According to the VS.NET debugger, this is the call stack. Does this look 
like what you were looking for? There's no debug symbols, so all the 
functions are obfuscated. Is that going to make this more difficult?

>	NTDLL.DLL!77f9193c() 	
 	NTDLL.DLL!77fb2a30()
 	NTDLL.DLL!77fb28b1()
 	NTDLL.DLL!77fa63a5()
 	NTDLL.DLL!77fa64af()
 	msvcrt-ruby18.dll!1000b144()
 	msvcrt-ruby18.dll!1000aebb()
 	msvcrt-ruby18.dll!1000abe9()
 	NTDLL.DLL!77fcb301()
 	NTDLL.DLL!77fcb4be()
 	NTDLL.DLL!77fcb618()
 	msvcrt-ruby18.dll!1003b234()
 	msvcrt-ruby18.dll!1000646f()
 	NTDLL.DLL!77f877e9()
 	NTDLL.DLL!77fcd981()
 	NTDLL.DLL!77fcba2b()
 	NTDLL.DLL!77fcb9b1()
 	msvcrt-ruby18.dll!100056d6()
 	NTDLL.DLL!77f89d99()
 	KERNEL32.DLL!7c5aa8ba()
 	msvcrt-ruby18.dll!1000c8e3()
 	KERNEL32.DLL!7c5aa942()
 	KERNEL32.DLL!7c58641c()
 	msvcrt.dll!78012d3d()
 	msvcrt-ruby18.dll!1000b524()
 	msvcrt-ruby18.dll!1005f1f3()
 	msvcrt-ruby18.dll!1000d706()
 	msvcrt.dll!78001532()
 	NTDLL.DLL!77f89d99()
 	KERNEL32.DLL!7c5aa8ba()
 	NTDLL.DLL!77fcb0ff()
 	KERNEL32.DLL!7c5aa942()
 	KERNEL32.DLL!7c58641c()
 	msvcrt.dll!78007e4f()
 	NTDLL.DLL!77f8a922()
 	KERNEL32.DLL!7c596a0f()
 	msvcrt.dll!78013409()
 	msvcrt.dll!78012eb5()
 	msvcrt.dll!78012e81()
 	msvcrt.dll!78007cd8()
 	msvcrt.dll!78007ce7()
 	msvcrt.dll!7800d056()
 	msvcrt.dll!7800695c()
 	msvcrt-ruby18.dll!10022034()
 	NTDLL.DLL!77fcaeed()
 	NTDLL.DLL!77fcb4be()
 	NTDLL.DLL!77fcb618()
 	msvcrt.dll!780242ea()
 	msvcrt-ruby18.dll!1000c8e3()
 	msvcrt-ruby18.dll!1000646f()
 	msvcrt-ruby18.dll!100490ad()
 	msvcrt.dll!7800c16a()
 	ruby.exe!00401149()
 	msvcrt.dll!7800bdb5()
 	NTDLL.DLL!77fbb272()
 	NTDLL.DLL!77facc28()
 	msvcrt-ruby18.dll!10020d99()
 	msvcrt-ruby18.dll!10045c63()
 	msvcrt-ruby18.dll!10045d19()
 	msvcrt-ruby18.dll!10056d94()
 	msvcrt-ruby18.dll!10057a80()
 	NTDLL.DLL!77f91bc6()

-- 
Posted via http://www.ruby-forum.com/.