*----> Zusammenfassung/Übersicht <----*
Common Controls Library versuchte, von nicht vorhandenem
Speicher zu lesen. Möglicherweise wird eine nicht
initialisierte Variable verwendet, oder auf Speicher
zugegriffen, nachdem er freigegeben wurde.
Modul: COMCTL32.DLL
Beschreibung: Common Controls Library
Version: 5.80
Produkt: Microsoft(R) Windows (R) 2000 Operating System
Hersteller: Microsoft Corporation
Anwendung: Netscape.exe
Beschreibung: Netscape Navigator application file
Version: 4.70.0.26
Produkt: NETSCAPE
Hersteller: Netscape Communications Corporation
--------------------
<unbekannt> hat die Windows-Systemdateien geändert.
Modul: <unbekannt>
Benutzerkommentare:
*----> Systeminformationen <----*
Microsoft Windows 98 4.10.2222 A
Neuinstallation von Vollständige OEM-CD
/T:C:\WININST0.400 /SrcDir=F:\WIN98 /IZ /IS /IQ /IT /II /NR /II /C
/U:xxxxxxxxxxxxxxxxx
IE 5 5.00.2614.3500
Dauer: 0:00:08:35
Normaler Modus
Auf "PETRA" als "Petra Streck"
AuthenticAMD AMD-K6(tm) 3D processor
64 MB RAM
82% Systemressourcen frei
Von Windows verwaltete Auslagerungsdatei auf Laufwerk C (1540 MB
frei)
Temporäre Dateien auf Laufwerk C (1540 MB frei)
*----> Taskliste <----*
Programm
Typ
Pfad
------------
1. Kernel32.dll
4.10.2222
Microsoft Corporation
2. MSGSRV32.EXE
4.10.2222
Microsoft Corporation
3. Mprexe.exe
4.10.1998
Microsoft Corporation
4. MMTASK.TSK
4.03.1998
Microsoft Corporation
5. Explorer.exe
4.72.3110.1
Microsoft Corporation
6. Tapisrv.exe
4.10.2222
Microsoft Corporation
7. Icsmgr.exe
4.10.2222
Microsoft Corporation
8. Realplay.exe
6.0.3.210
RealNetworks, Inc.
9. Drwatson.exe
4.03
Microsoft Corporation
10. Ccui.exe
1.37.2077
RVS Datentechnik GmbH, München
11. Ccsrv.exe
1.37.2077
RVS Datentechnik GmbH, München
12. Netscape.exe
4.70.0.26
Netscape Communications Corporation
13. Rnaapp.exe
4.10.2222
Microsoft Corporation
14. Talkback.exe
1.0.130
Full Circle Software, Inc.
*----> Startup Items <----*
Name
Geladen von
Befehl
-------------------
1. DRWATSON
Startup Group
C:\WINDOWS\DRWATSON.EXE
2. ScanRegistry
Registrierung (computerabhängig)
C:\WINDOWS\scanregw.exe /autorun
3. ICSMGR
Registrierung (computerabhängig)
ICSMGR.EXE
4. RealTray
Registrierung (computerabhängig)
C:\Programme\Real\RealPlayer\RealPlay.exe SYSTEMBOOTHIDEPLAYER
*----> System Patches <----*
Systemmodul
Geändert von
Pfad
--------------------
1. USER
<unbekannt>
*----> Kernmodus-Treiber <----*
Treiber
Geladen von
Typ
Pfad
-------------------
1. VMM
Microsoft Corporation
Virtueller Geräte-Manager
2. VCACHE
Microsoft Corporation
Cache-Manager
3. DFS
4.10.2222
Microsoft Corporation
DFS Virtual Device (Version 4.0)
4. PERF
Microsoft Corporation
Treiber für Systemmonitor Datensammlung
5. VFIXD
1.00.02
Intel Corporation
Compatibility VxD
6. VPOWERD
4.10.2223
Microsoft Corporation
Virtuelles Gerät VPOWERD (Version 4.0)
7. VPICD
Microsoft Corporation
Hardware Interrupt-Manager
8. VrtwD
1.1.075.3
Intel Corporation
Real-Time Clock VxD
9. VTD
Microsoft Corporation
Treiber für Zeitgebergeräte
10. VWIN32
Microsoft Corporation
Win32-Treiber
11. VXDLDR
Microsoft Corporation
Dynamischer Gerätetreiberlader
12. NTKERN
Microsoft Corporation
Windows-Treibermodell
13. CONFIGMG
Microsoft Corporation
Konfigurations-Manager
14. PCI
4.10.2223
Microsoft Corporation
PCI Virtual Device (Version 4.0)
15. ISAPNP
4.10.1998
Microsoft Corporation
ISAPNP Virtual Device (Version 4.0)
16. BIOS
4.10.1998
Microsoft Corporation
BIOS Virtual Device (Version 4.0)
17. VCDFSD
Microsoft Corporation
CD-ROM-Dateisystemtreiber
18. IOS
Microsoft Corporation
E/A-Supervisor
19. PAGEFILE
Microsoft Corporation
Auslagerungsdateitreiber
20. PAGESWAP
Microsoft Corporation
Auslagerungsdatei-Manager
21. PARITY
Microsoft Corporation
Treiber für Speicherparität
22. REBOOT
Microsoft Corporation
Strg+Alt+Entf-Manager
23. EBIOS
Microsoft Corporation
Erweiterter BIOS-Treiber
24. VDD
Microsoft Corporation
Bildschirmtreiber
25. S3MINI
4.10.1695
Microsoft Corporation
S3 Virtual Device (Version 4.0)
26. VSD
Microsoft Corporation
Lautsprechertreiber
27. COMBUFF
Microsoft Corporation
Treiber für COM-Puffer
28. VCD
Microsoft Corporation
Treiber für COM-Anschluss
29. VMOUSE
Microsoft Corporation
Maustreiber
30. MSMINI
4.10.1998
Microsoft Corporation
MSMINI Virtual Device (Version 4.0)
31. VKD
Microsoft Corporation
Tastaturtreiber
32. VPD
Microsoft Corporation
Druckertreiber
33. INT13
Microsoft Corporation
BIOS-Festplattenemulationstreiber
34. VMCPD
Microsoft Corporation
Treiber für mathematischen Coprozessor
35. BIOSXLAT
Microsoft Corporation
BIOS-Emulationstreiber
36. VNETBIOS
4.10.1998
Microsoft Corporation
Virtuelles Gerät VNETBIOS (Version 4.0)
37. NDIS
4.10.2222
Microsoft Corporation
Virtuelles Gerät NDIS (Version 4.0)
38. ICSHAREP
4.10.2222
Microsoft Corporation
Windows Internet Sharing Driver
39. PPPMAC
4.10.2222
Microsoft Corporation
Virtueller Windows PPP-Treiber
40. NDISWAN
4.10.1998
Microsoft Corporation
Windows Virtual WAN Protocol Driver
41. VTDI
4.10.1998
Microsoft Corporation
Windows TDI Support Driver
42. WSOCK2
4.10.1998
Microsoft Corporation
Windows Sockets Driver 2 TCP/IP only.
43. VIP
4.10.2222
Microsoft Corporation
Windows IP-Treiber
44. MSTCP
4.10.2222
Microsoft Corporation
Windows TCP Driver
45. VDHCP
4.10.2161
Microsoft Corporation
DHCP VxD-Treiber
46. VNBT
4.10.2148
Microsoft Corporation
VNBT VxD Driver
47. AFVXD
4.10.2222
Microsoft Corporation
Windows Sockets VTDI Driver
48. DOSMGR
Microsoft Corporation
Manager für MS-DOS-Emulation
49. VMPOLL
Microsoft Corporation
Treiber für Systemleerlauf
50. JAVASUP
5.00.3167
Microsoft Corporation
Microsoft® Virtual Machine Helper Device for Java
51. VCOMM
Microsoft Corporation
Plug & Play-Treiber für COM-Anschluß
52. VCOND
Microsoft Corporation
Treiber für Konsolensystem
53. VTDAPI
Microsoft Corporation
Treiber für Multimediazeitgeber
54. VFLATD
Microsoft Corporation
Linearer Aperture-Videotreiber
55. mmdevldr
4.10.1998
Microsoft Corporation
mmdevldr Virtual Device (Version 4.0)
56. Display1
57. APIX
4.00.952
Microsoft Corporation
APIX Virtual Device (Version 4.0)
58. CDTSD
4.10.1998
Microsoft Corporation
CDTSD Virtual Device (Version 4.0)
59. CDVSD
4.10.2222
Microsoft Corporation
CDVSD Virtual Device (Version 4.0)
60. DiskTSD
4.10.2222
Microsoft Corporation
DiskTSD Virtual Device (Version 4.0)
61. voltrack
4.10.1998
Microsoft Corporation
Virtuelles Gerät Voltrack (Version 4.0)
62. NEROCD95
4, 0, 0, 2
ahead software gmbh
im stoeckmaedle 6
76307 karlsbad, germany
Fax: ++49-7248-911-888
e-mail: in...@ahead.de
Nero CD driver for Windows 95/98
63. BIGMEM
4.10.1998
Microsoft Corporation
BIGMEM Virtual Device (Version 4.0)
64. SPAP
4.10.2222
Microsoft Corporation
SPAP Virtual Device (Version 4.0)
65. HSFLOP
4.10.2222
Microsoft Corporation
HSFLOP Virtual Device (Version 4.0)
66. ESDI_506
4.10.2222
Microsoft Corporation
ESDI_506 Virtual Device (Version 4.0)
67. SERENUM
4.10.2222
Microsoft Corporation
SERENUM Virtual Device (Version 4.0)
68. LPTENUM
4.10.1998
Microsoft Corporation
LPTENUM Virtual Device (Version 4.0)
69. VSB16
70. DSOUND
4.07.00.0700
Microsoft Corporation
Microsoft DirectSound
71. vjoyd
4.07.00.0716
Microsoft Corporation
Joystick Virtual Device
72. WSHTCP
4.10.1998
Microsoft Corporation
Windows Sockets TCP helper Driver
73. DRVWCDB
3.10.36a
Seagate Software, Inc.
Device Driver
74. DRVWPPQT
3.10.36a
Seagate Software, Inc.
Device Driver
75. DRVWQ117
3.10.36a
Seagate Software, Inc.
Device Driver
76. VDMAD
Microsoft Corporation
Treiber für DMA-Controller
77. V86MMGR
Microsoft Corporation
MS-DOS Speicher-Manager
78. SPOOLER
Microsoft Corporation
Druckerwarteschlange
79. UDF
Microsoft Corporation
?
80. VFAT
Microsoft Corporation
FAT-Dateisystemtreiber
81. VDEF
Microsoft Corporation
Standarddateisystemtreiber
82. CDFS
4.10.1998
Microsoft Corporation
CDFS Virtual Device (Version 4.0)
83. IFSMGR
Microsoft Corporation
Dateisystem-Manager
84. VNETSUP
4.10.1998
Microsoft Corporation
VNETSUP Virtual Device (Version 4.0)
85. VREDIR
4.10.2222
Microsoft Corporation
Virtuelles Gerät VREDIR (Version 4.0)
86. VSERVER
4.10.2222
Microsoft Corporation
Virtuelles Gerät VSERVER (Version 4.0)
87. VFBACKUP
Microsoft Corporation
Treiber für Diskettensicherungen
88. SHELL
Microsoft Corporation
Shell-Gerätetreiber
89. VRVSPORT
90. VRVSCAPI
91. VRVSHELP
92. ICSHARE
4.10.2222
Microsoft Corporation
Windows Internet Connection Sharing Driver
93. VKERNEL
94. VLAYER1
95. VDSS1
96. VBPROT
97. VCAPI
98. DRWATSON
4.03
Microsoft Corporation
Dr. Watson for Windows 98
99. ne2000
5.00.1510.1
Microsoft Corporation
Novell NE2000 network driver
100. AXNW
101. usbhub
102. WMILIB
103. WMIDRV
104. uhcd
105. USBD
106. PCIMP
107. hidvkd
108. swenum
109. ks
110. update
111. wdmfs
*----> Benutzermodus-Treiber <----*
Treiber
Typ
Pfad
------------
1. mmsystem.dll
4.03.1998
Microsoft Corporation
2. power.drv
4.10.1998
Microsoft Corporation
3. sbfm.drv
4.00
Creative Technology Ltd.
4. sb16snd.drv
4.37.00.1998
Creative Technology Ltd.
5. msacm.drv
4.03.1998
Microsoft Corporation
6. midimap.drv
4.03.1998
Microsoft Corporation
7. msjstick.drv
4.05.01.1998
Microsoft Corporation
*----> MS-DOS-Treiber <----*
Name
Typ
-----------
1. DISPLAY
Gerätetreiber
2. HIMEM
Gerätetreiber
3. DBLBUFF
Gerätetreiber
4. IFSHLP
Gerätetreiber
5. KEYB
TSR-Programm
*----> 32-Bit-Module <----*
Name
Datum
Adresse
Pfad
---------------
1. MLANG.DLL
5.00.2614.3500
Microsoft Corporation
Multi Language Support DLL
2. RNR20.DLL
4.10.2222
Microsoft Corporation
Windows Socket2 NameSpace DLL
3. RASAPI32.DLL
4.10.2222
Microsoft Corporation
DFÜ-Netzwerk-DLL
4. SECUR32.DLL
4.10.2222
Microsoft Corporation
Microsoft Win32 Security Services
5. MSVCRT20.DLL
2.11.000
Microsoft Corporation
Microsoft® C Runtime Library
6. SVRAPI.DLL
4.10.1998
Microsoft Corporation
32-bit common Server API library
7. MSNET32.DLL
4.10.1998
Microsoft Corporation
Microsoft 32-Bit Netzwerk-API-Bibliothek
8. MSPWL32.DLL
4.10.1998
Microsoft Corporation
Password list management library
9. TAPI32.DLL
4.10.2222
Microsoft Corporation
Microsoft® Windows(R) Telephony API Client DLL
10. NETAPI32.DLL
4.10.1998
Microsoft Corporation
32-bit network API DLL
11. NETBIOS.DLL
12. MPR.DLL
4.10.1998
Microsoft Corporation
WIN32-DLL für die Netzwerkschnittstelle
13. SHFOLDER.DLL
5.00.2614.3500
Microsoft Corporation
Shell Folder Service
14. MSAFD.DLL
4.10.1998
Microsoft Corporation
Microsoft Windows Sockets 2.0 Dienstanbieter
15. UNI3200.DLL
4.70.0.27
Netscape Communications Corporation
Netscape Navigator Unicode Table File
16. FULLSOFT.DLL
1.0.131
Full Circle Software, Inc.
Talkback Library
17. RESDLL.DLL
4.70.0.26
Netscape Communications Corporation
Netscape Navigator application file
18. WINSPOOL.DRV
4.10.1998
Microsoft Corporation
Win32 WINSPOOL core component
19. NETSCAPE.EXE
4.70.0.26
Netscape Communications Corporation
Netscape Navigator application file
20. JSD3240.DLL
4.70.0.27
Netscape Communications Corporation
Netscape 32-bit JavaScript Debugger Module
21. OLEAUT32.DLL
2.40.4275
Microsoft Corporation
Microsoft OLE 2.40 for Windows NT(TM) and Windows 95(TM) Operating
Systems
22. OLE32.DLL
4.71.2900
Microsoft Corporation
Microsoft OLE for Windows and Windows NT
23. COMDLG32.DLL
4.72.3510.2300
Microsoft Corporation
Common Dialogs DLL
24. RPCRT4.DLL
4.71.2900
Microsoft Corporation
Remote Procedure Call DLL
25. VERSION.DLL
4.10.1998
Microsoft Corporation
Win32 VERSION core component
26. JPEG3240.DLL
27. JUL3240.DLL
28. NSFMT30.DLL
3, 0, 0, 0
Netscape
Netscape nls library
29. NSUNI30.DLL
3, 0, 0, 0
Netscape
Netscape nls library
30. UNICVT32.DLL
31. XPPREF32.DLL
4.70.0.27
Netscape Communications Corp.
prefdll
32. SHELL32.DLL
4.72.3612.1700
Microsoft Corporation
Allgemeine Windows-Shell-DLL
33. COMCTL32.DLL
5.80
Microsoft Corporation
Common Controls Library
34. LDAP3230.DLL
1.0 Build 9993
Netscape Communications Corporation
Lightweight Directory Access Protocol DLL
35. NSCNV30.DLL
2, 0, 0, 0
Netscape
Netscape nls library
36. LIBREG32.DLL
37. JS3240.DLL
4.70.0.27
Netscape Communications Corporation
Netscape 32-bit JavaScript Module
38. JRT3240.DLL
4.70.0.27
Netscape Communications Corporation
Netscape Java Interpreter
39. WINMM.DLL
4.03.1998
Microsoft Corporation
System APIs for Multimedia
40. PR3240.DLL
4.70.0.27
Netscape Communications Corporation
Netscape 32-bit Portable Runtime
41. WSOCK32.DLL
4.10.1998
Microsoft Corporation
BSD Socket API für Windows
42. MSWSOCK.DLL
4.10.2222
Microsoft Corporation
Microsoft WinSock Extension APIs
43. WS2_32.DLL
4.10.2222
Microsoft Corporation
Windows Socket 2.0 32-Bit DLL
44. WININET.DLL
5.00.2614.3500
Microsoft Corporation
Interneterweiterungen für Win32
45. SHLWAPI.DLL
5.00.2614.3500
Microsoft Corporation
Shell Light-weight Utility Library
46. WS2HELP.DLL
4.10.1998
Microsoft Corporation
Windows Socket 2.0 Helper for Windows 98
47. MFC42.DLL
6.00.8447.0
Microsoft Corporation
MFCDLL Shared Library - Retail Version
48. MFC42LOC.DLL
4.21.7303
Microsoft Corporation
MFC Language Specific Resources
49. USER32.DLL
4.10.2222
Microsoft Corporation
Win32 USER32 core component
50. GDI32.DLL
4.10.1998
Microsoft Corporation
Win32 GDI core component
51. ADVAPI32.DLL
4.80.1675
Microsoft Corporation
Win32 ADVAPI32 core component
52. MSVCRT.DLL
6.00.8397.0
Microsoft Corporation
Microsoft (R) C Runtime Library
53. KERNEL32.DLL
4.10.2222
Microsoft Corporation
Kernkomponente des Win32-Kernel
*----> 16-Bit-Module <----*
Name
Typ
Pfad
------------
1. KERNEL
4.10.1998
Microsoft Corporation
2. SYSTEM
4.10.1998
Microsoft Corporation
3. KEYBOARD
4.10.2222
Microsoft Corporation
4. MOUSE
9.01.0.000
Microsoft Corporation
5. DISPLAY
4.10.1681
Microsoft Corporation
6. DIBENG
4.10.1998
Microsoft Corporation
7. SOUND
4.10.1998
Microsoft Corporation
8. COMM
4.10.1998
Microsoft Corporation
9. GDI
4.10.2222
Microsoft Corporation
10. USER
4.10.2222
Microsoft Corporation
11. DDEML
4.10.1998
Microsoft Corporation
12. MSPLUS
4.40.500
Microsoft Corporation
13. MSGSRV32
4.10.2222
Microsoft Corporation
14. MMSYSTEM
4.03.1998
Microsoft Corporation
15. POWER
4.10.1998
Microsoft Corporation
16. LZEXPAND
4.00.429
Microsoft Corporation
17. VER
4.10.1998
Microsoft Corporation
18. SHELL
4.10.1998
Microsoft Corporation
19. COMMCTRL
4.10.1998
Microsoft Corporation
20. RVSPRTHK
21. SBFM
4.00
Creative Technology Ltd.
22. SB16SND
4.37.00.1998
Creative Technology Ltd.
23. CSPMAN
4.12.1
Creative Technology Ltd.
24. MSACMMAP
4.03.1998
Microsoft Corporation
25. MSACM
4.03.1998
Microsoft Corporation
26. MMTASK
4.03.1998
Microsoft Corporation
27. MIDIMAP
4.03.1998
Microsoft Corporation
28. MSJSTICK
4.05.01.1998
Microsoft Corporation
29. COMMDLG
4.00.950
Microsoft Corporation
30. SYSTHUNK
4.10.1998
Microsoft Corporation
31. OLECLI
1.20.000
Microsoft Corporation
32. OLESVR
1.10.000
Microsoft Corporation
33. TOOLHELP
4.10.1998
Microsoft Corporation
34. PIFMGR
4.10.2222
Microsoft Corporation
35. DCIMAN
4.03.1998
Intel(R) Corp., Microsoft Corp.
36. MSVIDEO
4.03.1998
Microsoft Corporation
37. RVSFAX95
38. UNIDRV
4.10.1998
Microsoft Corporation
39. TSP3216S
4.10.2222
Microsoft Corporation
40. UNIMDM
4.10.2222
Microsoft Corporation
41. UMDM16
4.10.1998
Microsoft Corporation
42. WAN
4.10.2222
Microsoft Corporation
43. NDSWAN16
4.10.2222
Microsoft Corporation
*----> Details <----*
Command line: C:\PROGRAMME\NETSCAPE\COMMUNICATOR\PROGRAM\NETSCAPE.EXE
Trap 0e 0000 - Invalid page fault
eax=008ff7dc ebx=00000000 ecx=c15c05e0 edx=0001dce4 esi=00927378
edi=00000407
eip=bfe919dc esp=00b4faf4 ebp=00b4fc08 -- -- -- nv up EI NG nz na PE
nc
cs=0167 ss=016f ds=016f es=016f fs=0d9f gs=0000
COMCTL32.DLL:.text+0x9dc:
>0167:bfe919dc dfab0000eb3a fild qword ptr [ebx+3aeb0000]
sel type base lim/bot
---- ---- -------- --------
cs 0167 r-x- 00000000 ffffffff
ss 016f rw-e 00000000 0000f7a0
ds 016f rw-e 00000000 0000f7a0
es 016f rw-e 00000000 0000f7a0
fs 0d9f rw-- 81620a2c 00000037
gs 0000 ----
stack base: 00a50000
TIB limits: 00b4a000 - 00b50000
-- exception record --
Exception Code: c0000005 (access violation)
Exception Address: bfe919dc (COMCTL32.DLL:.text+0x9dc)
Exception Info: 00000000
3aeb0000
COMCTL32.DLL:.text+0x9dc:
>0167:bfe919dc dfab0000eb3a fild qword ptr [ebx+3aeb0000]
0167:bfe919d7 04ff add al,ff
0167:bfe919d9 3056e8 xor byte ptr [esi-18],dl
COMCTL32.DLL:.text+0x9dc:
*0167:bfe919dc dfab0000eb3a fild qword ptr [ebx+3aeb0000]
0167:bfe919e2 8b4514 mov eax,dword ptr [ebp+14]
0167:bfe919e5 ff7004 push dword ptr [eax+04]
0167:bfe919e8 ff30 push dword ptr [eax]
0167:bfe919ea ff15b014e9bf call dword ptr [bfe914b0] ->
USER32.DLL!WindowFromPoint
0167:bfe919f0 eb2c jmp bfe91a1e =
COMCTL32.DLL:.text+0xa1e
0167:bfe919f2 395d14 cmp dword ptr [ebp+14],ebx
0167:bfe919f5 7425 jz bfe91a1c =
COMCTL32.DLL:.text+0xa1c
0167:bfe919f7 ff7614 push dword ptr [esi+14]
0167:bfe919fa 8d45cc lea eax,[ebp-34]
0167:bfe919fd 6a01 push +01
--------------------
-- stack summary --
016f:00b4fc08 0167:bfe919dc COMCTL32.DLL:.text+0x9dc
(00000490,00000407,00000000,008ff7dc,
00cfa830,00b4fc40,5f401b16,00000407)
016f:00b4fc24 0167:5f401f01 MFC42.DLL:.text+0xf01
(00000407,00000000,008ff7dc,00000407,
00000000,00b4fc54,0071e094,00000407)
016f:00b4fc40 0167:5f401b16 MFC42.DLL:.text+0xb16
(00000407,00000000,008ff7dc,00b4fcb4,
5f401a88,00000407,00000000,008ff7dc)
016f:00b4fc54 0167:0071e094 NETSCAPE.EXE:.text+0x31d094
(00000407,00000000,008ff7dc,008ff7dc,
00cfa770,008ff7dc,00000000,00000000)
016f:00b4fcb4 0167:5f401a88 MFC42.DLL:.text+0xa88
(00000000,00000490,00000407,00000000,
008ff7dc,00b4fcfc,5f4019cf,00000490)
016f:00b4fcd0 0167:5f401a10 MFC42.DLL:.text+0xa10
(00000490,00000407,00000000,008ff7dc,
00000000,00a20170,00b4fe28,5f492cef)
016f:00b4fcfc 0167:5f4019cf MFC42.DLL:.text+0x9cf
(00000490,00000407,00000000,008ff7dc,
0000048c,008ff7dc,5f4014ce,008ff7dc)
016f:00b4fd18 0167:0071773a NETSCAPE.EXE:.text+0x31673a
(008ff7dc,008ff7dc,00cc07b0,5f40147a,
0000039c,008ff7dc,00000001,008ff7a8)
-- stack trace --
016f:00b4fc08 0167:bfe919dc COMCTL32.DLL:.text+0x9dc
(00000490,00000407,00000000,008ff7dc,
00cfa830,00b4fc40,5f401b16,00000407)
0167:bfe919d7 04ff add al,ff
0167:bfe919d9 3056e8 xor byte ptr [esi-18],dl
COMCTL32.DLL:.text+0x9dc:
*0167:bfe919dc dfab0000eb3a fild qword ptr [ebx+3aeb0000]
0167:bfe919e2 8b4514 mov eax,dword ptr [ebp+14]
0167:bfe919e5 ff7004 push dword ptr [eax+04]
0167:bfe919e8 ff30 push dword ptr [eax]
0167:bfe919ea ff15b014e9bf call dword ptr [bfe914b0] ->
USER32.DLL!WindowFromPoint
0167:bfe919f0 eb2c jmp bfe91a1e =
COMCTL32.DLL:.text+0xa1e
0167:bfe919f2 395d14 cmp dword ptr [ebp+14],ebx
0167:bfe919f5 7425 jz bfe91a1c =
COMCTL32.DLL:.text+0xa1c
0167:bfe919f7 ff7614 push dword ptr [esi+14]
0167:bfe919fa 8d45cc lea eax,[ebp-34]
0167:bfe919fd 6a01 push +01
--------------------
016f:00b4fc24 0167:5f401f01 MFC42.DLL:.text+0xf01
(00000407,00000000,008ff7dc,00000407,
00000000,00b4fc54,0071e094,00000407)
0167:5f401ee1 8bf1 mov esi,ecx
0167:5f401ee3 8b462c mov eax,dword ptr [esi+2c]
0167:5f401ee6 85c0 test eax,eax
0167:5f401ee8 0f848aa30500 jz 5f45c278 =
MFC42.DLL:.text+0x5b278
0167:5f401eee ff7510 push dword ptr [ebp+10]
0167:5f401ef1 ff750c push dword ptr [ebp+0c]
0167:5f401ef4 ff7508 push dword ptr [ebp+08]
0167:5f401ef7 ff7620 push dword ptr [esi+20]
0167:5f401efa 50 push eax
0167:5f401efb ff1560b5495f call dword ptr [5f49b560] ->
USER32.DLL!CallWindowProcA
MFC42.DLL:.text+0xf01:
*0167:5f401f01 5e pop esi
0167:5f401f02 5d pop ebp
0167:5f401f03 c20c00 retd 000c
0167:5f401f06 56 push esi
0167:5f401f07 8bf1 mov esi,ecx
0167:5f401f09 68effa405f push 5f40faef
0167:5f401f0e b900004d5f mov ecx,5f4d0000
0167:5f401f13 e8e8f0ffff call 5f401000 = MFC42.DLL!3030
0167:5f401f18 ff7040 push dword ptr [eax+40]
0167:5f401f1b 8b16 mov edx,dword ptr [esi]
0167:5f401f1d 8bce mov ecx,esi
--------------------
016f:00b4fc40 0167:5f401b16 MFC42.DLL:.text+0xb16
(00000407,00000000,008ff7dc,00b4fcb4,
5f401a88,00000407,00000000,008ff7dc)
0167:5f401af6 ff7508 push dword ptr [ebp+08]
0167:5f401af9 ff90a4000000 call dword ptr [eax+000000a4]
0167:5f401aff 85c0 test eax,eax
0167:5f401b01 7516 jnz 5f401b19 = MFC42.DLL:.text+0xb19
0167:5f401b03 ff7510 push dword ptr [ebp+10]
0167:5f401b06 8b06 mov eax,dword ptr [esi]
0167:5f401b08 8bce mov ecx,esi
0167:5f401b0a ff750c push dword ptr [ebp+0c]
0167:5f401b0d ff7508 push dword ptr [ebp+08]
0167:5f401b10 ff90a8000000 call dword ptr [eax+000000a8]
MFC42.DLL:.text+0xb16:
*0167:5f401b16 8945fc mov dword ptr [ebp-04],eax
0167:5f401b19 8b45fc mov eax,dword ptr [ebp-04]
0167:5f401b1c 5e pop esi
0167:5f401b1d c9 leave
0167:5f401b1e c20c00 retd 000c
0167:5f401b21 b8fb2d495f mov eax,5f492dfb
0167:5f401b26 e852f5ffff call 5f40107d = MSVCRT.DLL!_EH_prolog
0167:5f401b2b 83ec58 sub esp,+58
0167:5f401b2e 8365f000 and dword ptr [ebp-10],+00
0167:5f401b32 53 push ebx
0167:5f401b33 8b5d08 mov ebx,dword ptr [ebp+08]
--------------------
016f:00b4fc54 0167:0071e094 NETSCAPE.EXE:.text+0x31d094
(00000407,00000000,008ff7dc,008ff7dc,
00cfa770,008ff7dc,00000000,00000000)
0167:0071e06a ff249598e07100 jmp dword ptr [edx*4+0071e098]
0167:0071e071 8b4510 mov eax,dword ptr [ebp+10]
0167:0071e074 c70028000000 mov dword ptr [eax],00000028
0167:0071e07a eb0a jmp 0071e086 =
NETSCAPE.EXE:.text+0x31d086
0167:0071e07c 8b4510 mov eax,dword ptr [ebp+10]
0167:0071e07f c7400c28000000 mov dword ptr [eax+0c],00000028
0167:0071e086 ff7510 push dword ptr [ebp+10]
0167:0071e089 ff750c push dword ptr [ebp+0c]
0167:0071e08c ff7508 push dword ptr [ebp+08]
0167:0071e08f e8c6a20000 call 0072835a = MFC42.DLL!6374
NETSCAPE.EXE:.text+0x31d094:
*0167:0071e094 5d pop ebp
0167:0071e095 c20c00 retd 000c
0167:0071e098 71e0 jno 0071e07a =
NETSCAPE.EXE:.text+0x31d07a
0167:0071e09a 7100 jno 0071e09c =
NETSCAPE.EXE:.text+0x31d09c
0167:0071e09c 71e0 jno 0071e07e =
NETSCAPE.EXE:.text+0x31d07e
0167:0071e09e 7100 jno 0071e0a0 =
NETSCAPE.EXE:.text+0x31d0a0
0167:0071e0a0 7ce0 jl 0071e082 =
NETSCAPE.EXE:.text+0x31d082
0167:0071e0a2 7100 jno 0071e0a4 =
NETSCAPE.EXE:.text+0x31d0a4
0167:0071e0a4 71e0 jno 0071e086 =
NETSCAPE.EXE:.text+0x31d086
0167:0071e0a6 7100 jno 0071e0a8 =
NETSCAPE.EXE:.text+0x31d0a8
0167:0071e0a8 71e0 jno 0071e08a =
NETSCAPE.EXE:.text+0x31d08a
--------------------
016f:00b4fcb4 0167:5f401a88 MFC42.DLL:.text+0xa88
(00000000,00000490,00000407,00000000,
008ff7dc,00b4fcfc,5f4019cf,00000490)
0167:5f401a69 7447 jz 5f401ab2 = MFC42.DLL:.text+0xab2
0167:5f401a6b 83650800 and dword ptr [ebp+08],+00
0167:5f401a6f 81fe10010000 cmp esi,00000110
0167:5f401a75 7447 jz 5f401abe = MFC42.DLL:.text+0xabe
0167:5f401a77 ff7518 push dword ptr [ebp+18]
0167:5f401a7a 8b07 mov eax,dword ptr [edi]
0167:5f401a7c 8bcf mov ecx,edi
0167:5f401a7e ff7514 push dword ptr [ebp+14]
0167:5f401a81 56 push esi
0167:5f401a82 ff90a0000000 call dword ptr [eax+000000a0]
MFC42.DLL:.text+0xa88:
*0167:5f401a88 81fe10010000 cmp esi,00000110
0167:5f401a8e 894518 mov dword ptr [ebp+18],eax
0167:5f401a91 743b jz 5f401ace = MFC42.DLL:.text+0xace
0167:5f401a93 6a07 push +07
0167:5f401a95 8b4518 mov eax,dword ptr [ebp+18]
0167:5f401a98 8d7b34 lea edi,[ebx+34]
0167:5f401a9b 59 pop ecx
0167:5f401a9c 8d75c0 lea esi,[ebp-40]
0167:5f401a9f f3a5 rep movs dword ptr es:[edi],dword ptr
ds:[esi]
0167:5f401aa1 8b4df4 mov ecx,dword ptr [ebp-0c]
0167:5f401aa4 5f pop edi
--------------------
016f:00b4fcd0 0167:5f401a10 MFC42.DLL:.text+0xa10
(00000490,00000407,00000000,008ff7dc,
00000000,00a20170,00b4fe28,5f492cef)
0167:5f4019e9 817d0c60030000 cmp dword ptr [ebp+0c],00000360
0167:5f4019f0 0f84c9a50500 jz 5f45bfbf =
MFC42.DLL:.text+0x5afbf
0167:5f4019f6 ff7508 push dword ptr [ebp+08]
0167:5f4019f9 e8d5f8ffff call 5f4012d3 = MFC42.DLL!2867
0167:5f4019fe ff7514 push dword ptr [ebp+14]
0167:5f401a01 ff7510 push dword ptr [ebp+10]
0167:5f401a04 ff750c push dword ptr [ebp+0c]
0167:5f401a07 ff7508 push dword ptr [ebp+08]
0167:5f401a0a 50 push eax
0167:5f401a0b e804000000 call 5f401a14 = MFC42.DLL!1109
MFC42.DLL:.text+0xa10:
*0167:5f401a10 5d pop ebp
0167:5f401a11 c21000 retd 0010
0167:5f401a14 b8732d495f mov eax,5f492d73
0167:5f401a19 e85ff6ffff call 5f40107d = MSVCRT.DLL!_EH_prolog
0167:5f401a1e 83ec34 sub esp,+34
0167:5f401a21 53 push ebx
0167:5f401a22 56 push esi
0167:5f401a23 57 push edi
0167:5f401a24 b900004d5f mov ecx,5f4d0000
0167:5f401a29 8965f0 mov dword ptr [ebp-10],esp
0167:5f401a2c 68effa405f push 5f40faef
--------------------
016f:00b4fcfc 0167:5f4019cf MFC42.DLL:.text+0x9cf
(00000490,00000407,00000000,008ff7dc,
0000048c,008ff7dc,5f4014ce,008ff7dc)
0167:5f4019ac e8faf6ffff call 5f4010ab = MFC42.DLL!3028
0167:5f4019b1 50 push eax
0167:5f4019b2 8d4dec lea ecx,[ebp-14]
0167:5f4019b5 e8b5ffffff call 5f40196f = MFC42.DLL!6467
0167:5f4019ba ff7514 push dword ptr [ebp+14]
0167:5f4019bd 8365fc00 and dword ptr [ebp-04],+00
0167:5f4019c1 ff7510 push dword ptr [ebp+10]
0167:5f4019c4 ff750c push dword ptr [ebp+0c]
0167:5f4019c7 ff7508 push dword ptr [ebp+08]
0167:5f4019ca e817000000 call 5f4019e6 = MFC42.DLL!1578
MFC42.DLL:.text+0x9cf:
*0167:5f4019cf 8b4df0 mov ecx,dword ptr [ebp-10]
0167:5f4019d2 8b55ec mov edx,dword ptr [ebp-14]
0167:5f4019d5 895104 mov dword ptr [ecx+04],edx
0167:5f4019d8 8b4df4 mov ecx,dword ptr [ebp-0c]
0167:5f4019db 64890d00000000 mov dword ptr fs:[00000000],ecx
0167:5f4019e2 c9 leave
0167:5f4019e3 c21000 retd 0010
0167:5f4019e6 55 push ebp
0167:5f4019e7 8bec mov ebp,esp
0167:5f4019e9 817d0c60030000 cmp dword ptr [ebp+0c],00000360
0167:5f4019f0 0f84c9a50500 jz 5f45bfbf =
MFC42.DLL:.text+0x5afbf
--------------------
016f:00b4fd18 0167:0071773a NETSCAPE.EXE:.text+0x31673a
(008ff7dc,008ff7dc,00cc07b0,5f40147a,
0000039c,008ff7dc,00000001,008ff7a8)
0167:00717716 8b4004 mov eax,dword ptr [eax+04]
0167:00717719 3d00020000 cmp eax,00000200
0167:0071771e 721a jc 0071773a =
NETSCAPE.EXE:.text+0x31673a
0167:00717720 3d09020000 cmp eax,00000209
0167:00717725 7713 ja 0071773a =
NETSCAPE.EXE:.text+0x31673a
0167:00717727 ff7508 push dword ptr [ebp+08]
0167:0071772a 6a00 push +00
0167:0071772c 6807040000 push 00000407
0167:00717731 ff7120 push dword ptr [ecx+20]
0167:00717734 ff1540859000 call dword ptr [00908540] ->
USER32.DLL!SendMessageA
NETSCAPE.EXE:.text+0x31673a:
*0167:0071773a ff7508 push dword ptr [ebp+08]
0167:0071773d 8bce mov ecx,esi
0167:0071773f e8420d0100 call 00728486 = MFC42.DLL!5279
0167:00717744 5e pop esi
0167:00717745 5d pop ebp
0167:00717746 c20400 retd 0004
0167:00717749 55 push ebp
0167:0071774a 8bec mov ebp,esp
0167:0071774c 83ec20 sub esp,+20
0167:0071774f 53 push ebx
0167:00717750 56 push esi
--------------------
-- stack dump --
00b4faf4 00000200
00b4faf8 00000000
00b4fafc 0007001e
00b4fb00 00cfa830 -> 00 9b 80 00 01 00 00 00 00 00 00 00 00 00 00 00
................
...
00b4fb08 00a20170 -> 34 df 49 5f 78 00 92 00 00 00 00 00 b8 80 b9 00
4.I_x...........
00b4fb0c 000004b0
00b4fb10 02000001
00b4fb14 8b4e0d97
00b4fb18 0000016f
00b4fb1c 00b4fb30 -> b8 19 f7 bf 6e 8b 8f 00 28 fe b4 00 6d 18 f7 bf
....n...(...m...
00b4fb20 bff71826 = KERNEL32.DLL:_FREQASM+0x826
--------------------
0167:bff717ff 6664c7051e000000ffff mov word ptr fs:[0000001e],ffff
0167:bff71809 c3 retd
0167:bff7180a 52 push edx
0167:bff7180b 50 push eax
0167:bff7180c a1e89cfcbf mov eax,dword ptr [bffc9ce8]
0167:bff71811 8b00 mov eax,dword ptr [eax]
0167:bff71813 39059894fcbf cmp dword ptr [bffc9498],eax
0167:bff71819 7413 jz bff7182e =
KERNEL32.DLL:_FREQASM+0x82e
0167:bff7181b 8b157094fcbf mov edx,dword ptr [bffc9470]
0167:bff71821 e891290000 call bff741b7 =
KERNEL32.DLL:_FREQASM+0x31b7
KERNEL32.DLL:_FREQASM+0x826:
*0167:bff71826 6664ff051e000000 inc word ptr fs:[0000001e]
0167:bff7182e 58 pop eax
0167:bff7182f 5a pop edx
0167:bff71830 c3 retd
0167:bff71831 ff7316 push dword ptr [ebx+16]
0167:bff71834 ff731a push dword ptr [ebx+1a]
0167:bff71837 ff731e push dword ptr [ebx+1e]
0167:bff7183a ff7322 push dword ptr [ebx+22]
0167:bff7183d 8b157094fcbf mov edx,dword ptr [bffc9470]
0167:bff71843 e8b3290000 call bff741fb =
KERNEL32.DLL:_FREQASM+0x31fb
0167:bff71848 6664c7051e000000ffff mov word ptr fs:[0000001e],ffff
--------------------
00b4fb24 00000000
...
00b4fb2c bff9440c = KERNEL32.DLL:.text+0x1b40c
--------------------
0167:bff943e8 c1c210 rol edx,10
0167:bff943eb e9c8f7ffff jmp bff93bb8 =
KERNEL32.DLL:.text+0x1abb8
0167:bff943f0 0fbf4316 movsx eax,word ptr [ebx+16]
0167:bff943f4 50 push eax
0167:bff943f5 668b4318 mov ax,word ptr [ebx+18]
0167:bff943f9 50 push eax
0167:bff943fa ff731a push dword ptr [ebx+1a]
0167:bff943fd e8e3d3fdff call bff717e5 =
KERNEL32.DLL!K32Thk1632Prolog
0167:bff94402 e8f6f1fdff call bff735fd =
KERNEL32.DLL:_FREQASM+0x25fd
0167:bff94407 e8fed3fdff call bff7180a =
KERNEL32.DLL!K32Thk1632Epilog
KERNEL32.DLL:.text+0x1b40c:
*0167:bff9440c 8bd0 mov edx,eax
0167:bff9440e c1c210 rol edx,10
0167:bff94411 e9aaf7ffff jmp bff93bc0 =
KERNEL32.DLL:.text+0x1abc0
0167:bff94416 0fbf4316 movsx eax,word ptr [ebx+16]
0167:bff9441a 50 push eax
0167:bff9441b ff7318 push dword ptr [ebx+18]
0167:bff9441e e8c2d3fdff call bff717e5 =
KERNEL32.DLL!K32Thk1632Prolog
0167:bff94423 e8e6f0fdff call bff7350e =
KERNEL32.DLL:_FREQASM+0x250e
0167:bff94428 e8ddd3fdff call bff7180a =
KERNEL32.DLL!K32Thk1632Epilog
0167:bff9442d e986f7ffff jmp bff93bb8 =
KERNEL32.DLL:.text+0x1abb8
0167:bff94432 33c0 xor eax,eax
--------------------
00b4fb30 bff719b8 = KERNEL32.DLL:_FREQASM+0x9b8
--------------------
0167:bff71991 51 push ecx
0167:bff71992 c1cf10 ror edi,10
0167:bff71995 6664873d0e000000 xchg word ptr fs:[0000000e],di
0167:bff7199d 57 push edi
0167:bff7199e 686d18f7bf push bff7186d
0167:bff719a3 64ff3500000000 push dword ptr fs:[00000000]
0167:bff719aa 64892500000000 mov dword ptr fs:[00000000],esp
0167:bff719b1 55 push ebp
0167:bff719b2 8d6c24fc lea ebp,[esp-04]
0167:bff719b6 ffd2 call edx
KERNEL32.DLL:_FREQASM+0x9b8:
*0167:bff719b8 5d pop ebp
0167:bff719b9 0fb6c9 movzx ecx,cl
0167:bff719bc 648f0500000000 pop dword ptr fs:[00000000]
0167:bff719c3 8d642404 lea esp,[esp+04]
0167:bff719c7 5f pop edi
0167:bff719c8 6664893d0e000000 mov word ptr fs:[0000000e],di
0167:bff719d0 5b pop ebx
0167:bff719d1 660fb22424 lss sp,dword ptr [esp]
0167:bff719d6 6664891d1e000000 mov word ptr fs:[0000001e],bx
0167:bff719de 5b pop ebx
0167:bff719df 0bdb or ebx,ebx
--------------------
00b4fb34 008f8b6e = NETSCAPE.EXE:.data+0x7ab6e
-> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
................
00b4fb38 00b4fe28 -> 68 ff b4 00 fe ec 7c 00 88 e6 80 00 00 00 00 00
h.....|.........
00b4fb3c bff7186d = KERNEL32.DLL:_FREQASM+0x86d
--------------------
0167:bff7183d 8b157094fcbf mov edx,dword ptr [bffc9470]
0167:bff71843 e8b3290000 call bff741fb =
KERNEL32.DLL:_FREQASM+0x31fb
0167:bff71848 6664c7051e000000ffff mov word ptr fs:[0000001e],ffff
0167:bff71852 ff5326 call dword ptr [ebx+26]
0167:bff71855 8b157094fcbf mov edx,dword ptr [bffc9470]
0167:bff7185b e857290000 call bff741b7 =
KERNEL32.DLL:_FREQASM+0x31b7
0167:bff71860 6664ff051e000000 inc word ptr fs:[0000001e]
0167:bff71868 b114 mov cl,14
0167:bff7186a 8be5 mov esp,ebp
0167:bff7186c c3 retd
KERNEL32.DLL:_FREQASM+0x86d:
*0167:bff7186d 8b442404 mov eax,dword ptr [esp+04]
0167:bff71871 f7400406000000 test dword ptr [eax+04],00000006
0167:bff71878 7419 jz bff71893 =
KERNEL32.DLL:_FREQASM+0x893
0167:bff7187a 8b442408 mov eax,dword ptr [esp+08]
0167:bff7187e 8178046d18f7bf cmp dword ptr [eax+04],bff7186d
0167:bff71885 750c jnz bff71893 =
KERNEL32.DLL:_FREQASM+0x893
0167:bff71887 668b4808 mov cx,word ptr [eax+08]
0167:bff7188b 6664890d0e000000 mov word ptr fs:[0000000e],cx
0167:bff71893 b801000000 mov eax,00000001
0167:bff71898 c3 retd
0167:bff71899 9d popfd
--------------------
00b4fb40 8b4e0d97
00b4fb44 00000000
00b4fb48 263f8b4e
00b4fb4c 00000084
00b4fb50 02460000 -> 08 00 56 02 63 8e fb ff ff ff ff ff 00 00 00 00
..V.c...........
00b4fb54 8bac0000
00b4fb58 3caa0002
00b4fb5c 16870002
00b4fb60 27370000
00b4fb64 00000157
00b4fb68 2737263f
00b4fb6c 8bb20157
00b4fb70 16a73d76
00b4fb74 00000004
00b4fb78 00000000
00b4fb7c 5f401996 = MFC42.DLL!1579
--------------------
0167:5f401977 b900004d5f mov ecx,5f4d0000
0167:5f40197c e87ff6ffff call 5f401000 = MFC42.DLL!3030
0167:5f401981 894604 mov dword ptr [esi+04],eax
0167:5f401984 8b4804 mov ecx,dword ptr [eax+04]
0167:5f401987 890e mov dword ptr [esi],ecx
0167:5f401989 8b4c2408 mov ecx,dword ptr [esp+08]
0167:5f40198d 894804 mov dword ptr [eax+04],ecx
0167:5f401990 8bc6 mov eax,esi
0167:5f401992 5e pop esi
0167:5f401993 c20400 retd 0004
MFC42.DLL!1579:
*0167:5f401996 b8ef2c495f mov eax,5f492cef
0167:5f40199b e8ddf6ffff call 5f40107d = MSVCRT.DLL!_EH_prolog
0167:5f4019a0 51 push ecx
0167:5f4019a1 51 push ecx
0167:5f4019a2 68c598405f push 5f4098c5
0167:5f4019a7 b93c004d5f mov ecx,5f4d003c
0167:5f4019ac e8faf6ffff call 5f4010ab = MFC42.DLL!3028
0167:5f4019b1 50 push eax
0167:5f4019b2 8d4dec lea ecx,[ebp-14]
0167:5f4019b5 e8b5ffffff call 5f40196f = MFC42.DLL!6467
0167:5f4019ba ff7514 push dword ptr [ebp+14]
--------------------
00b4fb80 02000001
00b4fb84 000004b0
00b4fb88 bff7b9ae = KERNEL32.DLL:.text+0x29ae
--------------------
0167:bff7b992 803e04 cmp byte ptr [esi],04
0167:bff7b995 740f jz bff7b9a6 =
KERNEL32.DLL:.text+0x29a6
0167:bff7b997 33c0 xor eax,eax
0167:bff7b999 50 push eax
0167:bff7b99a 50 push eax
0167:bff7b99b 50 push eax
0167:bff7b99c 68050000c0 push c0000005
0167:bff7b9a1 e82daeffff call bff767d3 =
KERNEL32.DLL:_FREQASM+0x57d3
0167:bff7b9a6 ff7604 push dword ptr [esi+04]
0167:bff7b9a9 e81389ffff call bff742c1 =
KERNEL32.DLL:_FREQASM+0x32c1
KERNEL32.DLL:.text+0x29ae:
*0167:bff7b9ae 5e pop esi
0167:bff7b9af c20400 retd 0004
0167:bff7b9b2 56 push esi
0167:bff7b9b3 8b742408 mov esi,dword ptr [esp+08]
0167:bff7b9b7 8a06 mov al,byte ptr [esi]
0167:bff7b9b9 3c04 cmp al,04
0167:bff7b9bb 7508 jnz bff7b9c5 =
KERNEL32.DLL:.text+0x29c5
0167:bff7b9bd ff7604 push dword ptr [esi+04]
0167:bff7b9c0 e82989ffff call bff742ee =
KERNEL32.DLL:_FREQASM+0x32ee
0167:bff7b9c5 5e pop esi
0167:bff7b9c6 c20400 retd 0004
--------------------
00b4fb8c 81649020 -> 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
................
00b4fb90 5f4d014c = MFC42.DLL:.data+0x14c
-> 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
................
00b4fb94 bff7b9c5 = KERNEL32.DLL:.text+0x29c5
--------------------
0167:bff7b9a9 e81389ffff call bff742c1 =
KERNEL32.DLL:_FREQASM+0x32c1
0167:bff7b9ae 5e pop esi
0167:bff7b9af c20400 retd 0004
0167:bff7b9b2 56 push esi
0167:bff7b9b3 8b742408 mov esi,dword ptr [esp+08]
0167:bff7b9b7 8a06 mov al,byte ptr [esi]
0167:bff7b9b9 3c04 cmp al,04
0167:bff7b9bb 7508 jnz bff7b9c5 =
KERNEL32.DLL:.text+0x29c5
0167:bff7b9bd ff7604 push dword ptr [esi+04]
0167:bff7b9c0 e82989ffff call bff742ee =
KERNEL32.DLL:_FREQASM+0x32ee
KERNEL32.DLL:.text+0x29c5:
*0167:bff7b9c5 5e pop esi
0167:bff7b9c6 c20400 retd 0004
0167:bff7b9c9 64a100000000 mov eax,dword ptr fs:[00000000]
0167:bff7b9cf 55 push ebp
0167:bff7b9d0 8bec mov ebp,esp
0167:bff7b9d2 6aff push -01
0167:bff7b9d4 685092f7bf push bff79250
0167:bff7b9d9 68b405fcbf push bffc05b4
0167:bff7b9de 50 push eax
0167:bff7b9df 8b4508 mov eax,dword ptr [ebp+08]
0167:bff7b9e2 64892500000000 mov dword ptr fs:[00000000],esp
--------------------
00b4fb98 81649020 -> 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
................
00b4fb9c 008ff7dc = NETSCAPE.EXE:.data+0x817dc
-> b0 04 00 00 00 02 00 00 00 00 00 00 1e 00 07 00
................
00b4fba0 5f4017dd = MFC42.DLL:.text+0x7dd
--------------------
0167:5f4017b6 ff15fcb1495f call dword ptr [5f49b1fc] ->
KERNEL32.DLL!LeaveCriticalSection
0167:5f4017bc 5d pop ebp
0167:5f4017bd ebc2 jmp 5f401781 = MFC42.DLL:.text+0x781
0167:5f4017bf 833d58004d5f00 cmp dword ptr [5f4d0058],+00
0167:5f4017c6 7515 jnz 5f4017dd = MFC42.DLL:.text+0x7dd
0167:5f4017c8 8b442404 mov eax,dword ptr [esp+04]
0167:5f4017cc 8d0440 lea eax,[eax+eax*2]
0167:5f4017cf 8d04c578014d5f lea eax,[eax*8+5f4d0178]
0167:5f4017d6 50 push eax
0167:5f4017d7 ff15fcb1495f call dword ptr [5f49b1fc] ->
KERNEL32.DLL!LeaveCriticalSection
MFC42.DLL:.text+0x7dd:
*0167:5f4017dd c20400 retd 0004
0167:5f4017e0 56 push esi
0167:5f4017e1 57 push edi
0167:5f4017e2 8b7c240c mov edi,dword ptr [esp+0c]
0167:5f4017e6 8bf1 mov esi,ecx
0167:5f4017e8 85ff test edi,edi
0167:5f4017ea 741b jz 5f401807 = MFC42.DLL:.text+0x807
0167:5f4017ec 53 push ebx
0167:5f4017ed 8d5e10 lea ebx,[esi+10]
0167:5f4017f0 53 push ebx
0167:5f4017f1 ff1500b2495f call dword ptr [5f49b200] ->
KERNEL32.DLL!EnterCriticalSection
--------------------
00b4fba4 5f4d0220 = MFC42.DLL:.data+0x220
-> 04 00 00 00 20 90 64 81 00 00 00 00 00 00 00 00 ....
.d.........
00b4fba8 5f401bb8 = MFC42.DLL:.text+0xbb8
--------------------
0167:5f401b8b 3b0c8548034d5f cmp ecx,dword ptr [eax*4+5f4d0348]
0167:5f401b92 8d1c8548034d5f lea ebx,[eax*4+5f4d0348]
0167:5f401b99 8b45ec mov eax,dword ptr [ebp-14]
0167:5f401b9c 0f85cf000000 jnz 5f401c71 = MFC42.DLL:.text+0xc71
0167:5f401ba2 3b4308 cmp eax,dword ptr [ebx+08]
0167:5f401ba5 0f85c6000000 jnz 5f401c71 = MFC42.DLL:.text+0xc71
0167:5f401bab 8b5b04 mov ebx,dword ptr [ebx+04]
0167:5f401bae 6a07 push +07
0167:5f401bb0 895d10 mov dword ptr [ebp+10],ebx
0167:5f401bb3 e807fcffff call 5f4017bf = MFC42.DLL!1569
MFC42.DLL:.text+0xbb8:
*0167:5f401bb8 85db test ebx,ebx
0167:5f401bba 0f8580000000 jnz 5f401c40 = MFC42.DLL:.text+0xc40
0167:5f401bc0 33c0 xor eax,eax
0167:5f401bc2 8b4df4 mov ecx,dword ptr [ebp-0c]
0167:5f401bc5 5f pop edi
0167:5f401bc6 5e pop esi
0167:5f401bc7 5b pop ebx
0167:5f401bc8 64890d00000000 mov dword ptr fs:[00000000],ecx
0167:5f401bcf c9 leave
0167:5f401bd0 c21000 retd 0010
0167:5f401bd3 ff7510 push dword ptr [ebp+10]
--------------------
00b4fbac 00000007
00b4fbb0 00cfa830 -> 00 9b 80 00 01 00 00 00 00 00 00 00 00 00 00 00
................
...
00b4fbb8 00a20170 -> 34 df 49 5f 78 00 92 00 00 00 00 00 b8 80 b9 00
4.I_x...........
00b4fbbc 177f9e9d
00b4fbc0 00010000
00b4fbc4 04b00200
00b4fbc8 04b00020
00b4fbcc 00020200
00b4fbd0 00020000
00b4fbd4 772f1687
00b4fbd8 0000177f
00b4fbdc 02000001
00b4fbe0 0002881c
00b4fbe4 177f7738
00b4fbe8 00000000
00b4fbec 59340000
00b4fbf0 29528c82
00b4fbf4 0001177f
00b4fbf8 d3220000
00b4fbfc 001e0007
00b4fc00 00000007
00b4fc04 04b00200
00b4fc08 00b4fc24 -> 40 fc b4 00 16 1b 40 5f 07 04 00 00 00 00 00 00
@.....@_........
00b4fc0c 5f401f01 = MFC42.DLL:.text+0xf01
--------------------
0167:5f401ee1 8bf1 mov esi,ecx
0167:5f401ee3 8b462c mov eax,dword ptr [esi+2c]
0167:5f401ee6 85c0 test eax,eax
0167:5f401ee8 0f848aa30500 jz 5f45c278 =
MFC42.DLL:.text+0x5b278
0167:5f401eee ff7510 push dword ptr [ebp+10]
0167:5f401ef1 ff750c push dword ptr [ebp+0c]
0167:5f401ef4 ff7508 push dword ptr [ebp+08]
0167:5f401ef7 ff7620 push dword ptr [esi+20]
0167:5f401efa 50 push eax
0167:5f401efb ff1560b5495f call dword ptr [5f49b560] ->
USER32.DLL!CallWindowProcA
MFC42.DLL:.text+0xf01:
*0167:5f401f01 5e pop esi
0167:5f401f02 5d pop ebp
0167:5f401f03 c20c00 retd 000c
0167:5f401f06 56 push esi
0167:5f401f07 8bf1 mov esi,ecx
0167:5f401f09 68effa405f push 5f40faef
0167:5f401f0e b900004d5f mov ecx,5f4d0000
0167:5f401f13 e8e8f0ffff call 5f401000 = MFC42.DLL!3030
0167:5f401f18 ff7040 push dword ptr [eax+40]
0167:5f401f1b 8b16 mov edx,dword ptr [esi]
0167:5f401f1d 8bce mov ecx,esi
--------------------
00b4fc10 00000490
00b4fc14 00000407
00b4fc18 00000000
00b4fc1c 008ff7dc = NETSCAPE.EXE:.data+0x817dc
-> b0 04 00 00 00 02 00 00 00 00 00 00 1e 00 07 00
................
00b4fc20 00cfa830 -> 00 9b 80 00 01 00 00 00 00 00 00 00 00 00 00 00
................
00b4fc24 00b4fc40 -> 54 fc b4 00 94 e0 71 00 07 04 00 00 00 00 00 00
T.....q.........
00b4fc28 5f401b16 = MFC42.DLL:.text+0xb16
--------------------
0167:5f401af6 ff7508 push dword ptr [ebp+08]
0167:5f401af9 ff90a4000000 call dword ptr [eax+000000a4]
0167:5f401aff 85c0 test eax,eax
0167:5f401b01 7516 jnz 5f401b19 = MFC42.DLL:.text+0xb19
0167:5f401b03 ff7510 push dword ptr [ebp+10]
0167:5f401b06 8b06 mov eax,dword ptr [esi]
0167:5f401b08 8bce mov ecx,esi
0167:5f401b0a ff750c push dword ptr [ebp+0c]
0167:5f401b0d ff7508 push dword ptr [ebp+08]
0167:5f401b10 ff90a8000000 call dword ptr [eax+000000a8]
MFC42.DLL:.text+0xb16:
*0167:5f401b16 8945fc mov dword ptr [ebp-04],eax
0167:5f401b19 8b45fc mov eax,dword ptr [ebp-04]
0167:5f401b1c 5e pop esi
0167:5f401b1d c9 leave
0167:5f401b1e c20c00 retd 000c
0167:5f401b21 b8fb2d495f mov eax,5f492dfb
0167:5f401b26 e852f5ffff call 5f40107d = MSVCRT.DLL!_EH_prolog
0167:5f401b2b 83ec58 sub esp,+58
0167:5f401b2e 8365f000 and dword ptr [ebp-10],+00
0167:5f401b32 53 push ebx
0167:5f401b33 8b5d08 mov ebx,dword ptr [ebp+08]
--------------------
00b4fc2c 00000407
00b4fc30 00000000
00b4fc34 008ff7dc = NETSCAPE.EXE:.data+0x817dc
-> b0 04 00 00 00 02 00 00 00 00 00 00 1e 00 07 00
................
00b4fc38 00000407
00b4fc3c 00000000
00b4fc40 00b4fc54 -> b4 fc b4 00 88 1a 40 5f 07 04 00 00 00 00 00 00
......@_........
00b4fc44 0071e094 = NETSCAPE.EXE:.text+0x31d094
--------------------
0167:0071e06a ff249598e07100 jmp dword ptr [edx*4+0071e098]
0167:0071e071 8b4510 mov eax,dword ptr [ebp+10]
0167:0071e074 c70028000000 mov dword ptr [eax],00000028
0167:0071e07a eb0a jmp 0071e086 =
NETSCAPE.EXE:.text+0x31d086
0167:0071e07c 8b4510 mov eax,dword ptr [ebp+10]
0167:0071e07f c7400c28000000 mov dword ptr [eax+0c],00000028
0167:0071e086 ff7510 push dword ptr [ebp+10]
0167:0071e089 ff750c push dword ptr [ebp+0c]
0167:0071e08c ff7508 push dword ptr [ebp+08]
0167:0071e08f e8c6a20000 call 0072835a = MFC42.DLL!6374
NETSCAPE.EXE:.text+0x31d094:
*0167:0071e094 5d pop ebp
0167:0071e095 c20c00 retd 000c
0167:0071e098 71e0 jno 0071e07a =
NETSCAPE.EXE:.text+0x31d07a
0167:0071e09a 7100 jno 0071e09c =
NETSCAPE.EXE:.text+0x31d09c
0167:0071e09c 71e0 jno 0071e07e =
NETSCAPE.EXE:.text+0x31d07e
0167:0071e09e 7100 jno 0071e0a0 =
NETSCAPE.EXE:.text+0x31d0a0
0167:0071e0a0 7ce0 jl 0071e082 =
NETSCAPE.EXE:.text+0x31d082
0167:0071e0a2 7100 jno 0071e0a4 =
NETSCAPE.EXE:.text+0x31d0a4
0167:0071e0a4 71e0 jno 0071e086 =
NETSCAPE.EXE:.text+0x31d086
0167:0071e0a6 7100 jno 0071e0a8 =
NETSCAPE.EXE:.text+0x31d0a8
0167:0071e0a8 71e0 jno 0071e08a =
NETSCAPE.EXE:.text+0x31d08a
--------------------
00b4fc48 00000407
00b4fc4c 00000000
00b4fc50 008ff7dc = NETSCAPE.EXE:.data+0x817dc
-> b0 04 00 00 00 02 00 00 00 00 00 00 1e 00 07 00
................
00b4fc54 00b4fcb4 -> d0 fc b4 00 10 1a 40 5f 00 00 00 00 90 04 00 00
......@_........
00b4fc58 5f401a88 = MFC42.DLL:.text+0xa88
--------------------
0167:5f401a69 7447 jz 5f401ab2 = MFC42.DLL:.text+0xab2
0167:5f401a6b 83650800 and dword ptr [ebp+08],+00
0167:5f401a6f 81fe10010000 cmp esi,00000110
0167:5f401a75 7447 jz 5f401abe = MFC42.DLL:.text+0xabe
0167:5f401a77 ff7518 push dword ptr [ebp+18]
0167:5f401a7a 8b07 mov eax,dword ptr [edi]
0167:5f401a7c 8bcf mov ecx,edi
0167:5f401a7e ff7514 push dword ptr [ebp+14]
0167:5f401a81 56 push esi
0167:5f401a82 ff90a0000000 call dword ptr [eax+000000a0]
MFC42.DLL:.text+0xa88:
*0167:5f401a88 81fe10010000 cmp esi,00000110
0167:5f401a8e 894518 mov dword ptr [ebp+18],eax
0167:5f401a91 743b jz 5f401ace = MFC42.DLL:.text+0xace
0167:5f401a93 6a07 push +07
0167:5f401a95 8b4518 mov eax,dword ptr [ebp+18]
0167:5f401a98 8d7b34 lea edi,[ebx+34]
0167:5f401a9b 59 pop ecx
0167:5f401a9c 8d75c0 lea esi,[ebp-40]
0167:5f401a9f f3a5 rep movs dword ptr es:[edi],dword ptr
ds:[esi]
0167:5f401aa1 8b4df4 mov ecx,dword ptr [ebp-0c]
0167:5f401aa4 5f pop edi
--------------------
00b4fc5c 00000407
00b4fc60 00000000
00b4fc64 008ff7dc = NETSCAPE.EXE:.data+0x817dc
-> b0 04 00 00 00 02 00 00 00 00 00 00 1e 00 07 00
................
...
00b4fc6c 00cfa770 -> 10 88 80 00 01 00 00 00 00 00 00 00 00 00 00 00
................
00b4fc70 008ff7dc = NETSCAPE.EXE:.data+0x817dc
-> b0 04 00 00 00 02 00 00 00 00 00 00 1e 00 07 00
................
00b4fc74 00000000
...
00b4fc90 5f401018 = MFC42.DLL:.text+0x18
--------------------
0167:5f401000 56 push esi
0167:5f401001 57 push edi
0167:5f401002 8bf9 mov edi,ecx
0167:5f401004 833f00 cmp dword ptr [edi],+00
0167:5f401007 7429 jz 5f401032 = MFC42.DLL:.text+0x32
0167:5f401009 a104004d5f mov eax,dword ptr [5f4d0004]
0167:5f40100e 8b37 mov esi,dword ptr [edi]
0167:5f401010 ff30 push dword ptr [eax]
0167:5f401012 ff150cb2495f call dword ptr [5f49b20c] ->
KERNEL32.DLL!TlsGetValue
MFC42.DLL:.text+0x18:
*0167:5f401018 85c0 test eax,eax
0167:5f40101a 7447 jz 5f401063 = MFC42.DLL:.text+0x63
0167:5f40101c 3b7008 cmp esi,dword ptr [eax+08]
0167:5f40101f 7d42 jge 5f401063 = MFC42.DLL:.text+0x63
0167:5f401021 8b400c mov eax,dword ptr [eax+0c]
0167:5f401024 8b34b0 mov esi,dword ptr [eax+esi*4]
0167:5f401027 85f6 test esi,esi
0167:5f401029 743c jz 5f401067 = MFC42.DLL:.text+0x67
0167:5f40102b 8bc6 mov eax,esi
0167:5f40102d 5f pop edi
0167:5f40102e 5e pop esi
--------------------
00b4fc94 00000002
00b4fc98 008ff7dc = NETSCAPE.EXE:.data+0x817dc
-> b0 04 00 00 00 02 00 00 00 00 00 00 1e 00 07 00
................
00b4fc9c 00cfa770 -> 10 88 80 00 01 00 00 00 00 00 00 00 00 00 00 00
................
00b4fca0 00a20170 -> 34 df 49 5f 78 00 92 00 00 00 00 00 b8 80 b9 00
4.I_x...........
00b4fca4 00b4fc68 -> dc f7 8f 00 70 a7 cf 00 dc f7 8f 00 00 00 00 00
....p...........
00b4fca8 00b4fcf0 -> 28 fe b4 00 ef 2c 49 5f 00 00 00 00 18 fd b4 00
(....,I_........
00b4fcac 5f492d73 = MFC42.DLL:.text+0x91d73
-> b8 08 4f 4b 5f e9 3e f8 ff ff ff 75 08 e8 fc 0a
..OK_.>....u....
00b4fcb0 00000000
00b4fcb4 00b4fcd0 -> fc fc b4 00 cf 19 40 5f 90 04 00 00 07 04 00 00
......@_........
00b4fcb8 5f401a10 = MFC42.DLL:.text+0xa10
--------------------
0167:5f4019e9 817d0c60030000 cmp dword ptr [ebp+0c],00000360
0167:5f4019f0 0f84c9a50500 jz 5f45bfbf =
MFC42.DLL:.text+0x5afbf
0167:5f4019f6 ff7508 push dword ptr [ebp+08]
0167:5f4019f9 e8d5f8ffff call 5f4012d3 = MFC42.DLL!2867
0167:5f4019fe ff7514 push dword ptr [ebp+14]
0167:5f401a01 ff7510 push dword ptr [ebp+10]
0167:5f401a04 ff750c push dword ptr [ebp+0c]
0167:5f401a07 ff7508 push dword ptr [ebp+08]
0167:5f401a0a 50 push eax
0167:5f401a0b e804000000 call 5f401a14 = MFC42.DLL!1109
MFC42.DLL:.text+0xa10:
*0167:5f401a10 5d pop ebp
0167:5f401a11 c21000 retd 0010
0167:5f401a14 b8732d495f mov eax,5f492d73
0167:5f401a19 e85ff6ffff call 5f40107d = MSVCRT.DLL!_EH_prolog
0167:5f401a1e 83ec34 sub esp,+34
0167:5f401a21 53 push ebx
0167:5f401a22 56 push esi
0167:5f401a23 57 push edi
0167:5f401a24 b900004d5f mov ecx,5f4d0000
0167:5f401a29 8965f0 mov dword ptr [ebp-10],esp
0167:5f401a2c 68effa405f push 5f40faef
--------------------
00b4fcbc 00000000
00b4fcc0 00000490
00b4fcc4 00000407
00b4fcc8 00000000
00b4fccc 008ff7dc = NETSCAPE.EXE:.data+0x817dc
-> b0 04 00 00 00 02 00 00 00 00 00 00 1e 00 07 00
................
00b4fcd0 00b4fcfc -> 18 fd b4 00 3a 77 71 00 90 04 00 00 07 04 00 00
....:wq.........
00b4fcd4 5f4019cf = MFC42.DLL:.text+0x9cf
--------------------
0167:5f4019ac e8faf6ffff call 5f4010ab = MFC42.DLL!3028
0167:5f4019b1 50 push eax
0167:5f4019b2 8d4dec lea ecx,[ebp-14]
0167:5f4019b5 e8b5ffffff call 5f40196f = MFC42.DLL!6467
0167:5f4019ba ff7514 push dword ptr [ebp+14]
0167:5f4019bd 8365fc00 and dword ptr [ebp-04],+00
0167:5f4019c1 ff7510 push dword ptr [ebp+10]
0167:5f4019c4 ff750c push dword ptr [ebp+0c]
0167:5f4019c7 ff7508 push dword ptr [ebp+08]
0167:5f4019ca e817000000 call 5f4019e6 = MFC42.DLL!1578
MFC42.DLL:.text+0x9cf:
*0167:5f4019cf 8b4df0 mov ecx,dword ptr [ebp-10]
0167:5f4019d2 8b55ec mov edx,dword ptr [ebp-14]
0167:5f4019d5 895104 mov dword ptr [ecx+04],edx
0167:5f4019d8 8b4df4 mov ecx,dword ptr [ebp-0c]
0167:5f4019db 64890d00000000 mov dword ptr fs:[00000000],ecx
0167:5f4019e2 c9 leave
0167:5f4019e3 c21000 retd 0010
0167:5f4019e6 55 push ebp
0167:5f4019e7 8bec mov ebp,esp
0167:5f4019e9 817d0c60030000 cmp dword ptr [ebp+0c],00000360
0167:5f4019f0 0f84c9a50500 jz 5f45bfbf =
MFC42.DLL:.text+0x5afbf
--------------------
00b4fcd8 00000490
00b4fcdc 00000407
00b4fce0 00000000
00b4fce4 008ff7dc = NETSCAPE.EXE:.data+0x817dc
-> b0 04 00 00 00 02 00 00 00 00 00 00 1e 00 07 00
................
00b4fce8 00000000
00b4fcec 00a20170 -> 34 df 49 5f 78 00 92 00 00 00 00 00 b8 80 b9 00
4.I_x...........
00b4fcf0 00b4fe28 -> 68 ff b4 00 fe ec 7c 00 88 e6 80 00 00 00 00 00
h.....|.........
00b4fcf4 5f492cef = MFC42.DLL:.text+0x91cef
--------------------
0167:5f492cce 8b4df0 mov ecx,dword ptr [ebp-10]
0167:5f492cd1 83c168 add ecx,+68
0167:5f492cd4 e9b0c7f7ff jmp 5f40f489 = MFC42.DLL!773
0167:5f492cd9 b8204d4b5f mov eax,5f4b4d20
0167:5f492cde e9d8f8ffff jmp 5f4925bb =
MSVCRT.DLL!__CxxFrameHandler
0167:5f492ce3 8d4dec lea ecx,[ebp-14]
0167:5f492ce6 8b4104 mov eax,dword ptr [ecx+04]
0167:5f492ce9 8b09 mov ecx,dword ptr [ecx]
0167:5f492ceb 894804 mov dword ptr [eax+04],ecx
0167:5f492cee c3 retd
MFC42.DLL:.text+0x91cef:
*0167:5f492cef b8604d4b5f mov eax,5f4b4d60
0167:5f492cf4 e9c2f8ffff jmp 5f4925bb =
MSVCRT.DLL!__CxxFrameHandler
0167:5f492cf9 ff75f0 push dword ptr [ebp-10]
0167:5f492cfc e8ced3f7ff call 5f4100cf = MFC42.DLL!826
0167:5f492d01 c3 retd
0167:5f492d02 b8884d4b5f mov eax,5f4b4d88
0167:5f492d07 e9aff8ffff jmp 5f4925bb =
MSVCRT.DLL!__CxxFrameHandler
0167:5f492d0c 8b4df0 mov ecx,dword ptr [ebp-10]
0167:5f492d0f e9bcd4f7ff jmp 5f4101d0 = MFC42.DLL!696
0167:5f492d14 8b4df0 mov ecx,dword ptr [ebp-10]
0167:5f492d17 83c11c add ecx,+1c
--------------------
00b4fcf8 00000000
00b4fcfc 00b4fd18 -> dc f7 8f 00 ce 14 40 5f dc f7 8f 00 dc f7 8f 00
......@_........
00b4fd00 0071773a = NETSCAPE.EXE:.text+0x31673a
--------------------
0167:00717716 8b4004 mov eax,dword ptr [eax+04]
0167:00717719 3d00020000 cmp eax,00000200
0167:0071771e 721a jc 0071773a =
NETSCAPE.EXE:.text+0x31673a
0167:00717720 3d09020000 cmp eax,00000209
0167:00717725 7713 ja 0071773a =
NETSCAPE.EXE:.text+0x31673a
0167:00717727 ff7508 push dword ptr [ebp+08]
0167:0071772a 6a00 push +00
0167:0071772c 6807040000 push 00000407
0167:00717731 ff7120 push dword ptr [ecx+20]
0167:00717734 ff1540859000 call dword ptr [00908540] ->
USER32.DLL!SendMessageA
NETSCAPE.EXE:.text+0x31673a:
*0167:0071773a ff7508 push dword ptr [ebp+08]
0167:0071773d 8bce mov ecx,esi
0167:0071773f e8420d0100 call 00728486 = MFC42.DLL!5279
0167:00717744 5e pop esi
0167:00717745 5d pop ebp
0167:00717746 c20400 retd 0004
0167:00717749 55 push ebp
0167:0071774a 8bec mov ebp,esp
0167:0071774c 83ec20 sub esp,+20
0167:0071774f 53 push ebx
0167:00717750 56 push esi
--------------------
00b4fd04 00000490
00b4fd08 00000407
00b4fd0c 00000000
00b4fd10 008ff7dc = NETSCAPE.EXE:.data+0x817dc
-> b0 04 00 00 00 02 00 00 00 00 00 00 1e 00 07 00
................
00b4fd14 0000048c
00b4fd18 008ff7dc = NETSCAPE.EXE:.data+0x817dc
-> b0 04 00 00 00 02 00 00 00 00 00 00 1e 00 07 00
................
00b4fd1c 5f4014ce = MFC42.DLL:.text+0x4ce
--------------------
0167:5f4014b5 85f6 test esi,esi
0167:5f4014b7 742f jz 5f4014e8 = MFC42.DLL:.text+0x4e8
0167:5f4014b9 56 push esi
0167:5f4014ba e814feffff call 5f4012d3 = MFC42.DLL!2867
0167:5f4014bf 85c0 test eax,eax
0167:5f4014c1 740f jz 5f4014d2 = MFC42.DLL:.text+0x4d2
0167:5f4014c3 8b10 mov edx,dword ptr [eax]
0167:5f4014c5 57 push edi
0167:5f4014c6 8bc8 mov ecx,eax
0167:5f4014c8 ff9298000000 call dword ptr [edx+00000098]
MFC42.DLL:.text+0x4ce:
*0167:5f4014ce 85c0 test eax,eax
0167:5f4014d0 7511 jnz 5f4014e3 = MFC42.DLL:.text+0x4e3
0167:5f4014d2 3b74240c cmp esi,dword ptr [esp+0c]
0167:5f4014d6 7410 jz 5f4014e8 = MFC42.DLL:.text+0x4e8
0167:5f4014d8 56 push esi
0167:5f4014d9 ff15c0b5495f call dword ptr [5f49b5c0] ->
USER32.DLL!GetParent
0167:5f4014df 8bf0 mov esi,eax
0167:5f4014e1 ebd2 jmp 5f4014b5 = MFC42.DLL:.text+0x4b5
0167:5f4014e3 6a01 push +01
0167:5f4014e5 58 pop eax
0167:5f4014e6 eb02 jmp 5f4014ea = MFC42.DLL:.text+0x4ea
--------------------
00b4fd20 008ff7dc = NETSCAPE.EXE:.data+0x817dc
-> b0 04 00 00 00 02 00 00 00 00 00 00 1e 00 07 00
................
...
00b4fd28 00cc07b0 -> 98 47 80 00 01 00 00 00 00 00 00 00 00 00 00 00
.G..............
00b4fd2c 5f40147a = MFC42.DLL:.text+0x47a
--------------------
0167:5f40145c 833f00 cmp dword ptr [edi],+00
0167:5f40145f 0f8464d50500 jz 5f45e9c9 =
MFC42.DLL:.text+0x5d9c9
0167:5f401465 e834ffffff call 5f40139e = MFC42.DLL!6575
0167:5f40146a 8bf0 mov esi,eax
0167:5f40146c 85f6 test esi,esi
0167:5f40146e 7403 jz 5f401473 = MFC42.DLL:.text+0x473
0167:5f401470 8b4620 mov eax,dword ptr [esi+20]
0167:5f401473 57 push edi
0167:5f401474 50 push eax
0167:5f401475 e833000000 call 5f4014ad = MFC42.DLL!6367
MFC42.DLL:.text+0x47a:
*0167:5f40147a 85c0 test eax,eax
0167:5f40147c 751d jnz 5f40149b = MFC42.DLL:.text+0x49b
0167:5f40147e 85f6 test esi,esi
0167:5f401480 7412 jz 5f401494 = MFC42.DLL:.text+0x494
0167:5f401482 ff37 push dword ptr [edi]
0167:5f401484 e897fcffff call 5f401120 = MFC42.DLL!2864
0167:5f401489 8bc8 mov ecx,eax
0167:5f40148b e840ffffff call 5f4013d0 = MFC42.DLL!3815
0167:5f401490 3bc6 cmp eax,esi
0167:5f401492 750c jnz 5f4014a0 = MFC42.DLL:.text+0x4a0
0167:5f401494 33c0 xor eax,eax
--------------------
00b4fd30 0000039c
00b4fd34 008ff7dc = NETSCAPE.EXE:.data+0x817dc
-> b0 04 00 00 00 02 00 00 00 00 00 00 1e 00 07 00
................
00b4fd38 00000001
00b4fd3c 008ff7a8 = NETSCAPE.EXE:.data+0x817a8
-> 00 66 80 00 01 00 00 00 00 00 00 00 00 00 00 00
.f..............
00b4fd40 00702dc8 = NETSCAPE.EXE:.text+0x301dc8
--------------------
0167:00702daa d07307 shl byte ptr [ebx+07],EvIa
0167:00702dad 8bce mov ecx,esi
0167:00702daf e827d7ffff call 007004db =
NETSCAPE.EXE:.text+0x2ff4db
0167:00702db4 817e386a030000 cmp dword ptr [esi+38],0000036a
0167:00702dbb 741d jz 00702dda =
NETSCAPE.EXE:.text+0x301dda
0167:00702dbd 8d5e34 lea ebx,[esi+34]
0167:00702dc0 8b06 mov eax,dword ptr [esi]
0167:00702dc2 53 push ebx
0167:00702dc3 8bce mov ecx,esi
0167:00702dc5 ff5060 call dword ptr [eax+60]
NETSCAPE.EXE:.text+0x301dc8:
*0167:00702dc8 85c0 test eax,eax
0167:00702dca 750e jnz 00702dda =
NETSCAPE.EXE:.text+0x301dda
0167:00702dcc 53 push ebx
0167:00702dcd ff1508879000 call dword ptr [00908708] ->
USER32.DLL!TranslateMessage
0167:00702dd3 53 push ebx
0167:00702dd4 ff150c879000 call dword ptr [0090870c] ->
USER32.DLL!DispatchMessageA
0167:00702dda 8bc7 mov eax,edi
0167:00702ddc 5f pop edi
0167:00702ddd 5e pop esi
0167:00702dde 5b pop ebx
0167:00702ddf c3 retd
--------------------
00b4fd44 008ff7dc = NETSCAPE.EXE:.data+0x817dc
-> b0 04 00 00 00 02 00 00 00 00 00 00 1e 00 07 00
................
00b4fd48 00000002
00b4fd4c 00000000
00b4fd50 008ff7a8 = NETSCAPE.EXE:.data+0x817a8
-> 00 66 80 00 01 00 00 00 00 00 00 00 00 00 00 00
.f..............
00b4fd54 00702ce1 = NETSCAPE.EXE:.text+0x301ce1
--------------------
0167:00702cc9 8b03 mov eax,dword ptr [ebx]
0167:00702ccb 8bcb mov ecx,ebx
0167:00702ccd ff5068 call dword ptr [eax+68]
0167:00702cd0 85c0 test eax,eax
0167:00702cd2 7502 jnz 00702cd6 =
NETSCAPE.EXE:.text+0x301cd6
0167:00702cd4 33f6 xor esi,esi
0167:00702cd6 85f6 test esi,esi
0167:00702cd8 75d9 jnz 00702cb3 =
NETSCAPE.EXE:.text+0x301cb3
0167:00702cda 8bcb mov ecx,ebx
0167:00702cdc e83b000000 call 00702d1c =
NETSCAPE.EXE:.text+0x301d1c
NETSCAPE.EXE:.text+0x301ce1:
*0167:00702ce1 85c0 test eax,eax
0167:00702ce3 742b jz 00702d10 =
NETSCAPE.EXE:.text+0x301d10
0167:00702ce5 8d6b34 lea ebp,[ebx+34]
0167:00702ce8 8b03 mov eax,dword ptr [ebx]
0167:00702cea 55 push ebp
0167:00702ceb 8bcb mov ecx,ebx
0167:00702ced ff506c call dword ptr [eax+6c]
0167:00702cf0 85c0 test eax,eax
0167:00702cf2 7407 jz 00702cfb =
NETSCAPE.EXE:.text+0x301cfb
0167:00702cf4 be01000000 mov esi,00000001
0167:00702cf9 33ff xor edi,edi
--------------------
00b4fd58 00b4fd8c -> 38 fe b4 00 a7 ec 7c 00 00 00 40 00 00 00 00 00
8.....|...@.....
00b4fd5c 008ff7a8 = NETSCAPE.EXE:.data+0x817a8
-> 00 66 80 00 01 00 00 00 00 00 00 00 00 00 00 00
.f..............
...
00b4fd64 ffffffff
00b4fd68 5f4099aa = MFC42.DLL:.text+0x89aa
--------------------
0167:5f409994 85c0 test eax,eax
0167:5f409996 7414 jz 5f4099ac = MFC42.DLL:.text+0x89ac
0167:5f409998 8b06 mov eax,dword ptr [esi]
0167:5f40999a 8bce mov ecx,esi
0167:5f40999c ff5058 call dword ptr [eax+58]
0167:5f40999f 85c0 test eax,eax
0167:5f4099a1 7416 jz 5f4099b9 = MFC42.DLL:.text+0x89b9
0167:5f4099a3 8b06 mov eax,dword ptr [esi]
0167:5f4099a5 8bce mov ecx,esi
0167:5f4099a7 ff505c call dword ptr [eax+5c]
MFC42.DLL:.text+0x89aa:
*0167:5f4099aa 8bd8 mov ebx,eax
0167:5f4099ac e801830000 call 5f411cb2 = MFC42.DLL!1577
0167:5f4099b1 5f pop edi
0167:5f4099b2 8bc3 mov eax,ebx
0167:5f4099b4 5e pop esi
0167:5f4099b5 5b pop ebx
0167:5f4099b6 c21000 retd 0010
0167:5f4099b9 8b4e20 mov ecx,dword ptr [esi+20]
0167:5f4099bc 85c9 test ecx,ecx
0167:5f4099be 0f85883a0500 jnz 5f45d44c =
MFC42.DLL:.text+0x5c44c
0167:5f4099c4 8b06 mov eax,dword ptr [esi]
--------------------
00b4fd6c 00000000
00b4fd70 81621838 -> 20 00 20 00 68 74 74 70 3a 2f 2f 77 77 77 2e 74 .
.http://www.t
00b4fd74 00a40000
00b4fd78 007cedd7 = NETSCAPE.EXE:.text+0x3cddd7
--------------------
0167:007cedb0 ff25d8879000 jmp dword ptr [009087d8] ->
COMDLG32.DLL!GetSaveFileNameA
0167:007cedb6 ff25d4879000 jmp dword ptr [009087d4] ->
COMDLG32.DLL!GetOpenFileNameA
0167:007cedbc ff25dc879000 jmp dword ptr [009087dc] ->
COMDLG32.DLL!PrintDlgA
0167:007cedc2 55 push ebp
0167:007cedc3 8bec mov ebp,esp
0167:007cedc5 ff742414 push dword ptr [esp+14]
0167:007cedc9 ff7510 push dword ptr [ebp+10]
0167:007cedcc ff750c push dword ptr [ebp+0c]
0167:007cedcf ff7508 push dword ptr [ebp+08]
0167:007cedd2 e8a5450000 call 007d337c = MFC42.DLL!1576
NETSCAPE.EXE:.text+0x3cddd7:
*0167:007cedd7 5d pop ebp
0167:007cedd8 c21000 retd 0010
0167:007ceddb e80e95f5ff call 007282ee = MFC42.DLL!1168
0167:007cede0 8b542404 mov edx,dword ptr [esp+04]
0167:007cede4 8b4c2408 mov ecx,dword ptr [esp+08]
0167:007cede8 885014 mov byte ptr [eax+14],dl
0167:007cedeb 85d2 test edx,edx
0167:007ceded 898840100000 mov dword ptr [eax+00001040],ecx
0167:007cedf3 750b jnz 007cee00 =
NETSCAPE.EXE:.text+0x3cde00
0167:007cedf5 6afd push -03
0167:007cedf7 ff1544829000 call dword ptr [00908244] ->
MSVCRT.DLL!_setmbcp
--------------------
00b4fd7c 00400000 = NETSCAPE.EXE+0x0
-> 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00
MZ..............
00b4fd80 00000000
00b4fd84 81621838 -> 20 00 20 00 68 74 74 70 3a 2f 2f 77 77 77 2e 74 .
.http://www.t
00b4fd88 00000001
00b4fd8c 00b4fe38 -> 78 ff b4 00 60 b5 f8 bf 00 00 00 00 38 17 62 81
x...`.......8.b.
00b4fd90 007ceca7 = NETSCAPE.EXE:.text+0x3cdca7
--------------------
0167:007cec8b 7408 jz 007cec95 =
NETSCAPE.EXE:.text+0x3cdc95
0167:007cec8d 8b45a8 mov eax,dword ptr [ebp-58]
0167:007cec90 25ffff0000 and eax,0000ffff
0167:007cec95 50 push eax
0167:007cec96 56 push esi
0167:007cec97 6a00 push +00
0167:007cec99 6a00 push +00
0167:007cec9b ff156c719000 call dword ptr [0090716c] ->
KERNEL32.DLL!GetModuleHandleA
0167:007ceca1 50 push eax
0167:007ceca2 e81b010000 call 007cedc2 =
NETSCAPE.EXE:.text+0x3cddc2
NETSCAPE.EXE:.text+0x3cdca7:
*0167:007ceca7 50 push eax
0167:007ceca8 ff1544839000 call dword ptr [00908344] ->
MSVCRT.DLL!exit
0167:007cecae eb28 jmp 007cecd8 =
NETSCAPE.EXE:.text+0x3cdcd8
0167:007cecb0 8b45ec mov eax,dword ptr [ebp-14]
0167:007cecb3 8b00 mov eax,dword ptr [eax]
0167:007cecb5 8b00 mov eax,dword ptr [eax]
0167:007cecb7 8945e0 mov dword ptr [ebp-20],eax
0167:007cecba 8b45ec mov eax,dword ptr [ebp-14]
0167:007cecbd 50 push eax
0167:007cecbe 8b45e0 mov eax,dword ptr [ebp-20]
0167:007cecc1 50 push eax
--------------------
00b4fd94 00400000 = NETSCAPE.EXE+0x0
-> 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00
MZ..............
00b4fd98 00000000
00b4fd9c 81621838 -> 20 00 20 00 68 74 74 70 3a 2f 2f 77 77 77 2e 74 .
.http://www.t
00b4fda0 00000001
00b4fda4 00000000
00b4fda8 81621738 -> 06 00 0d 00 f0 03 5c c1 00 00 00 00 00 00 00 00
......\.........
00b4fdac 00a40000
00b4fdb0 00000044
00b4fdb4 00000000
...
00b4fddc 00000401
00b4fde0 00000001
00b4fde4 00000000
...
00b4fdec 000011a2
00b4fdf0 00000000
00b4fdf4 bffc9490 = KERNEL32.DLL:.data+0x490
-> 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
................
00b4fdf8 00b4ff68 -> ff ff ff ff b4 05 fc bf 38 91 f7 bf 00 00 00 00
........8.......
00b4fdfc 00000003
00b4fe00 00c7ee70 -> 80 ee c7 00 b8 ee c7 00 bb ee c7 00 00 00 00 00
................
00b4fe04 00c702a0 -> d0 02 c7 00 f0 02 c7 00 10 03 c7 00 20 03 c7 00
............ ...
00b4fe08 00000018
00b4fe0c bff741f7 = KERNEL32.DLL:_FREQASM+0x31f7
--------------------
0167:bff741dd 51 push ecx
0167:bff741de 52 push edx
0167:bff741df 681d002a00 push 002a001d
0167:bff741e4 e8ebd1ffff call bff713d4 = KERNEL32.DLL!1
0167:bff741e9 59 pop ecx
0167:bff741ea 5a pop edx
0167:bff741eb ebe8 jmp bff741d5 =
KERNEL32.DLL:_FREQASM+0x31d5
0167:bff741ed 8b542404 mov edx,dword ptr [esp+04]
0167:bff741f1 50 push eax
0167:bff741f2 e804000000 call bff741fb =
KERNEL32.DLL:_FREQASM+0x31fb
KERNEL32.DLL:_FREQASM+0x31f7:
*0167:bff741f7 58 pop eax
0167:bff741f8 c20400 retd 0004
0167:bff741fb 833dec9cfcbf01 cmp dword ptr [bffc9cec],+01
0167:bff74202 7c32 jl bff74236 =
KERNEL32.DLL:_FREQASM+0x3236
0167:bff74204 3b157094fcbf cmp edx,dword ptr [bffc9470]
0167:bff7420a 7506 jnz bff74212 =
KERNEL32.DLL:_FREQASM+0x3212
0167:bff7420c 837a0401 cmp dword ptr [edx+04],+01
0167:bff74210 7426 jz bff74238 =
KERNEL32.DLL:_FREQASM+0x3238
0167:bff74212 ff4a04 dec dword ptr [edx+04]
0167:bff74215 754a jnz bff74261 =
KERNEL32.DLL:_FREQASM+0x3261
0167:bff74217 c7420800000000 mov dword ptr [edx+08],00000000
--------------------
00b4fe10 00000000
00b4fe14 bff7ea17 = KERNEL32.DLL:.text+0x5a17
--------------------
0167:bff7e9f4 85c0 test eax,eax
0167:bff7e9f6 7403 jz bff7e9fb =
KERNEL32.DLL:.text+0x59fb
0167:bff7e9f8 897004 mov dword ptr [eax+04],esi
0167:bff7e9fb c70100000000 mov dword ptr [ecx],00000000
0167:bff7ea01 8b0de49cfcbf mov ecx,dword ptr [bffc9ce4]
0167:bff7ea07 8b01 mov eax,dword ptr [ecx]
0167:bff7ea09 89704c mov dword ptr [eax+4c],esi
0167:bff7ea0c a1109dfcbf mov eax,dword ptr [bffc9d10]
0167:bff7ea11 50 push eax
0167:bff7ea12 e8d657ffff call bff741ed = KERNEL32.DLL!98
KERNEL32.DLL:.text+0x5a17:
*0167:bff7ea17 8bc7 mov eax,edi
0167:bff7ea19 5d pop ebp
0167:bff7ea1a 5f pop edi
0167:bff7ea1b 5e pop esi
0167:bff7ea1c 5b pop ebx
0167:bff7ea1d c20800 retd 0008
0167:bff7ea20 668123f7ff and word ptr [ebx],fff7
0167:bff7ea25 ebf2 jmp bff7ea19 =
KERNEL32.DLL:.text+0x5a19
0167:bff7ea27 55 push ebp
0167:bff7ea28 8bec mov ebp,esp
0167:bff7ea2a 83ec08 sub esp,+08
--------------------
00b4fe18 c0000005
00b4fe1c 00b4ff78 -> f4 ff b4 00 12 b4 f8 bf 24 0a 62 81 08 00 00 00
........$.b.....
00b4fe20 00b4fda4 -> 00 00 00 00 38 17 62 81 00 00 a4 00 44 00 00 00
....8.b.....D...
00b4fe24 00b4f924 -> fc f9 b4 00 18 fa b4 00 50 f9 b4 00 49 68 f7 bf
........P...Ih..
00b4fe28 00b4ff68 -> ff ff ff ff b4 05 fc bf 38 91 f7 bf 00 00 00 00
........8.......
00b4fe2c 007cecfe = NETSCAPE.EXE:.text+0x3cdcfe
-> ff 25 b0 82 90 00 ff 25 ac 82 90 00 ff 25 a8 82
.%.....%.....%..
00b4fe30 0080e688 = NETSCAPE.EXE:.rdata+0x34688
-> ff ff ff ff b0 ec 7c 00 cb ec 7c 00 00 00 00 00
......|...|.....
00b4fe34 00000000
00b4fe38 00b4ff78 -> f4 ff b4 00 12 b4 f8 bf 24 0a 62 81 08 00 00 00
........$.b.....
00b4fe3c bff8b560 = KERNEL32!ApplicationStartup
--------------------
0167:bff8b53c 7413 jz bff8b551 =
KERNEL32.DLL:.text+0x12551
0167:bff8b53e 6a00 push +00
0167:bff8b540 56 push esi
0167:bff8b541 e82859ffff call bff80e6e =
KERNEL32.DLL:.text+0x7e6e
0167:bff8b546 50 push eax
0167:bff8b547 6800050000 push 00000500
0167:bff8b54c e8c45fffff call bff81515 =
KERNEL32.DLL:.text+0x8515
0167:bff8b551 c745fc00000000 mov dword ptr [ebp-04],00000000
0167:bff8b558 8b45d4 mov eax,dword ptr [ebp-2c]
0167:bff8b55b e8b98dfeff call bff74319 =
KERNEL32.DLL:_FREQASM+0x3319
KERNEL32!ApplicationStartup:
*0167:bff8b560 8945d8 mov dword ptr [ebp-28],eax
0167:bff8b563 eb1a jmp bff8b57f =
KERNEL32.DLL:.text+0x1257f
0167:bff8b565 ff75ec push dword ptr [ebp-14]
0167:bff8b568 e8c7250100 call bff9db34 =
KERNEL32.DLL!UnhandledExceptionFilter
0167:bff8b56d c3 retd
0167:bff8b56e 8b65e8 mov esp,dword ptr [ebp-18]
0167:bff8b571 8b45e0 mov eax,dword ptr [ebp-20]
0167:bff8b574 80480308 or byte ptr [eax+03],08
0167:bff8b578 6aff push -01
0167:bff8b57a e8501c0000 call bff8d1cf =
KERNEL32.DLL:.text+0x141cf
0167:bff8b57f c745fcffffffff mov dword ptr [ebp-04],ffffffff
--------------------
00b4fe40 00000000
00b4fe44 81621738 -> 06 00 0d 00 f0 03 5c c1 00 00 00 00 00 00 00 00
......\.........
00b4fe48 00a40000
00b4fe4c 7374654e
00b4fe50 65706163
00b4fe54 45584500
00b4fe58 00000000
...
00b4ff38 00b4ff6c -> b4 05 fc bf 38 91 f7 bf 00 00 00 00 f4 ff b4 00
....8...........
00b4ff3c 81606050 -> 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
................
00b4ff40 8162024c -> 24 00 00 a0 04 00 00 00 00 00 00 00 00 00 00 00
$...............
00b4ff44 c15c05e0 -> 01 00 00 00 24 0a 62 81 38 17 62 81 30 05 5c c1
....$.b.8.b.0.\.
00b4ff48 00b4ff6c -> b4 05 fc bf 38 91 f7 bf 00 00 00 00 f4 ff b4 00
....8...........
00b4ff4c 007ceb50 = NETSCAPE.EXE:.text+0x3cdb50
-> 64 a1 00 00 00 00 55 8b ec 6a ff 68 88 e6 80 00
d.....U..j.h....
00b4ff50 bff7b326 = KERNEL32.DLL:.text+0x2326
--------------------
0167:bff7b309 8b00 mov eax,dword ptr [eax]
0167:bff7b30b 894304 mov dword ptr [ebx+04],eax
0167:bff7b30e 6800020000 push 00000200
0167:bff7b313 51 push ecx
0167:bff7b314 ff75fc push dword ptr [ebp-04]
0167:bff7b317 56 push esi
0167:bff7b318 e8f4edffff call bff7a111 =
KERNEL32.DLL:.text+0x1111
0167:bff7b31d ff750c push dword ptr [ebp+0c]
0167:bff7b320 56 push esi
0167:bff7b321 e8caedffff call bff7a0f0 =
KERNEL32.DLL:.text+0x10f0
KERNEL32.DLL:.text+0x2326:
*0167:bff7b326 b801000000 mov eax,00000001
0167:bff7b32b 5f pop edi
0167:bff7b32c 5e pop esi
0167:bff7b32d 5b pop ebx
0167:bff7b32e 8be5 mov esp,ebp
0167:bff7b330 5d pop ebp
0167:bff7b331 c20c00 retd 000c
0167:bff7b334 55 push ebp
0167:bff7b335 8bec mov ebp,esp
0167:bff7b337 83ec04 sub esp,+04
0167:bff7b33a a1e49cfcbf mov eax,dword ptr [bffc9ce4]
--------------------
00b4ff54 00000000
00b4ff58 81621758 -> 00 02 00 00 20 c4 01 00 ef 25 27 00 04 00 04 00 ....
....%'.....
00b4ff5c 26860000
00b4ff60 00b4fe40 -> 00 00 00 00 38 17 62 81 00 00 a4 00 4e 65 74 73
....8.b.....Nets
00b4ff64 00a40000
00b4ff68 ffffffff
00b4ff6c bffc05b4 = KERNEL32.DLL:.text+0x475b4
-> 55 8b ec 83 ec 08 53 56 57 55 fc 8b 5d 0c 8b 45
U.....SVWU..]..E
00b4ff70 bff79138 = KERNEL32.DLL:.text+0x138
-> ff ff ff ff 65 b5 f8 bf 6e b5 f8 bf 00 00 00 00
....e...n.......
00b4ff74 00000000
00b4ff78 00b4fff4 -> ec 0f d2 82 d5 9d f8 bf 00 00 00 00
............
00b4ff7c bff8b412 = KERNEL32.DLL:.text+0x12412
--------------------
0167:bff8b3f3 ff7508 push dword ptr [ebp+08]
0167:bff8b3f6 56 push esi
0167:bff8b3f7 e8c9560000 call bff90ac5 =
KERNEL32.DLL:.text+0x17ac5
0167:bff8b3fc ff7508 push dword ptr [ebp+08]
0167:bff8b3ff 33ff xor edi,edi
0167:bff8b401 57 push edi
0167:bff8b402 ff7634 push dword ptr [esi+34]
0167:bff8b405 e80397feff call bff74b0d =
KERNEL32.DLL:_FREQASM+0x3b0d
0167:bff8b40a 897d08 mov dword ptr [ebp+08],edi
0167:bff8b40d e84a000000 call bff8b45c =
KERNEL32.DLL:.text+0x1245c
KERNEL32.DLL:.text+0x12412:
*0167:bff8b412 a1e49cfcbf mov eax,dword ptr [bffc9ce4]
0167:bff8b417 8b00 mov eax,dword ptr [eax]
0167:bff8b419 83c060 add eax,+60
0167:bff8b41c 50 push eax
0167:bff8b41d e8cb8dfeff call bff741ed = KERNEL32.DLL!98
0167:bff8b422 e87626ffff call bff7da9d =
KERNEL32.DLL:.text+0x4a9d
0167:bff8b427 8945f0 mov dword ptr [ebp-10],eax
0167:bff8b42a 837df800 cmp dword ptr [ebp-08],+00
0167:bff8b42e 7408 jz bff8b438 =
KERNEL32.DLL:.text+0x12438
0167:bff8b430 ff75f8 push dword ptr [ebp-08]
0167:bff8b433 e843020000 call bff8b67b =
KERNEL32.DLL:.text+0x1267b
--------------------
00b4ff80 81620a24 -> 07 00 02 00 c0 05 5c c1 d0 f8 b4 00 00 00 b5 00
......\.........
00b4ff84 00000008
00b4ff88 81621738 -> 06 00 0d 00 f0 03 5c c1 00 00 00 00 00 00 00 00
......\.........
00b4ff8c 00000000
...
00b4ffd0 0002ffff
00b4ffd4 0000f2b4
00b4ffd8 00b4e000 -> 01 00 00 00 14 f0 b4 00 08 01 00 00 6f 6b 61 79
............okay
00b4ffdc 00b50000
00b4ffe0 00000000
00b4ffe4 ffffffff
00b4ffe8 81620c50 -> 50 45 00 00 4c 01 05 00 c0 99 d7 37 00 00 00 00
PE..L......7....
00b4ffec 00000000
00b4fff0 24972686
00b4fff4 82d20fec
00b4fff8 bff89dd5 = KERNEL32.DLL:.text+0x10dd5
--------------------
0167:bff89db2 e8a94b0000 call bff8e960 =
KERNEL32.DLL:.text+0x15960
0167:bff89db7 56 push esi
0167:bff89db8 e8e32bffff call bff7c9a0 =
KERNEL32.DLL:.text+0x39a0
0167:bff89dbd 33c0 xor eax,eax
0167:bff89dbf ebdf jmp bff89da0 =
KERNEL32.DLL:.text+0x10da0
0167:bff89dc1 f644240c10 test byte ptr [esp+0c],10
0167:bff89dc6 7505 jnz bff89dcd =
KERNEL32.DLL:.text+0x10dcd
0167:bff89dc8 e8a1deffff call bff87c6e =
KERNEL32.DLL:.text+0xec6e
0167:bff89dcd ff742408 push dword ptr [esp+08]
0167:bff89dd1 ff542408 call dword ptr [esp+08]
KERNEL32.DLL:.text+0x10dd5:
*0167:bff89dd5 c20c00 retd 000c
0167:bff89dd8 56 push esi
0167:bff89dd9 a1e49cfcbf mov eax,dword ptr [bffc9ce4]
0167:bff89dde 8b742408 mov esi,dword ptr [esp+08]
0167:bff89de2 57 push edi
0167:bff89de3 8b38 mov edi,dword ptr [eax]
0167:bff89de5 8b4608 mov eax,dword ptr [esi+08]
0167:bff89de8 85c0 test eax,eax
0167:bff89dea 7413 jz bff89dff =
KERNEL32.DLL:.text+0x10dff
0167:bff89dec 50 push eax
0167:bff89ded e8feb7feff call bff755f0 =
KERNEL32.DLL:_FREQASM+0x45f0
--------------------
00b4fffc 00000000
aergererregend viel Zeug, das er besser bei sich gelassen haette!
Bei solchen Beitraegen wuensche ich mir, der Schreiber haette das als
illegales attachment drangehaengt - dann haette mein Newsserver das eh
rausgefiltert.
($0.02)
Mike
*PLONK*
--
Windows ist ein Patient
>On Thu, 30 Dec 1999 15:10:17 +0100 Michael Glueckert
><w.m.gl...@t-online.de> wrote:
>
>>Bei solchen Beitraegen wuensche ich mir, der Schreiber haette das als
>>illegales attachment drangehaengt - dann haette mein Newsserver das eh
>>rausgefiltert.
>
>Was willst Du eigentlich? Das war halt eine äusserst umfangreiche und
>detaillierte Fehlerbeschreibung... :-)
Aeh, was fuer ein Fehler war das noch?
--
"Mom, there is a spider in the bathroom!"
"Are you sure?" - "Yes!"
"How many legs has it got?"
"I can't tell - but they are all dangling from a thread!" (c): RL