-------------------------------------------------------------------------------- Starting profile on 12/1/2004 at 2:26:43 PM Operating System: Microsoft Windows XP Professional (32-bit), version 5.01.2600 Service Pack 2 Program Executable: c:\local\cygwin\bin\READLINK.EXE Program Arguments: Starting Directory: C:\local\cygwin\bin\ Search Path: c:\program files\graphicsmagick-1.1.3-q8;C:\oracle\ora9i\bin;C:\Program Files\Oracle\jre\1.3.1\bin;C:\Program Files\Oracle\jre\1.1.8\bin;C:\WINDOWS\SYSTEM32;C:\WINDOWS;C:\WINDOWS\SYSTEM32\WBEM;C:\PROGRAM FILES\COMMON FILES\ADAPTEC SHARED\SYSTEM;C:\DMI\WIN32\BIN;C:\Tcl\bin Options Selected: Simulate ShellExecute by inserting any App Paths directories into the PATH environment variable. Log DllMain calls for process attach and process detach messages. Log DllMain calls for all other messages, including thread attach and thread detach. Hook the process to gather more detailed dependency information. Log LoadLibrary function calls. Log GetProcAddress function calls. Log thread information. Use simple thread numbers instead of actual thread IDs. Log first chance exceptions. Log debug output messages. Automatically open and profile child processes. -------------------------------------------------------------------------------- Started "READLINK.EXE" (process 0x5C0) at address 0x00400000 by thread 1. Successfully hooked module. Loaded "NTDLL.DLL" at address 0x7C900000 by thread 1. Successfully hooked module. Loaded "KERNEL32.DLL" at address 0x7C800000 by thread 1. Successfully hooked module. DllMain(0x7C900000, DLL_PROCESS_ATTACH, 0x00000000) in "NTDLL.DLL" called by thread 1. DllMain(0x7C900000, DLL_PROCESS_ATTACH, 0x00000000) in "NTDLL.DLL" returned 1 (0x1) by thread 1. DllMain(0x7C800000, DLL_PROCESS_ATTACH, 0x00000000) in "KERNEL32.DLL" called by thread 1. DllMain(0x7C800000, DLL_PROCESS_ATTACH, 0x00000000) in "KERNEL32.DLL" returned 1 (0x1) by thread 1. Injected "DEPENDS.DLL" at address 0x08370000 by thread 1. DllMain(0x08370000, DLL_PROCESS_ATTACH, 0x00000000) in "DEPENDS.DLL" called by thread 1. DllMain(0x08370000, DLL_PROCESS_ATTACH, 0x00000000) in "DEPENDS.DLL" returned 1 (0x1) by thread 1. Loaded "CYGWIN1.DLL" at address 0x61000000 by thread 1. Successfully hooked module. Loaded "ADVAPI32.DLL" at address 0x77DD0000 by thread 1. Successfully hooked module. Loaded "RPCRT4.DLL" at address 0x77E70000 by thread 1. Successfully hooked module. DllMain(0x77E70000, DLL_PROCESS_ATTACH, 0x0022FD1C) in "RPCRT4.DLL" called by thread 1. DllMain(0x77E70000, DLL_PROCESS_ATTACH, 0x0022FD1C) in "RPCRT4.DLL" returned 1 (0x1) by thread 1. DllMain(0x77DD0000, DLL_PROCESS_ATTACH, 0x0022FD1C) in "ADVAPI32.DLL" called by thread 1. DllMain(0x77DD0000, DLL_PROCESS_ATTACH, 0x0022FD1C) in "ADVAPI32.DLL" returned 1 (0x1) by thread 1. DllMain(0x61000000, DLL_PROCESS_ATTACH, 0x0022FD1C) in "CYGWIN1.DLL" called by thread 1. Thread 2 started in "KERNEL32.DLL" at address 0x7C810856. LoadLibraryA("advapi32") called from "CYGWIN1.DLL" at address 0x610012B9 by thread 1. LoadLibraryA("advapi32") returned 0x77DD0000 by thread 1. GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "InitializeSecurityDescriptor") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DD778E by thread 1. GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "SetSecurityDescriptorDacl") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DD77B3 by thread 1. GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "LookupPrivilegeValueA") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DFD11B by thread 1. LoadLibraryW("rpcrt4.dll") called from "RPCRT4.DLL" at address 0x77E9FAF5 by thread 1. LoadLibraryW("rpcrt4.dll") returned 0x77E70000 by thread 1. GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "OpenProcessToken") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DD7753 by thread 1. GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "AdjustTokenPrivileges") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DFC534 by thread 1. GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "GetUserNameA") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DFD4C9 by thread 1. LoadLibraryA("Secur32.dll") called from "ADVAPI32.DLL" at address 0x77DF97AE by thread 1. Loaded "SECUR32.DLL" at address 0x77FE0000 by thread 1. Successfully hooked module. DllMain(0x77FE0000, DLL_PROCESS_ATTACH, 0x00000000) in "SECUR32.DLL" called by thread 1. DllMain(0x77FE0000, DLL_PROCESS_ATTACH, 0x00000000) in "SECUR32.DLL" returned 1 (0x1) by thread 1. LoadLibraryA("Secur32.dll") returned 0x77FE0000 by thread 1. GetProcAddress(0x77FE0000 [SECUR32.DLL], "GetUserNameExA") called from "ADVAPI32.DLL" at address 0x77DF9803 and returned 0x77FE1DD4 by thread 1. GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "GetTokenInformation") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DD7B76 by thread 1. GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "SetTokenInformation") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77E0C80F by thread 1. GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "InitializeAcl") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DD7AD1 by thread 1. GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "AddAccessAllowedAce") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DD7AF9 by thread 1. GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "FindFirstFreeAce") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77E0D13C by thread 1. GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "GetSecurityDescriptorDacl") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DD7C58 by thread 1. GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "SetKernelObjectSecurity") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DFD1BD by thread 1. GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "RegCreateKeyExA") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DDEAF4 by thread 1. GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "RegQueryValueExA") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DD7883 by thread 1. GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "GetSidIdentifierAuthority") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DFD4B0 by thread 1. GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "GetSidSubAuthorityCount") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DF986B by thread 1. GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "GetSidSubAuthority") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DF9839 by thread 1. GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "RegEnumKeyExA") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DFC8C1 by thread 1. DllMain(0x61000000, DLL_PROCESS_ATTACH, 0x0022FD1C) in "CYGWIN1.DLL" returned 1 (0x1) by thread 1. DllMain(0x7C900000, DLL_THREAD_ATTACH, 0x00000000) in "NTDLL.DLL" called by thread 2. DllMain(0x7C900000, DLL_THREAD_ATTACH, 0x00000000) in "NTDLL.DLL" returned 1 (0x1) by thread 2. DllMain(0x7C800000, DLL_THREAD_ATTACH, 0x00000000) in "KERNEL32.DLL" called by thread 2. DllMain(0x7C800000, DLL_THREAD_ATTACH, 0x00000000) in "KERNEL32.DLL" returned 1 (0x1) by thread 2. DllMain(0x61000000, DLL_THREAD_ATTACH, 0x00000000) in "CYGWIN1.DLL" called by thread 2. DllMain(0x61000000, DLL_THREAD_ATTACH, 0x00000000) in "CYGWIN1.DLL" returned 1 (0x1) by thread 2. DllMain(0x77DD0000, DLL_THREAD_ATTACH, 0x00000000) in "ADVAPI32.DLL" called by thread 2. DllMain(0x77DD0000, DLL_THREAD_ATTACH, 0x00000000) in "ADVAPI32.DLL" returned 6683649 (0x65FC01) by thread 2. DllMain(0x77E70000, DLL_THREAD_ATTACH, 0x00000000) in "RPCRT4.DLL" called by thread 2. DllMain(0x77E70000, DLL_THREAD_ATTACH, 0x00000000) in "RPCRT4.DLL" returned 4294967041 (0xFFFFFF01) by thread 2. DllMain(0x61000000, DLL_THREAD_DETACH, 0x00000000) in "CYGWIN1.DLL" called by thread 2. DllMain(0x61000000, DLL_THREAD_DETACH, 0x00000000) in "CYGWIN1.DLL" returned 1 (0x1) by thread 2. DllMain(0x77DD0000, DLL_THREAD_DETACH, 0x00000000) in "ADVAPI32.DLL" called by thread 2. DllMain(0x77DD0000, DLL_THREAD_DETACH, 0x00000000) in "ADVAPI32.DLL" returned 1 (0x1) by thread 2. DllMain(0x77E70000, DLL_THREAD_DETACH, 0x00000000) in "RPCRT4.DLL" called by thread 2. DllMain(0x77E70000, DLL_THREAD_DETACH, 0x00000000) in "RPCRT4.DLL" returned 2147344385 (0x7FFDE001) by thread 2. DllMain(0x7C800000, DLL_THREAD_DETACH, 0x00000000) in "KERNEL32.DLL" called by thread 2. DllMain(0x7C800000, DLL_THREAD_DETACH, 0x00000000) in "KERNEL32.DLL" returned 2147344385 (0x7FFDE001) by thread 2. DllMain(0x7C900000, DLL_THREAD_DETACH, 0x00000000) in "NTDLL.DLL" called by thread 2. DllMain(0x7C900000, DLL_THREAD_DETACH, 0x00000000) in "NTDLL.DLL" returned 1 (0x1) by thread 2. Thread 2 exited with code 0 (0x0). LoadLibraryA("kernel32") called from "CYGWIN1.DLL" at address 0x610012B9 by thread 1. LoadLibraryA("kernel32") returned 0x7C800000 by thread 1. GetProcAddress(0x7C800000 [KERNEL32.DLL], "IsDebuggerPresent") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x7C812E03 by thread 1. cYgFFFFFFFF 610F7C24 GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "CopySid") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DFC304 by thread 1. GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "InitializeSid") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DF8CBB by thread 1. GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "EqualSid") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DD7EE4 by thread 1. Thread 3 started in "KERNEL32.DLL" at address 0x7C810856. DllMain(0x7C900000, DLL_THREAD_ATTACH, 0x00000000) in "NTDLL.DLL" called by thread 3. DllMain(0x7C900000, DLL_THREAD_ATTACH, 0x00000000) in "NTDLL.DLL" returned 1 (0x1) by thread 3. DllMain(0x7C800000, DLL_THREAD_ATTACH, 0x00000000) in "KERNEL32.DLL" called by thread 3. DllMain(0x7C800000, DLL_THREAD_ATTACH, 0x00000000) in "KERNEL32.DLL" returned 1 (0x1) by thread 3. DllMain(0x61000000, DLL_THREAD_ATTACH, 0x00000000) in "CYGWIN1.DLL" called by thread 3. DllMain(0x61000000, DLL_THREAD_ATTACH, 0x00000000) in "CYGWIN1.DLL" returned 1 (0x1) by thread 3. DllMain(0x77DD0000, DLL_THREAD_ATTACH, 0x00000000) in "ADVAPI32.DLL" called by thread 3. DllMain(0x77DD0000, DLL_THREAD_ATTACH, 0x00000000) in "ADVAPI32.DLL" returned 6683649 (0x65FC01) by thread 3. DllMain(0x77E70000, DLL_THREAD_ATTACH, 0x00000000) in "RPCRT4.DLL" called by thread 3. DllMain(0x77E70000, DLL_THREAD_ATTACH, 0x00000000) in "RPCRT4.DLL" returned 4294967041 (0xFFFFFF01) by thread 3. First chance exception 0xC0000005 (Access Violation) occurred in "NTDLL.DLL" at address 0x7C928E22 by thread 3. Second chance exception 0xC0000005 (Access Violation) occurred in "NTDLL.DLL" at address 0x7C928E22 by thread 3. Thread 3 exited with code -1073741819 (0xC0000005). Exited "READLINK.EXE" (process 0x5C0) with code -1073741819 (0xC0000005) by thread 1. Entrypoint reached. All implicit modules have been loaded.