAcquireSRWLockShared RtlAcquireSRWLockExclusive RtlReleaseSRWLockShared RtlReleaseSRWLockExclusive RtlInitializeSRWLock n t d l l . d l l RtlFreeMemoryBlockLookaside RtlAllocateMemoryBlockLookaside RtlExtendMemoryBlockLookaside RtlCreateMemoryBlockLookaside AVRF: Exception %x from address %p RtlReportException k e r n e l b a s e . d l l o l e a u t 3 2 . d l l s e t u p a p i . d l l u s e r 3 2 . d l l o l e 3 2 . d l l m s v c r t . d l l k e r n e l 3 2 . d l l SetupDiOpenDevRegKey SetupDiCreateDevRegKeyW SetupDiCreateDevRegKeyA VariantClear SysFreeString SysAllocStringByteLen SysReAllocStringLen SysAllocStringLen SysReAllocString SysAllocString SetClipboardData UnregisterPowerSettingNotification RegisterPowerSettingNotification PostQuitMessage PostMessageA PostMessageW PostThreadMessageA PostThreadMessageW CoUninitialize CoInitializeEx CoInitialize _mbsdup _wcsdup _strdup ??_V@YAXPAX@Z ??_U@YAPAXI@Z ??3@YAXPAX@Z ??2@YAPAXI@Z free realloc calloc malloc RegNotifyChangeKeyValue RegOpenKeyExW RegOpenKeyExA RegOpenKeyW RegOpenKeyA RegCreateKeyExA RegCreateKeyW RegCreateKeyA SetProcessWorkingSetSize SetProcessWorkingSetSizeEx HeapFree HeapReAlloc HeapAlloc VirtualAlloc LocalFree GlobalFree SetThreadPriority SetThreadAffinityMask UnmapViewOfFile WideCharToMultiByte MultiByteToWideChar CreateEventW CreateEventA VirtualFreeEx VirtualFree ExitProcess IsBadStringPtrW IsBadStringPtrA IsBadCodePtr IsBadHugeWritePtr IsBadWritePtr IsBadHugeReadPtr IsBadReadPtr GetTickCount FreeLibraryAndExitThread CreateFileW CreateFileA LocalReAlloc LocalAlloc GlobalReAlloc GlobalAlloc WaitForMultipleObjectsEx WaitForSingleObjectEx WaitForMultipleObjects WaitForSingleObject CreateThread TlsSetValue TlsGetValue TlsFree TlsAlloc SuspendThread TerminateThread ExitThread CloseHandle HeapDestroy HeapCreate NtDuplicateObject NtNotifyChangeDirectoryFile RtlDestroyHeap RtlDeleteSecurityObject NtCancelIoFileEx NtCancelIoFile NtSetInformationFile RtlSetIoCompletionCallback RtlExitUserThread NtRemoveIoCompletionEx NtRemoveIoCompletion NtFsControlFile NtDeviceIoControlFile RtlSetTimer RtlCancelTimer RtlUpdateTimer RtlDeleteTimer RtlCreateTimer RtlDeleteTimerQueue RtlDeleteTimerQueueEx RtlCreateTimerQueue RtlDeregisterWait RtlDeregisterWaitEx RtlRegisterWait RtlCreateHeap RtlQueueWorkItem TpCallbackLeaveCriticalSectionOnCompletion TpSimpleTryPost TpAllocAlpcCompletion TpReleaseIoCompletion TpAllocIoCompletion TpAllocWait TpAllocTimer TpAllocWork RtlInitializeCriticalSectionEx LdrUnloadDll LdrLoadDll _snwprintf _snprintf _vsnwprintf _vsnprintf NtLockRegistryKey NtSetInformationKey NtUnloadKeyEx NtSetValueKey NtSaveMergedKeys NtSaveKeyEx NtSaveKey NtRestoreKey NtCompressKey NtCompactKeys NtRenameKey NtReplaceKey NtQueryMultipleValueKey NtQueryValueKey NtQueryKey NtNotifyChangeMultipleKeys NtNotifyChangeKey NtFlushKey NtEnumerateValueKey NtEnumerateKey NtDeleteValueKey NtDeleteKey NtFlushInstructionCache NtResetWriteWatch NtGetWriteWatch NtFreeUserPhysicalPages NtQuerySection NtProtectVirtualMemory NtUnlockVirtualMemory NtLockVirtualMemory NtFlushVirtualMemory NtWriteVirtualMemory NtReadVirtualMemory NtExtendSection NtAllocateUserPhysicalPages NtGetNextProcess NtTerminateProcess NtSetInformationProcess NtQueryInformationProcess NtGetNextThread NtTerminateThread NtSuspendThread NtSetInformationThread NtSetContextThread NtResumeThread NtQueueApcThread NtQueryInformationThread NtImpersonateThread NtGetContextThread NtAlertThread NtAlertResumeThread NtSetEventBoostPriority NtResetEvent NtQueryEvent NtPulseEvent NtClearEvent NtSetEvent RtlSetThreadPoolStartFunc NtWaitForMultipleObjects NtWaitForSingleObject NtWriteFileGather NtWriteFile NtReadFileScatter NtReadFile RtlFreeHeap RtlReAllocateHeap RtlAllocateHeap NtClose NtCreateEvent RtlConvertExclusiveToShared RtlConvertSharedToExclusive RtlReleaseResource RtlAcquireResourceExclusive RtlAcquireResourceShared RtlDeleteResource RtlInitializeResource RtlDeleteCriticalSection RtlInitializeCriticalSectionAndSpinCount RtlInitializeCriticalSection RtlLeaveCriticalSection RtlEnterCriticalSection RtlTryEnterCriticalSection LdrGetProcedureAddress NtOpenKey NtCreateKey NtOpenFile NtCreateFile NtOpenSection NtCreateSection NtUnmapViewOfSection NtMapViewOfSection NtFreeVirtualMemory NtAllocateVirtualMemory AVRF: internal error: we do not have a replacement for %s !!! AVRF: %ws Failed to close handle 0x%p with Status 0x%X AVRF: %ws Failed to close event 0x%p with Status 0x%X AVRF: conditional breakpoint %X hit. AVRF: %ws Failed to close event 0x%p with Status 0x%X in event completion callback AVRF: %ws Failed to register wait callback with Status 0x%X AVRF: %ws Failed to create event with Status 0x%X AVRF: %ws Failed to clear event 0x%p with Status 0x%X PeekMessageW RealGetWindowClassW EnumThreadWindows U N K N O W N %p (CS = %p, DebugInfo = %p), left %p, right %p, parent %p current thread doesn't own locks Number of critical sections owned by curent thread. critical section over-released or corrupted Number of critical sections owned by current thread. Critical section address Lock count Critical section debug info address ================================================ ================================================ Critical section tree root = %p AVrfpInsertCritSectInSplayTree( %p ) AVrfpFindCritSectInSplayTree( %p ) AVrfpDeleteCritSectFromSplayTree( %p ) AVRF: InitializeCriticalSection (%p) - out of memory - DebugInfo is not valid. AVRF: InitializeCriticalSection (%p) - no tree node. AVrfpInitializeCriticalSectionCommon (%p, %x, %x)) AVrfpRtlDeleteCriticalSection (%p) AVrfpRtlInitializeResource (%p), CS = %p AVrfpRtlDeleteResource (%p), CS = %p AVRF: checking CS @ %p (debug info @ %p) w u a u e n g . d l l w s c s v c . d l l w m s s e t u p . d l l w m i p c i m a . d l l W M A L F X G F X D S P . d l l W L D A P 3 2 . d l l w k s s v c . d l l w i n s p o o l . d r v W i n S c a r d . d l l W i n I n e t . d l l W i n d o w s C o d e c s . d l l w e v t s v c . d l l w e r c p l s u p p o r t . d l l w e b c l n t . d l l w b e m c o n s . d l l w a b 3 2 . d l l V S S A P I . D L L v d s b a s . d l l v a u l t s v c . d l l U r l m o n . d l l U N T F S . d l l t s c f g w m i . d l l t q u e r y . d l l t a s k s c h d . d l l t a s k c o m p . d l l s y s m a i n . d l l s r v s v c . d l l s q m a p i . d l l s p p . d l l S h i m E n g . d l l s h a c c t . d l l s c h e d s v c . d l l r a s t a p i . d l l r a s m a n s . d l l r a d a r d t . d l l q u e r y . d l l p w r s h s i p . d l l p r i n t u i . d l l p n i d u i . d l l P h o t o M e t a d a t a H a n d l e r . d l l P e r f t r a c k . d l l n t e v t . d l l n l a s v c . d l l n l a s h . d l l n l a a p i . d l l n e t s h e l l . d l l n e t p r o f m . d l l m s x m l 6 . d l l m s x m l 3 . d l l m s w m d m . d l l m s h t m l . d l l m s f e e d s . d l l m s c o r i e s . d l l m p s s v c . d l l m f c 4 2 u . d l l l o g g e r . o c x j s c r i p t . d l l i n e t p p . d l l i m a p i 2 . d l l i e s s e t u p . d l l i e f r a m e . d l l I E D K C S 3 2 . D L L h i d s e r v . d l l f x s s t . d l l f i r e w a l l a p i . d l l f i r e w a l l . c p l e s e n t . d l l e s . d l l e m d m g m t . d l l e h s s e t u p . d l l d i a g p e r f . d l l d h c p m o n i t o r . d l l d h c p c o r e 6 . d l l d h c p c o r e . d l l D H C P C M O N I T O R . D L L c i m w i n 3 2 . d l l c f g b k e n d . d l l b i t s i g d . d l l b c r y p t . d l l b c d s r v . d l l a u t h u i . d l l a u d i o s r v . d l l a d s l d p c . d l l AVRF: Overflow for BytesAllocated (%p) + Size(%p) Application verifier deadlock/resource issue AVRF: deadlock: stop: %p %p %p %p ** Type !avrf -dlck in the debugger for more information. ** ** Potential deadlock detected! ** ** ** **************************************************************************** Resource %p acquired before resource %p -- Current thread (%p) is trying to release it first Deadlock detection: Must release resources in reverse-order W I N H T T P . D L L U x T h e m e . d l l i u e n g i n e . d l l G D I 3 2 . D L L c a t s r v . d l l O D B C 3 2 . d l l r p c s s . d l l i a c 2 5 _ 3 2 . a x f r a m e d y n . d l l a s f s i p c . d l l n e t l o g o n . d l l N E T A P I 3 2 . D L L l o c a l s p l . d l l S P O O L S S . D L L m s w s o c k . d l l D N S A P I . D L L U S E R 3 2 . D L L S b s c r d l l . d l l l i c d l l . d l l d p c d l l . d l l l i c w m i . d l l M S W S O C K . D L L O E S p a m F i l t e r . d l l s p p s v c . e x e w i n l o g o n . e x e AVRF: TLS slot %x allocated by code at %p. AVRF: AVrfpLdrLoadDll (%p, %ws) AVRF: AVrfpLdrUnLoadDll (%p) AVRF: failed to get dll base of user32.dll. AVRF: dll entry @ %p (%ws, %x) AVRF: hooked dll entry point for dll %ws AVRF: low memory: will not verify entry point for %ws . n s i . d l l AVRF: %ws @ %p: entry point @ %p . AVRF: %ws: null entry point. AVRF: AVrfpLdrGetProcedureAddress (%p, %s) -> new address %p Unexpected exception raised while initializing output buffer. Buffer start address Buffer size AVRF: (%x, %x) AVrfpInitOutputBuffer filling Buffer 0x%p, size 0x%x AVrfpFreeVirtualMemNotify: NtQueryVirtualMemory( %p ) failed %x E v e n t O r P r o c e s s F i l e K e y S e c t i o n P r o c e s s T h r e a d E v e n t Q$ Q$ Q$ P$ P$ P$ P$ H 0F&Q$ RSDS'xEMOR$ verifier.pdb x l U(E EE } t} t Ex u MQU ELEM9 E UEBHM;UsEMU;EvMUEPMQUBPMQe E} } UELMUREPMQREP/ E} } MUD EMQU REH$QUR E} }T EMTUEPM(QUB,PMQÇ E} } UELMURE0PMQ4REP荇 E} } MUD EMQU@REHDQURW E} } EMTUEPM8QUB<PMQ! E} }VE<$UUEffMރEf} uU+UU؋E؍L MUUh<$8 MA8UELMUEB@MUQD3 Ex tMQR Ex tMQR Ex tMQ R Ex( tMQ(R Ex0 tMQ0R Ex@ tMQ@R Ex8 tMQ8R~ E] ̋UQ} t} t Ex u $ȅ UBE MLMU: Ex tMQR Ex tMQR Ex tMQ R Ex( tMQ(R Ex0 tMQ0R Ex8 tMQ8R Ex@ tMQ@R SE@ 3] ̋UE E }sA EMAUEEM;Ms;Ut1M;MsUtMMUUEE뽋M;Mv;URj T @0HQ$UE8 uMMUEMUEEM;MsfUt\MQUMR$E;Ev< MMU;UsEtUUEEMM뒋U3ɋUfЋE3ҋEfTMED ] ̋UE h'$E} }E j EP$M @'h'$h j h'设 ' h j h@'萾 h j h@'| h j h@'h ' h j h 'J h j h '6 h j h '" D'j j h h'jh$UR$B&E} h@&jh@'h h'WE EEM@&| tYjE @&Rh@&$u93 @&f3ҡ@&fP @&A @' @'j j h h@'jh$UR$B&E} |h@&jh'h h@'j j jhأ'jhx$EP$B&j j j@h 'jhD$MQ$B&3] ̋U E<