|
Hak Lui wrote: > Do you have this intermittent problem with a local file? I don't use local files, I've always used downloaded members from the 400. > Have you used the debugger 'idebug'? Let's try this to see if we can > tell something from there. Next time when the exception occurs, start > the 'idebug' on a DOS window and attach the process evfwlx40. Then > check what are on the stack in the current thread, and send me a > screen capture of the debug window. That process is gone by the time I can start the debugger. Dr watson creates a log though. Unfortunately, since I view this list via the newsreader, I don't have your email address (it's encoded); so I'll have to attach the Dr Watson log in hopes that it will help: Application exception occurred: App: (pid=888) When: 11/12/03 @ 14:47:50.703 Exception number: c0000005 (access violation) *----> System Information <----* Computer Name: deleted User Name: deleted Number of Processors: 1 Processor Type: x86 Family 15 Model 2 Stepping 7 Windows 2000 Version: 5.0 Current Build: 2195 Service Pack: 3 Current Type: Uniprocessor Free Registered Organization: deleted Registered Owner: deleted *----> Task List <----* 0 Idle.exe 8 System.exe 144 smss.exe 168 csrss.exe 188 winlogon.exe 216 services.exe 228 lsass.exe 412 svchost.exe 456 spoolsv.exe 484 nhksrv.exe 528 Avsynmgr.exe 548 awhost32.exe 596 cisvc.exe 608 DKService.exe 616 VsStat.exe 632 svchost.exe 656 hidserv.exe 716 regsvc.exe 732 MSTask.exe 752 tcpsvcs.exe 800 snmp.exe 912 mspmspsv.exe 936 svchost.exe 1060 Vshwin32.exe 1104 Mcshield.exe 1232 Avconsol.exe 1284 Launcher.exe 1296 Explorer.exe 1352 point32.exe 1416 evntsvc.exe 1392 httpdl.exe 1244 hkcmd.exe 1336 imnsvdem.exe 1484 MMKeybd.exe 1508 evfctcpd.exe 1068 RuLaunch.exe 888 EVFWLX40.exe 1456 WebshotsTray.ex.exe 1424 OSD.exe 1580 RXAPI.exe 780 outlook.exe 1732 MAPISP32.exe 1684 msimn.exe 1692 oequotefix.exe 1616 Netscp.exe 1648 taskmgr.exe 1920 pcsws.exe 1880 PCSCM.exe 1948 pcsws.exe 2112 pcsws.exe 2148 pcsws.exe 2180 pcsws.exe 2212 pcsws.exe 1744 cidaemon.exe 1028 hdi.exe 304 drwtsn32.exe 0 _Total.exe (00400000 - 00460000) (77F80000 - 77FFA000) (7C570000 - 7C623000) (00460000 - 00600000) (50000000 - 50100000) (77DB0000 - 77E0B000) (77D30000 - 77D9E000) (77E10000 - 77E6F000) (77F40000 - 77F79000) (51000000 - 51260000) (71710000 - 71794000) (782F0000 - 78534000) (63180000 - 631E5000) (78000000 - 78046000) (76B30000 - 76B6D000) (77A50000 - 77B3C000) (00600000 - 00680000) (77800000 - 7781E000) (76620000 - 76630000) (10000000 - 1009F000) (00C20000 - 00C38000) (719B0000 - 719B8000) (01470000 - 014A0000) (01520000 - 015C0000) (015C0000 - 016A0000) (01810000 - 018B0000) (018B0000 - 01960000) (01960000 - 01A00000) (01A00000 - 01AA0000) (01AA0000 - 01BE0000) (01BE0000 - 01C19000) (01C20000 - 01C59000) (01C60000 - 01CD0000) (01CD0000 - 01D70000) (01D70000 - 01E20000) (01E20000 - 01F40000) (01F40000 - 02020000) (02020000 - 020A0000) (020A0000 - 02110000) (02110000 - 02190000) (02190000 - 02210000) (61220000 - 61232000) (02560000 - 025D0000) (50300000 - 503D0000) (026A0000 - 02750000) (02860000 - 028C0000) (75050000 - 75058000) (75030000 - 75043000) (75020000 - 75028000) (74FD0000 - 74FED000) (77980000 - 779A4000) (77340000 - 77353000) (77520000 - 77525000) (77320000 - 77337000) (75150000 - 75160000) (75170000 - 751BF000) (77BE0000 - 77BEF000) (751C0000 - 751C6000) (77950000 - 77978000) (779B0000 - 77A4B000) (773B0000 - 773DE000) (77380000 - 773A2000) (77830000 - 7783E000) (77880000 - 7790D000) (7C0F0000 - 7C151000) (774E0000 - 77512000) (774C0000 - 774D1000) (77530000 - 77552000) (77360000 - 77379000) (777F0000 - 777F5000) (033B0000 - 03450000) (03480000 - 0349D000) (75010000 - 75017000) State Dump for Thread Id 0x414 eax=00000001 ebx=00129310 ecx=00000000 edx=001616a0 esi=00161688 edi=00000001 eip=7503175f esp=001292d0 ebp=001292e0 iopl=0 nv up ei ng nz ac pe cy cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000293 function: WSASend 75031742 57 push edi 75031743 8d4618 lea eax,[esi+0x18] ds:00bdec5a=???????? 75031746 c7450c26270000 mov dword ptr [ebp+0xc],0x2726 ss:00ba68b2=???????? 7503174d 50 push eax 7503174e 8945fc mov [ebp+0xfc],eax ss:00ba68b2=???????? 75031751 ff1580100375 ds:75031080=77f87e40 call dword ptr [Ordinal99+0x1080 (75031080)] 75031757 8b06 mov eax,[esi] ds:00161688=0014f5d0 75031759 3bc6 cmp eax,esi 7503175b 7426 jz WSASetServiceA+0xbb (7503a283) 7503175d 8bf8 mov edi,eax FAULT ->7503175f 8b00 mov eax,[eax] ds:00000001=???????? 75031761 8b4f34 mov ecx,[edi+0x34] ds:00a7d5d3=???????? 75031764 3b4d08 cmp ecx,[ebp+0x8] ss:00ba68b2=???????? 75031767 75f0 jnz WSARecvFrom+0xd0 (75039b59) 75031769 837f0c00 cmp dword ptr [edi+0xc],0x0 ds:00a7d5d3=???????? 7503176d 0f840c300000 je WSAUnhookBlockingHook+0x5dc (7503477f) 75031773 8d4708 lea eax,[edi+0x8] ds:00a7d5d3=???????? 75031776 50 push eax 75031777 ff1584100375 ds:75031084=7c57b580 call dword ptr [Ordinal99+0x1084 (75031084)] 7503177d 83650c00 and dword ptr [ebp+0xc],0x0 ss:00ba68b2=???????? 75031781 893b mov [ebx],edi ds:00129310=00000000 75031783 ff75fc push dword ptr [ebp+0xfc] ss:00ba68b2=???????? *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 001292E0 7503C53A 000004FB 00002726 00129620 0014A354 ws2_32!WSASend 00129308 03489F3C 00000000 0014A354 00129620 0014F5E0 ws2_32!WSAAccept 001295D4 750313B7 00000002 00000001 00000000 0014F5E0 !GdLsp_Uninstall 00129658 7503C366 00000002 00000001 00000000 00000000 ws2_32!WSASocketW 00129680 028E020E 00000002 00000001 00000000 001298E0 ws2_32!socket 00129960 01B132B7 034540EC 034540A4 5001211B 03453D8C <nosymbols> 00129978 01AC1FB4 03454080 00129CF8 0012211B 03453D8C !convertToIntFromHex__15SecurityManagerF7IString 00129D1C 01AC8D53 03454080 0345405C 00000001 50026890 !WVCC_Shutdown_Server_TCP 00129D5C 01ABD7EC 024FF3F0 00129E28 03453D8C 0012C66C !WVCC_Get_Last_Error_Text 00129E3C 01B26814 01D20099 03453FFC 00129FD4 03453D8C !WVCC_Get_TCP_Server_List 00129FB0 01EA7049 01D20099 03453FFC 00129FD4 03453D8C !WVCC_Run_Host_Cmd 0012A1C0 01E4C5F3 03453D8C 00000001 00000000 00000000 !signon 0012A460 0182EDC5 03453D8C 024FE8BC 20000001 0012AEF4 !VDEGetFileInfo 0012CA60 018252B4 0012E2F0 01840461 0243EC00 007403F2 !<nosymbols> 0012CABC 01835DD9 0012E2F0 0243EC00 0057606A 00572030 !<nosymbols> 0012E214 0049ECBE 0012E2F0 00120002 02432EA4 0057606A !<nosymbols> 0012E37C 004D588D 00575E08 0057606A 0243F3F0 02432EA4 !loxecmd2 0012EF4C 004D8442 0243F3F0 02462410 00000000 00000FA2 !lpxsetparent 0012F938 00554051 0243F3F0 00000FA2 0012FE10 00000FA2 !lpxgetm 0012F96C 51028B95 02461C90 0000000C 0012FE00 02461C90 !set__9LPEXValueFPCcT1 0012FA04 5101EE53 02461CD8 0012FE10 0012FE00 02461C90 !Ordinal137 0012FC48 5102084F 02461C90 0012FE10 0012FF2C 0012FF24 !Ordinal1609 0012FE40 77E3A2D0 009E0186 00000111 00000FA2 00000000 !Ordinal1614 0012FE60 77E145E5 510201C1 009E0186 00000111 00000FA2 user32!SetWindowPlacement 0012FEEC 77E15B51 0012FF24 00000001 5101B81F 0012FF24 user32!TranslateMessageEx 0012FF78 510149F7 51174E00 007450A0 004AD8DD 00000002 user32!DispatchMessageA 0012FFC0 7C5987E7 00000030 0000000C 7FFDF000 C0000005 !Ordinal390 0012FFF0 00000000 00410070 00000000 000000C8 00000100 kernel32!ProcessIdToSessionId *----> Raw Stack Dump <----* 001292d0 20 96 12 00 54 a3 14 00 - a8 11 16 00 a0 16 16 00 ...T........... 001292e0 08 93 12 00 3a c5 03 75 - fb 04 00 00 26 27 00 00 ....:..u....&'.. 001292f0 20 96 12 00 54 a3 14 00 - 48 e7 14 00 ff ff ff ff ...T...H....... 00129300 58 1b 49 03 ff ff ff ff - d4 95 12 00 3c 9f 48 03 X.I.........<.H. 00129310 00 00 00 00 54 a3 14 00 - 20 96 12 00 e0 f5 14 00 ....T... ....... 00129320 00 00 00 00 f4 ae 12 00 - 1d 96 fc 77 00 00 00 00 ...........w.... 00129330 01 00 00 00 66 00 02 00 - 00 00 00 00 00 00 00 00 ....f........... 00129340 00 00 00 00 08 00 00 00 - a0 1a 0f e7 8b ab cf 11 ................ 00129350 8c a3 00 80 5f 48 a1 92 - 06 04 00 00 01 00 00 00 ...._H.......... 00129360 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 00129370 00 00 00 00 00 00 00 00 - 00 00 00 00 02 00 00 00 ................ 00129380 02 00 00 00 10 00 00 00 - 10 00 00 00 01 00 00 00 ................ 00129390 06 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 001293a0 00 00 00 00 00 00 00 00 - 4d 00 53 00 41 00 46 00 ........M.S.A.F. 001293b0 44 00 20 00 54 00 63 00 - 70 00 69 00 70 00 20 00 D. .T.c.p.i.p.
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.