× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



Hak Lui wrote:
> Do you have this intermittent problem with a local file?

I don't use local files, I've always used downloaded members from the 400.

> Have you used the debugger 'idebug'? Let's try this to see if we can
> tell something from there. Next time when the exception occurs, start
> the 'idebug' on a DOS window and attach the process evfwlx40. Then
> check what are on the stack in the current thread, and send me a
> screen capture of the debug window.

That process is gone by the time I can start the debugger.  Dr watson
creates a log though.  Unfortunately, since I view this list via the
newsreader, I don't have your email address (it's encoded); so I'll have to
attach the Dr Watson log in hopes that it will help:


Application exception occurred:
        App:  (pid=888)
        When: 11/12/03 @ 14:47:50.703
        Exception number: c0000005 (access violation)

*----> System Information <----*
        Computer Name: deleted
        User Name: deleted
        Number of Processors: 1
        Processor Type: x86 Family 15 Model 2 Stepping 7
        Windows 2000 Version: 5.0
        Current Build: 2195
        Service Pack: 3
        Current Type: Uniprocessor Free
        Registered Organization: deleted
        Registered Owner: deleted

*----> Task List <----*
   0 Idle.exe
   8 System.exe
 144 smss.exe
 168 csrss.exe
 188 winlogon.exe
 216 services.exe
 228 lsass.exe
 412 svchost.exe
 456 spoolsv.exe
 484 nhksrv.exe
 528 Avsynmgr.exe
 548 awhost32.exe
 596 cisvc.exe
 608 DKService.exe
 616 VsStat.exe
 632 svchost.exe
 656 hidserv.exe
 716 regsvc.exe
 732 MSTask.exe
 752 tcpsvcs.exe
 800 snmp.exe
 912 mspmspsv.exe
 936 svchost.exe
1060 Vshwin32.exe
1104 Mcshield.exe
1232 Avconsol.exe
1284 Launcher.exe
1296 Explorer.exe
1352 point32.exe
1416 evntsvc.exe
1392 httpdl.exe
1244 hkcmd.exe
1336 imnsvdem.exe
1484 MMKeybd.exe
1508 evfctcpd.exe
1068 RuLaunch.exe
 888 EVFWLX40.exe
1456 WebshotsTray.ex.exe
1424 OSD.exe
1580 RXAPI.exe
 780 outlook.exe
1732 MAPISP32.exe
1684 msimn.exe
1692 oequotefix.exe
1616 Netscp.exe
1648 taskmgr.exe
1920 pcsws.exe
1880 PCSCM.exe
1948 pcsws.exe
2112 pcsws.exe
2148 pcsws.exe
2180 pcsws.exe
2212 pcsws.exe
1744 cidaemon.exe
1028 hdi.exe
 304 drwtsn32.exe
   0 _Total.exe

(00400000 - 00460000)
(77F80000 - 77FFA000)
(7C570000 - 7C623000)
(00460000 - 00600000)
(50000000 - 50100000)
(77DB0000 - 77E0B000)
(77D30000 - 77D9E000)
(77E10000 - 77E6F000)
(77F40000 - 77F79000)
(51000000 - 51260000)
(71710000 - 71794000)
(782F0000 - 78534000)
(63180000 - 631E5000)
(78000000 - 78046000)
(76B30000 - 76B6D000)
(77A50000 - 77B3C000)
(00600000 - 00680000)
(77800000 - 7781E000)
(76620000 - 76630000)
(10000000 - 1009F000)
(00C20000 - 00C38000)
(719B0000 - 719B8000)
(01470000 - 014A0000)
(01520000 - 015C0000)
(015C0000 - 016A0000)
(01810000 - 018B0000)
(018B0000 - 01960000)
(01960000 - 01A00000)
(01A00000 - 01AA0000)
(01AA0000 - 01BE0000)
(01BE0000 - 01C19000)
(01C20000 - 01C59000)
(01C60000 - 01CD0000)
(01CD0000 - 01D70000)
(01D70000 - 01E20000)
(01E20000 - 01F40000)
(01F40000 - 02020000)
(02020000 - 020A0000)
(020A0000 - 02110000)
(02110000 - 02190000)
(02190000 - 02210000)
(61220000 - 61232000)
(02560000 - 025D0000)
(50300000 - 503D0000)
(026A0000 - 02750000)
(02860000 - 028C0000)
(75050000 - 75058000)
(75030000 - 75043000)
(75020000 - 75028000)
(74FD0000 - 74FED000)
(77980000 - 779A4000)
(77340000 - 77353000)
(77520000 - 77525000)
(77320000 - 77337000)
(75150000 - 75160000)
(75170000 - 751BF000)
(77BE0000 - 77BEF000)
(751C0000 - 751C6000)
(77950000 - 77978000)
(779B0000 - 77A4B000)
(773B0000 - 773DE000)
(77380000 - 773A2000)
(77830000 - 7783E000)
(77880000 - 7790D000)
(7C0F0000 - 7C151000)
(774E0000 - 77512000)
(774C0000 - 774D1000)
(77530000 - 77552000)
(77360000 - 77379000)
(777F0000 - 777F5000)
(033B0000 - 03450000)
(03480000 - 0349D000)
(75010000 - 75017000)

State Dump for Thread Id 0x414

eax=00000001 ebx=00129310 ecx=00000000 edx=001616a0 esi=00161688
edi=00000001
eip=7503175f esp=001292d0 ebp=001292e0 iopl=0         nv up ei ng nz ac pe
cy
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000
efl=00000293


function: WSASend
        75031742 57               push    edi
        75031743 8d4618           lea     eax,[esi+0x18]
ds:00bdec5a=????????
        75031746 c7450c26270000   mov dword ptr [ebp+0xc],0x2726
ss:00ba68b2=????????
        7503174d 50               push    eax
        7503174e 8945fc           mov     [ebp+0xfc],eax
ss:00ba68b2=????????
        75031751 ff1580100375
ds:75031080=77f87e40
                                  call    dword ptr [Ordinal99+0x1080
(75031080)]
        75031757 8b06             mov     eax,[esi]
ds:00161688=0014f5d0
        75031759 3bc6             cmp     eax,esi
        7503175b 7426             jz      WSASetServiceA+0xbb (7503a283)
        7503175d 8bf8             mov     edi,eax
FAULT ->7503175f 8b00             mov     eax,[eax]
ds:00000001=????????
        75031761 8b4f34           mov     ecx,[edi+0x34]
ds:00a7d5d3=????????
        75031764 3b4d08           cmp     ecx,[ebp+0x8]
ss:00ba68b2=????????
        75031767 75f0             jnz     WSARecvFrom+0xd0 (75039b59)
        75031769 837f0c00         cmp    dword ptr [edi+0xc],0x0
ds:00a7d5d3=????????
        7503176d 0f840c300000     je      WSAUnhookBlockingHook+0x5dc
(7503477f)
        75031773 8d4708           lea     eax,[edi+0x8]
ds:00a7d5d3=????????
        75031776 50               push    eax
        75031777 ff1584100375
ds:75031084=7c57b580
                                  call    dword ptr [Ordinal99+0x1084
(75031084)]
        7503177d 83650c00         and    dword ptr [ebp+0xc],0x0
ss:00ba68b2=????????
        75031781 893b             mov     [ebx],edi
ds:00129310=00000000
        75031783 ff75fc           push    dword ptr [ebp+0xfc]
ss:00ba68b2=????????

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name
001292E0 7503C53A 000004FB 00002726 00129620 0014A354 ws2_32!WSASend
00129308 03489F3C 00000000 0014A354 00129620 0014F5E0 ws2_32!WSAAccept
001295D4 750313B7 00000002 00000001 00000000 0014F5E0 !GdLsp_Uninstall
00129658 7503C366 00000002 00000001 00000000 00000000 ws2_32!WSASocketW
00129680 028E020E 00000002 00000001 00000000 001298E0 ws2_32!socket
00129960 01B132B7 034540EC 034540A4 5001211B 03453D8C <nosymbols>
00129978 01AC1FB4 03454080 00129CF8 0012211B 03453D8C
!convertToIntFromHex__15SecurityManagerF7IString
00129D1C 01AC8D53 03454080 0345405C 00000001 50026890
!WVCC_Shutdown_Server_TCP
00129D5C 01ABD7EC 024FF3F0 00129E28 03453D8C 0012C66C
!WVCC_Get_Last_Error_Text
00129E3C 01B26814 01D20099 03453FFC 00129FD4 03453D8C
!WVCC_Get_TCP_Server_List
00129FB0 01EA7049 01D20099 03453FFC 00129FD4 03453D8C !WVCC_Run_Host_Cmd
0012A1C0 01E4C5F3 03453D8C 00000001 00000000 00000000 !signon
0012A460 0182EDC5 03453D8C 024FE8BC 20000001 0012AEF4 !VDEGetFileInfo
0012CA60 018252B4 0012E2F0 01840461 0243EC00 007403F2 !<nosymbols>
0012CABC 01835DD9 0012E2F0 0243EC00 0057606A 00572030 !<nosymbols>
0012E214 0049ECBE 0012E2F0 00120002 02432EA4 0057606A !<nosymbols>
0012E37C 004D588D 00575E08 0057606A 0243F3F0 02432EA4 !loxecmd2
0012EF4C 004D8442 0243F3F0 02462410 00000000 00000FA2 !lpxsetparent
0012F938 00554051 0243F3F0 00000FA2 0012FE10 00000FA2 !lpxgetm
0012F96C 51028B95 02461C90 0000000C 0012FE00 02461C90
!set__9LPEXValueFPCcT1
0012FA04 5101EE53 02461CD8 0012FE10 0012FE00 02461C90 !Ordinal137
0012FC48 5102084F 02461C90 0012FE10 0012FF2C 0012FF24 !Ordinal1609
0012FE40 77E3A2D0 009E0186 00000111 00000FA2 00000000 !Ordinal1614
0012FE60 77E145E5 510201C1 009E0186 00000111 00000FA2
user32!SetWindowPlacement
0012FEEC 77E15B51 0012FF24 00000001 5101B81F 0012FF24
user32!TranslateMessageEx
0012FF78 510149F7 51174E00 007450A0 004AD8DD 00000002
user32!DispatchMessageA
0012FFC0 7C5987E7 00000030 0000000C 7FFDF000 C0000005 !Ordinal390
0012FFF0 00000000 00410070 00000000 000000C8 00000100
kernel32!ProcessIdToSessionId

*----> Raw Stack Dump <----*
001292d0  20 96 12 00 54 a3 14 00 - a8 11 16 00 a0 16 16 00
...T...........
001292e0  08 93 12 00 3a c5 03 75 - fb 04 00 00 26 27 00 00
....:..u....&'..
001292f0  20 96 12 00 54 a3 14 00 - 48 e7 14 00 ff ff ff ff
...T...H.......
00129300  58 1b 49 03 ff ff ff ff - d4 95 12 00 3c 9f 48 03
X.I.........<.H.
00129310  00 00 00 00 54 a3 14 00 - 20 96 12 00 e0 f5 14 00  ....T...
.......
00129320  00 00 00 00 f4 ae 12 00 - 1d 96 fc 77 00 00 00 00
...........w....
00129330  01 00 00 00 66 00 02 00 - 00 00 00 00 00 00 00 00
....f...........
00129340  00 00 00 00 08 00 00 00 - a0 1a 0f e7 8b ab cf 11
................
00129350  8c a3 00 80 5f 48 a1 92 - 06 04 00 00 01 00 00 00
...._H..........
00129360  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
00129370  00 00 00 00 00 00 00 00 - 00 00 00 00 02 00 00 00
................
00129380  02 00 00 00 10 00 00 00 - 10 00 00 00 01 00 00 00
................
00129390  06 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
001293a0  00 00 00 00 00 00 00 00 - 4d 00 53 00 41 00 46 00
........M.S.A.F.
001293b0  44 00 20 00 54 00 63 00 - 70 00 69 00 70 00 20 00  D. .T.c.p.i.p.

As an Amazon Associate we earn from qualifying purchases.

This thread ...

Follow-Ups:
Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.