PROCESS_NAME: winlogon.exe FAULTING_IP: win32k!NtUserGetDCEx+29 bf83c00f 8b4904 mov ecx,dword ptr [ecx+4] EXCEPTION_RECORD: ffffffff -- (.exr 0xffffffffffffffff) ExceptionAddress: bf83c00f (win32k!NtUserGetDCEx+0x00000029) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 00000000 Parameter[1]: 00000004 Attempt to read from address 00000004 ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s". READ_ADDRESS: 00000004 BUGCHECK_STR: ACCESS_VIOLATION DEFAULT_BUCKET_ID: NULL_CLASS_PTR_DEREFERENCE LAST_CONTROL_TRANSFER: from 8053ca28 to bf83c00f STACK_TEXT: f88d9d50 8053ca28 00000000 00000000 00000003 win32k!NtUserGetDCEx+0x29 f88d9d50 7c90eb94 00000000 00000000 00000003 nt!KiFastCallEntry+0xf8 0006fb24 7e41e881 7e43a383 00000000 00000000 ntdll!KiFastSystemCallRet 0006fddc 7e43a284 0006ff38 00000005 00000004 USER32!NtUserGetDCEx+0xc 0006ff2c 7e4661d3 0006ff38 00000028 00000000 USER32!MessageBoxWorker+0x2ba 0006ff84 7e4505f3 00000000 1000d9e8 1000b370 USER32!MessageBoxTimeoutW+0x7a 0006ffa4 7e46634f 00000000 1000d9e8 1000b370 USER32!MessageBoxExW+0x1b 0006ffc0 1000105f 00000000 1000d9e8 1000b370 USER32!MessageBoxW+0x45
bf83c003 a138a59abf mov eax,dword ptr [win32k!gptiCurrent (bf9aa538)] bf83c008 f6404b20 test byte ptr [eax+4Bh],20h bf83c00c 8b483c mov ecx,dword ptr [eax+3Ch] bf83c00f 8b4904 mov ecx,dword ptr [ecx+4] ds:0023:00000004=???????? bf83c012 8b7108 mov esi,dword ptr [ecx+8]
There are 31,320 total registered users.
[+] expand