
WARNING: Frame IP not in any known module. Hacking attack and the system has been brought down to prevent a malicious userĭo a kb to get a stack backtrace - the last routine on the stack before theīuffer overrun handlers and bugcheck call is the one that overran its localĪrg1: 00000000, Actual security check cookie from the stackĪrg2: 00009d6d, Expected security check cookieĪrg3: ffff6292, Complement of the expected security check cookieīf81e852 e8ec23feff call win32k!_SEH_epilog (bf800c43) Have overwritten the function's return address and jumped back to an arbitraryĪddress when the function returned. This overrun could potentiallyĪllow a malicious user to gain control of this machine.Ī driver overran a stack-based buffer (or local variable) in a way that would


Probably caused by : win32k.sys ( win32k!NtUserSystemParametersInfo+739 )Ī driver has overrun a stack-based buffer. Use !analyze -v to get detailed debugging information. Product: WinNt, suite: TerminalServer SingleUserTS Windows XP Kernel Version 2600 (Service Pack 3) UP Free x86 compatible Mini Kernel Dump File: Only registers and stack trace are available
