S
Stefan Marquardt
Guest
That's the stack from ProcessHacker: 0, ntoskrnl.exe!KiDeliverApc+0x1c7 1, ntoskrnl.exe!KiCommitThreadWait+0x3dd 2, ntoskrnl.exe!KeWaitForSingleObject+0x19f 3, ntoskrnl.exe!IopSynchronousServiceTail+0x2a9 4, ntoskrnl.exe!NtWriteFile+0x7e2 5, ntoskrnl.exe!KiSystemServiceCopyEnd+0x13 6, wow64cpu.dll!CpupSyscallStub+0x9 7, wow64cpu.dll!ReadWriteFileFault+0x31 8, wow64.dll!RunCpuSimulation+0xa 9, wow64.dll!Wow64LdrpInitialize+0x42a 10, ntdll.dll!LdrpInitializeProcess+0x17e3 11, ntdll.dll! ?? ::FNODOBFM::`string'+0x280c0 12, ntdll.dll!LdrInitializeThunk+0xe 13, ntdll.dll!ZwWriteFile+0x15 14, KernelBase.dll!WriteFile+0x113 15, kernel32.dll!WriteFileImplementation+0x76 16, _mprosrv.exe!dbut_utmalloc+0x1e2 17, _mprosrv.exe!dbut_utmalloc+0x7e5
Continue reading...
Continue reading...