Need your help on this Please - Dr. Watson Error on p

I'm sure the folks at Vantage Tech Support would LOVE to see this one! NOT!

A number of early-adopters of v4.0 saw this error until Progress issued a
patch. The problem here is that you HAVE the patch that fixed the problem
for the rest of us! We were all using 9.0B23c and 9.0B29c was the patch
that fixed it. There is a more current patch on the Progress web site, but
it breaks Report Builder. A new patch (9.0B37) should be available within
the next day or two at http://www.progress.com/patches/index.htm
<http://www.progress.com/patches/index.htm> . Of course, until Epicor
blesses it you play at your own risk!

BTW, we affectionately refer to this problem as the Ruddles error, as
\\ruddles <file://\\ruddles> is the name of a test server at Progress and
nobody knows why (or is admitting to knowing why) it shows up in the error
(see the first line of the drwatson error).

Good luck to you!

And may God have mercy on the rest of us so we don't all start showing up
with this error again!!!!!!

================
Steve Sanders
Delta Centrifugal Corp.

-----Original Message-----
From: Laxmi [mailto:laxmig@...]
Sent: Thursday, July 27, 2000 3:30 PM
To: dba@...; api@...; fun@...
Cc: Vantage@Egroups. Com
Subject: [Vantage] Need your help on this Please - Dr. Watson Error on
prowin32.exe


Hi,
I am not sure which group this particular error message belongs to. But I
need help. I am running v9.0B with a patch level p90b29. I get a strange
error whenever I compile my program.

It says :
An application error has occurred and an application error log is being
generated.
Prowin32.exe
Exception: access violation (0xc0000005), Address 0x10313d1f.

When I looked at the log file which is listed below. I have a full access to
all the directories and files including the ones in the subdirectories. Can
some one please help me in this situation as I need to get this resolved
ASAP.

I greatly appreciate your help on this matter.

Thank you very much. Have a nice day.
Laxmi.



Application exception occurred:
App: \\ruddles/i_90b_nt/90b/nt/patch/29c/work/rx.exe (pid=323)
When: 7/27/2000 @ 14:47:8.468
Exception number: c0000005 (access violation)

*----> System Information <----*
Computer Name: MONOLITH
User Name: laxmi
Number of Processors: 2
Processor Type: x86 Family 6 Model 1 Stepping 7
Windows Version: 4.0
Current Build: 1381
Current Type: Multiprocessor Free
Registered Organization: Bermo Inc.
Registered Owner: Bermo Inc.

*----> Task List <----*
0 Idle.exe
2 System.exe
26 SMSS.exe
34 CSRSS.exe
41 WINLOGON.exe
33 SERVICES.exe
49 LSASS.exe
72 SPOOLSS.exe
91 RPCSS.exe
67 msdtc.exe
116 admsrvc.exe
122 llssrv.exe
130 jre.exe
132 prosrvc.exe
139 PSTORES.exe
150 mstask.exe
156 TCPSVCS.exe
173 LSERVER.exe
185 WINS.exe
191 inetinfo.exe
198 TERMSRV.exe
83 jre.exe
293 NDDEAGNT.exe
275 EXPLORER.exe
307 PROMon.exe
320 LOADWC.exe
280 CSRSS.exe
351 prowin32.exe
310 CSRSS.exe
78 prowin32.exe
264 CSRSS.exe
405 WINLOGON.exe
431 NDDEAGNT.exe
443 EXPLORER.exe
341 PROMon.exe
481 LOADWC.exe
458 prowin32.exe
418 _mprosrv.exe
221 _mprshut.exe
147 _mprshut.exe
213 _mprshut.exe
525 CSRSS.exe
516 WINLOGON.exe
216 CSRSS.exe
412 WINLOGON.exe
416 CSRSS.exe
369 WINLOGON.exe
473 NDDEAGNT.exe
140 EXPLORER.exe
332 PROMon.exe
46 LOADWC.exe
323 prowin32.exe
477 DRWTSN32.exe
0 _Total.exe

(00400000 - 00404000) \\ruddles/i_90b_nt/90b/nt/patch/29c/work/rx.exe
(77f60000 - 77fbc000) dll\ntdll.dbg
(10000000 - 103bc000) \\ruddles/i_90b_nt/90b/nt/patch/29c/work/prow32.dll
(78000000 - 78040000)
(77ef0000 - 77f57000) dll\kernel32.dbg
(77e60000 - 77eb2000) dll\user32.dbg
(77ec0000 - 77eec000) dll\gdi32.dbg
(77da0000 - 77de4000) dll\advapi32.dbg
(70520000 - 70574000) dll\rpcrt4.dbg
(73940000 - 7394c000) dll\winsta.dbg
(776b0000 - 776b8000) dll\wsock32.dbg
(77690000 - 776a4000) dll\ws2_32.dbg
(77680000 - 77687000) dll\ws2help.dbg
(77d60000 - 77d93000) dll\comdlg32.dbg
(77c20000 - 77d60000) dll\shell32.dbg
(715a0000 - 71629000) COMCTL32.dbg
(777e0000 - 7781a000) dll\netapi32.dbg
(77820000 - 77829000) dll\NetRap.dbg
(777c0000 - 777cd000) dll\samlib.dbg
(77bb0000 - 77bcc000) drv\winspool.dbg
(5f400000 - 5f4f2000)
(77b00000 - 77baf000) dll\ole32.dbg
(65340000 - 653d2000) oleaut32.dbg
(77e00000 - 77e07000) dll\rpcltc1.dbg
(03ff0000 - 03ff0000)
(5f300000 - 5f329000) olepro32.dbg
(6c000000 - 6c02e000) riched32.DBG
(764e0000 - 764fd000) dll\imagehlp.dbg

State Dump for Thread Id 0x1b3

eax=00000000 ebx=00000000 ecx=00005c00 edx=00000000 esi=00000014
edi=0112e3a4
eip=10313d1f esp=0012eee8 ebp=0012ef00 iopl=0 nv up ei pl zr na po
nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000
efl=00000246


function: stpcmp
10313d05 8b4d08 mov ecx,[ebp+0x8]
ss:0141d906=00000000
10313d08 0fb609 movzx ecx,byte ptr [ecx]
ds:00005c00=??
10313d0b 03c1 add eax,ecx
10313d0d 668945fc mov [ebp-0x4],ax
ss:0141d907=0000
10313d11 8b4508 mov eax,[ebp+0x8]
ss:0141d906=00000000
10313d14 40 inc eax
10313d15 894508 mov [ebp+0x8],eax
ss:0141d906=00000000
10313d18 ebd6 jmp stpcmp+0x62 (10313cf0)
10313d1a eb1c jmp stpcmp+0xaa (10313d38)
10313d1c 8b4508 mov eax,[ebp+0x8]
ss:0141d906=00000000
FAULT ->10313d1f 0fb600 movzx eax,byte ptr [eax]
ds:00000000=??
10313d22 8b0ddc5b3810 mov ecx,[GlobalUptable (10385bdc)]
ds:10385bdc=004125f4
10313d28 660fb60401 movzx ax,byte ptr [ecx+eax]
ds:00000000=??
10313d2d 668945fc mov [ebp-0x4],ax
ss:0141d907=0000
10313d31 8b4508 mov eax,[ebp+0x8]
ss:0141d906=00000000
10313d34 40 inc eax
10313d35 894508 mov [ebp+0x8],eax
ss:0141d906=00000000
10313d38 833dacbb351000
ds:1035bbac=00411020
cmp dword ptr [pGlobCpAttrib
(1035bbac)],0x0
10313d3f 742c jz stpcmp+0xdf (10313d6d)
10313d41 a1acbb3510 mov eax,[pGlobCpAttrib (1035bbac)]
ds:1035bbac=00411020
10313d46 0fb74004 movzx eax,word ptr [eax+0x4]
ds:012eea07=0000
10313d4a 83e002 and eax,0x2

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0012ef00 10331bdd 00000000 0456bbc0 00000000 03f481f1 prow32!stpcmp
0012f544 10336fcb 03f04bf0 00000000 0112e3a4 7ffdebf8
prow32!smxrefWriteRunRefs
0012f6b8 10158acc 0012fa20 00e7c150 04555b18 0455e0d8 prow32!smsem
0012f6e8 10158446 0012fa20 03e70001 00e7c160 0455e060 prow32!crpsrch
0012fcb8 1015738a 04555b18 0000000c 03e70001 00e7c160 prow32!crpsrch
0012fd00 10156ba2 ffffffff 0012fd20 1015723f 00000000 prow32!crrun_entry
0012fd0c 1015723f 00000000 03e76918 00306d70 0012fdd0 prow32!rninterpret
0012fd20 102c55e7 00e7c170 0000000c 00000001 00e7c160 prow32!crrun_rcsv
0012fdd0 101692cf 04564114 04564114 03e768a8 04564114 prow32!rncmpile
0012fdf8 10156ba2 ffffffff 0012fe8c 101b41ec 00000000 prow32!rnexec_entry
0012fe04 101b41ec 00000000 00000000 0000000f 00000000 prow32!rninterpret
0012fe8c 100e6dcf 00000000 00000000 00000000 0012fec4
prow32!umeDispatchEvent
0012fec0 102a9b5c 00e8ca7c 0012fed8 1001bcbc 00000002 prow32!wwRunDispatcher

0012fecc 1001bcbc 00000002 0012ff08 100056e8 00413dcc prow32!iodispatch
0012fed8 100056e8 00413dcc 04568c00 045bd800 03f517f0 prow32!rnrq
0012ff08 10043eed 00000009 00410600 00000060 0012ff24 prow32!drmain
0012ff1c 00401008 0012ffc0 00401148 00400000 00000000 prow32!ProStartup
0012ff24 00401148 00400000 00000000 00143dde 00000001 rx!WinMain
0012ffc0 77f11be3 0112e3a4 77c25180 7ffdf000 c0000005 rx!WinMainCRTStartup
0012fff0 00000000 00401014 00000000 00000000 77fa5be0
kernel32!GetProcessPriorityBoost
00000000 00000000 00000000 00000000 00000000 00000000 rx!<nosymbols>

*----> Raw Stack Dump <----*
0012eee8 29 00 00 00 00 00 00 00 - 04 ef 12 00 00 00 00 00
)...............
0012eef8 00 5c 00 00 ac c6 59 04 - 44 f5 12 00 dd 1b 33 10
.\....Y.D.....3.
0012ef08 00 00 00 00 c0 bb 56 04 - 00 00 00 00 f1 81 f4 03
......V.........
0012ef18 f1 81 f4 03 34 d3 f4 03 - 34 d3 f4 03 00 00 00 00
....4...4.......
0012ef28 00 00 00 00 00 00 00 00 - d8 bb 56 04 00 00 00 00
..........V.....
0012ef38 f1 81 f4 03 00 00 00 00 - 00 00 00 00 08 20 f5 03 .............
..
0012ef48 08 20 f5 03 c4 1f f5 03 - c4 1f f5 03 00 00 00 00 .
..............
0012ef58 a8 f0 12 00 82 4d 33 10 - 54 f5 f4 03 60 91 56 04
.....M3.T...`.V.
0012ef68 51 00 00 00 b8 1f f5 03 - 00 00 00 00 24 1f f5 03
Q...........$...
0012ef78 6c 00 00 00 84 f3 12 00 - 63 67 23 10 00 46 f2 03
l.......cg#..F..
0012ef88 00 00 00 00 51 00 00 00 - 00 00 00 00 00 00 00 00
....Q...........
0012ef98 04 3e 00 00 74 ef 12 00 - 04 3e 00 00 b0 ff 12 00
.>..t....>......
0012efa8 90 1d f3 77 b0 36 f3 77 - b8 78 38 10 54 f5 f4 03
...w.6.w.x8.T...
0012efb8 54 f5 f4 03 54 00 00 00 - 00 00 00 00 51 00 00 00
T...T.......Q...
0012efc8 00 f1 12 00 37 f1 12 00 - e0 ef 12 00 ee aa 31 10
....7.........1.
0012efd8 c9 f1 12 00 03 00 00 00 - f4 ef 12 00 6e 61 31 10
............na1.
0012efe8 c8 f1 12 00 cb f1 12 00 - 00 00 00 00 20 f0 12 00 ............
...
0012eff8 f1 53 31 10 30 f0 12 00 - 1c f0 12 00 00 00 00 00
.S1.0...........
0012f008 30 f0 12 00 00 00 00 00 - 01 00 00 00 65 f0 12 00
0...........e...
0012f018 a4 e3 12 01 00 43 31 10 - dc 3f f3 03 20 00 00 00 .....C1..?..
...

State Dump for Thread Id 0x167

eax=1000aec0 ebx=00000000 ecx=03ce47bc edx=00000000 esi=03deff8c
edi=77f1343e
eip=77f679df esp=03deff78 ebp=03deff94 iopl=0 nv up ei pl nz na pe
nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000
efl=00000202


function: ZwDelayExecution
77f679d4 b827000000 mov eax,0x27
77f679d9 8d542404 lea edx,[esp+0x4]
ss:050de97f=????????
77f679dd cd2e int 2e
77f679df c20800 ret 0x8
77f679e2 8bc0 mov eax,eax

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
03deff94 77f13449 000003e8 00000000 1000affc 000003e8 ntdll!ZwDelayExecution

77f1380e 006a20ec 6afc458d 0c6a5004 15fffe6a 77f321a4 kernel32!Sleep

*----> Raw Stack Dump <----*
03deff78 80 34 f1 77 00 00 00 00 - 8c ff de 03 30 02 41 00
.4.w........0.A.
03deff88 00 00 00 00 80 69 67 ff - ff ff ff ff 0e 38 f1 77
.....ig......8.w
03deff98 49 34 f1 77 e8 03 00 00 - 00 00 00 00 fc af 00 10
I4.w............
03deffa8 e8 03 00 00 20 fc 12 00 - bc 47 ce 03 ec ff de 03 ....
....G......
03deffb8 30 02 41 00 a2 4f ef 77 - 7c 08 00 00 20 fc 12 00 0.A..O.w|...
...
03deffc8 bc 47 ce 03 30 02 41 00 - bc 47 ce 03 c4 ff de 03
.G..0.A..G......
03deffd8 20 d4 2f 10 ff ff ff ff - 90 1d f3 77 a8 3f f3 77
./........w.?.w
03deffe8 00 00 00 00 00 00 00 00 - 00 00 00 00 c0 ae 00 10
................
03defff8 30 02 41 00 00 00 00 00 - 07 00 00 00 02 01 00 00
0.A.............
03df0008 ee ff ee ff 00 00 00 00 - 00 00 30 00 00 60 09 00
..........0..`..
03df0018 00 00 df 03 00 02 00 00 - 38 00 df 03 00 00 ff 03
........8.......
03df0028 ac 00 00 00 03 00 00 00 - d8 04 30 00 00 00 00 00
..........0.....
03df0038 07 10 07 00 02 01 08 00 - 00 00 00 00 04 80 00 00
................
03df0048 68 80 df 03 68 04 f6 00 - 00 00 00 00 00 00 00 00
h...h...........
03df0058 00 00 00 00 25 00 00 00 - b4 5d 41 00 00 00 00 00
....%....]A.....
03df0068 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
03df0078 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
03df0088 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
03df0098 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
03df00a8 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................

State Dump for Thread Id 0x1cf

eax=70527b10 ebx=00000000 ecx=0012f278 edx=00000000 esi=0014482c
edi=00150988
eip=77f681cf esp=0478fe04 ebp=0478ff90 iopl=0 nv up ei pl nz ac pe
nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000
efl=00000212


function: ZwReplyWaitReceivePort
77f681c4 b890000000 mov eax,0x90
77f681c9 8d542404 lea edx,[esp+0x4]
ss:05a7e80b=????????
77f681cd cd2e int 2e
77f681cf c21000 ret 0x10
77f681d2 8bc0 mov eax,eax

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0478ff90 70527e56 70527a85 00150988 0478ffec 00140000
ntdll!ZwReplyWaitReceivePort
00003a98 00000000 00000000 00000000 00000000 00000000 rpcrt4!I_RpcAllocate

*----> Raw Stack Dump <----*
0478fe04 b4 7e 52 70 f0 08 00 00 - 74 ff 78 04 00 00 00 00
.~Rp....t.x.....
0478fe14 b0 2e 16 00 00 27 15 00 - 2c 48 14 00 34 48 14 00
.....'..,H..4H..
0478fe24 01 35 fa 77 00 00 00 00 - 00 00 00 00 0c ff 78 04
.5.w..........x.
0478fe34 e4 07 f9 77 d8 b1 f9 77 - fd d0 f6 77 c8 08 00 00
...w...w...w....
0478fe44 00 00 00 00 00 00 00 00 - 00 c0 fd 7f 00 f0 fd 7f
................
0478fe54 60 35 fa 77 00 00 00 00 - 00 00 00 00 00 00 00 00
`5.w............
0478fe64 00 00 00 00 01 00 00 00 - 02 00 00 00 00 00 00 00
................
0478fe74 00 00 00 00 02 00 00 00 - 36 2a 31 5f 00 00 30 5f
........6*1_..0_
0478fe84 02 00 00 00 00 00 00 00 - 68 cd 14 00 00 f0 fd 7f
........h.......
0478fe94 60 cd 14 00 d0 29 31 5f - 0d d2 f6 77 c8 08 00 00
`....)1_...w....
0478fea4 00 00 00 00 00 f0 fd 7f - 0d 75 f6 77 60 35 fa 77
.........u.w`5.w
0478feb4 44 12 f6 77 60 35 fa 77 - 4a 12 f6 77 30 ff 78 04
D..w`5.wJ..w0.x.
0478fec4 2c 00 00 00 b8 91 14 00 - 00 00 00 00 00 00 00 00
,...............
0478fed4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
0478fee4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
0478fef4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
0478ff04 c0 fe 78 04 00 00 00 00 - ff ff ff ff e4 07 f9 77
..x............w
0478ff14 b0 b0 f9 77 ff ff ff ff - 00 00 00 00 d3 68 f7 77
...w.........h.w
0478ff24 db 68 f7 77 30 ff 78 04 - 01 00 00 00 17 00 01 00
.h.w0.x.........
0478ff34 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................





[Non-text portions of this message have been removed]


_____

<http://click.egroups.com/1/7150/13/_/411782/_/964729789/>

<http://adimg.egroups.com/img/7150/13/_/411782/_/964729789/468x60new13.gif>

_____

We no longer allow attachments to files. To access/share Report Files,
please go to the following link: http://www.egroups.com/files/vantage/
<http://www.egroups.com/files/vantage/>
(Note: If this link does not work for you the first time you try it, go to
www.egroups.com, login and be sure to save your password, choose My Groups,
choose Vantage, then choose Files. If you save the password, the link above
will work the next time you try it.)




[Non-text portions of this message have been removed]
Hi,
I am not sure which group this particular error message belongs to. But I
need help. I am running v9.0B with a patch level p90b29. I get a strange
error whenever I compile my program.

It says :
An application error has occurred and an application error log is being
generated.
Prowin32.exe
Exception: access violation (0xc0000005), Address 0x10313d1f.

When I looked at the log file which is listed below. I have a full access to
all the directories and files including the ones in the subdirectories. Can
some one please help me in this situation as I need to get this resolved
ASAP.

I greatly appreciate your help on this matter.

Thank you very much. Have a nice day.
Laxmi.



Application exception occurred:
App: \\ruddles/i_90b_nt/90b/nt/patch/29c/work/rx.exe (pid=323)
When: 7/27/2000 @ 14:47:8.468
Exception number: c0000005 (access violation)

*----> System Information <----*
Computer Name: MONOLITH
User Name: laxmi
Number of Processors: 2
Processor Type: x86 Family 6 Model 1 Stepping 7
Windows Version: 4.0
Current Build: 1381
Current Type: Multiprocessor Free
Registered Organization: Bermo Inc.
Registered Owner: Bermo Inc.

*----> Task List <----*
0 Idle.exe
2 System.exe
26 SMSS.exe
34 CSRSS.exe
41 WINLOGON.exe
33 SERVICES.exe
49 LSASS.exe
72 SPOOLSS.exe
91 RPCSS.exe
67 msdtc.exe
116 admsrvc.exe
122 llssrv.exe
130 jre.exe
132 prosrvc.exe
139 PSTORES.exe
150 mstask.exe
156 TCPSVCS.exe
173 LSERVER.exe
185 WINS.exe
191 inetinfo.exe
198 TERMSRV.exe
83 jre.exe
293 NDDEAGNT.exe
275 EXPLORER.exe
307 PROMon.exe
320 LOADWC.exe
280 CSRSS.exe
351 prowin32.exe
310 CSRSS.exe
78 prowin32.exe
264 CSRSS.exe
405 WINLOGON.exe
431 NDDEAGNT.exe
443 EXPLORER.exe
341 PROMon.exe
481 LOADWC.exe
458 prowin32.exe
418 _mprosrv.exe
221 _mprshut.exe
147 _mprshut.exe
213 _mprshut.exe
525 CSRSS.exe
516 WINLOGON.exe
216 CSRSS.exe
412 WINLOGON.exe
416 CSRSS.exe
369 WINLOGON.exe
473 NDDEAGNT.exe
140 EXPLORER.exe
332 PROMon.exe
46 LOADWC.exe
323 prowin32.exe
477 DRWTSN32.exe
0 _Total.exe

(00400000 - 00404000) \\ruddles/i_90b_nt/90b/nt/patch/29c/work/rx.exe
(77f60000 - 77fbc000) dll\ntdll.dbg
(10000000 - 103bc000) \\ruddles/i_90b_nt/90b/nt/patch/29c/work/prow32.dll
(78000000 - 78040000)
(77ef0000 - 77f57000) dll\kernel32.dbg
(77e60000 - 77eb2000) dll\user32.dbg
(77ec0000 - 77eec000) dll\gdi32.dbg
(77da0000 - 77de4000) dll\advapi32.dbg
(70520000 - 70574000) dll\rpcrt4.dbg
(73940000 - 7394c000) dll\winsta.dbg
(776b0000 - 776b8000) dll\wsock32.dbg
(77690000 - 776a4000) dll\ws2_32.dbg
(77680000 - 77687000) dll\ws2help.dbg
(77d60000 - 77d93000) dll\comdlg32.dbg
(77c20000 - 77d60000) dll\shell32.dbg
(715a0000 - 71629000) COMCTL32.dbg
(777e0000 - 7781a000) dll\netapi32.dbg
(77820000 - 77829000) dll\NetRap.dbg
(777c0000 - 777cd000) dll\samlib.dbg
(77bb0000 - 77bcc000) drv\winspool.dbg
(5f400000 - 5f4f2000)
(77b00000 - 77baf000) dll\ole32.dbg
(65340000 - 653d2000) oleaut32.dbg
(77e00000 - 77e07000) dll\rpcltc1.dbg
(03ff0000 - 03ff0000)
(5f300000 - 5f329000) olepro32.dbg
(6c000000 - 6c02e000) riched32.DBG
(764e0000 - 764fd000) dll\imagehlp.dbg

State Dump for Thread Id 0x1b3

eax=00000000 ebx=00000000 ecx=00005c00 edx=00000000 esi=00000014
edi=0112e3a4
eip=10313d1f esp=0012eee8 ebp=0012ef00 iopl=0 nv up ei pl zr na po
nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000
efl=00000246


function: stpcmp
10313d05 8b4d08 mov ecx,[ebp+0x8]
ss:0141d906=00000000
10313d08 0fb609 movzx ecx,byte ptr [ecx]
ds:00005c00=??
10313d0b 03c1 add eax,ecx
10313d0d 668945fc mov [ebp-0x4],ax
ss:0141d907=0000
10313d11 8b4508 mov eax,[ebp+0x8]
ss:0141d906=00000000
10313d14 40 inc eax
10313d15 894508 mov [ebp+0x8],eax
ss:0141d906=00000000
10313d18 ebd6 jmp stpcmp+0x62 (10313cf0)
10313d1a eb1c jmp stpcmp+0xaa (10313d38)
10313d1c 8b4508 mov eax,[ebp+0x8]
ss:0141d906=00000000
FAULT ->10313d1f 0fb600 movzx eax,byte ptr [eax]
ds:00000000=??
10313d22 8b0ddc5b3810 mov ecx,[GlobalUptable (10385bdc)]
ds:10385bdc=004125f4
10313d28 660fb60401 movzx ax,byte ptr [ecx+eax]
ds:00000000=??
10313d2d 668945fc mov [ebp-0x4],ax
ss:0141d907=0000
10313d31 8b4508 mov eax,[ebp+0x8]
ss:0141d906=00000000
10313d34 40 inc eax
10313d35 894508 mov [ebp+0x8],eax
ss:0141d906=00000000
10313d38 833dacbb351000
ds:1035bbac=00411020
cmp dword ptr [pGlobCpAttrib
(1035bbac)],0x0
10313d3f 742c jz stpcmp+0xdf (10313d6d)
10313d41 a1acbb3510 mov eax,[pGlobCpAttrib (1035bbac)]
ds:1035bbac=00411020
10313d46 0fb74004 movzx eax,word ptr [eax+0x4]
ds:012eea07=0000
10313d4a 83e002 and eax,0x2

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0012ef00 10331bdd 00000000 0456bbc0 00000000 03f481f1 prow32!stpcmp
0012f544 10336fcb 03f04bf0 00000000 0112e3a4 7ffdebf8
prow32!smxrefWriteRunRefs
0012f6b8 10158acc 0012fa20 00e7c150 04555b18 0455e0d8 prow32!smsem
0012f6e8 10158446 0012fa20 03e70001 00e7c160 0455e060 prow32!crpsrch
0012fcb8 1015738a 04555b18 0000000c 03e70001 00e7c160 prow32!crpsrch
0012fd00 10156ba2 ffffffff 0012fd20 1015723f 00000000 prow32!crrun_entry
0012fd0c 1015723f 00000000 03e76918 00306d70 0012fdd0 prow32!rninterpret
0012fd20 102c55e7 00e7c170 0000000c 00000001 00e7c160 prow32!crrun_rcsv
0012fdd0 101692cf 04564114 04564114 03e768a8 04564114 prow32!rncmpile
0012fdf8 10156ba2 ffffffff 0012fe8c 101b41ec 00000000 prow32!rnexec_entry
0012fe04 101b41ec 00000000 00000000 0000000f 00000000 prow32!rninterpret
0012fe8c 100e6dcf 00000000 00000000 00000000 0012fec4
prow32!umeDispatchEvent
0012fec0 102a9b5c 00e8ca7c 0012fed8 1001bcbc 00000002 prow32!wwRunDispatcher

0012fecc 1001bcbc 00000002 0012ff08 100056e8 00413dcc prow32!iodispatch
0012fed8 100056e8 00413dcc 04568c00 045bd800 03f517f0 prow32!rnrq
0012ff08 10043eed 00000009 00410600 00000060 0012ff24 prow32!drmain
0012ff1c 00401008 0012ffc0 00401148 00400000 00000000 prow32!ProStartup
0012ff24 00401148 00400000 00000000 00143dde 00000001 rx!WinMain
0012ffc0 77f11be3 0112e3a4 77c25180 7ffdf000 c0000005 rx!WinMainCRTStartup
0012fff0 00000000 00401014 00000000 00000000 77fa5be0
kernel32!GetProcessPriorityBoost
00000000 00000000 00000000 00000000 00000000 00000000 rx!<nosymbols>

*----> Raw Stack Dump <----*
0012eee8 29 00 00 00 00 00 00 00 - 04 ef 12 00 00 00 00 00
)...............
0012eef8 00 5c 00 00 ac c6 59 04 - 44 f5 12 00 dd 1b 33 10
.\....Y.D.....3.
0012ef08 00 00 00 00 c0 bb 56 04 - 00 00 00 00 f1 81 f4 03
......V.........
0012ef18 f1 81 f4 03 34 d3 f4 03 - 34 d3 f4 03 00 00 00 00
....4...4.......
0012ef28 00 00 00 00 00 00 00 00 - d8 bb 56 04 00 00 00 00
..........V.....
0012ef38 f1 81 f4 03 00 00 00 00 - 00 00 00 00 08 20 f5 03 .............
..
0012ef48 08 20 f5 03 c4 1f f5 03 - c4 1f f5 03 00 00 00 00 .
..............
0012ef58 a8 f0 12 00 82 4d 33 10 - 54 f5 f4 03 60 91 56 04
.....M3.T...`.V.
0012ef68 51 00 00 00 b8 1f f5 03 - 00 00 00 00 24 1f f5 03
Q...........$...
0012ef78 6c 00 00 00 84 f3 12 00 - 63 67 23 10 00 46 f2 03
l.......cg#..F..
0012ef88 00 00 00 00 51 00 00 00 - 00 00 00 00 00 00 00 00
....Q...........
0012ef98 04 3e 00 00 74 ef 12 00 - 04 3e 00 00 b0 ff 12 00
.>..t....>......
0012efa8 90 1d f3 77 b0 36 f3 77 - b8 78 38 10 54 f5 f4 03
...w.6.w.x8.T...
0012efb8 54 f5 f4 03 54 00 00 00 - 00 00 00 00 51 00 00 00
T...T.......Q...
0012efc8 00 f1 12 00 37 f1 12 00 - e0 ef 12 00 ee aa 31 10
....7.........1.
0012efd8 c9 f1 12 00 03 00 00 00 - f4 ef 12 00 6e 61 31 10
............na1.
0012efe8 c8 f1 12 00 cb f1 12 00 - 00 00 00 00 20 f0 12 00 ............
...
0012eff8 f1 53 31 10 30 f0 12 00 - 1c f0 12 00 00 00 00 00
.S1.0...........
0012f008 30 f0 12 00 00 00 00 00 - 01 00 00 00 65 f0 12 00
0...........e...
0012f018 a4 e3 12 01 00 43 31 10 - dc 3f f3 03 20 00 00 00 .....C1..?..
...

State Dump for Thread Id 0x167

eax=1000aec0 ebx=00000000 ecx=03ce47bc edx=00000000 esi=03deff8c
edi=77f1343e
eip=77f679df esp=03deff78 ebp=03deff94 iopl=0 nv up ei pl nz na pe
nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000
efl=00000202


function: ZwDelayExecution
77f679d4 b827000000 mov eax,0x27
77f679d9 8d542404 lea edx,[esp+0x4]
ss:050de97f=????????
77f679dd cd2e int 2e
77f679df c20800 ret 0x8
77f679e2 8bc0 mov eax,eax

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
03deff94 77f13449 000003e8 00000000 1000affc 000003e8 ntdll!ZwDelayExecution

77f1380e 006a20ec 6afc458d 0c6a5004 15fffe6a 77f321a4 kernel32!Sleep

*----> Raw Stack Dump <----*
03deff78 80 34 f1 77 00 00 00 00 - 8c ff de 03 30 02 41 00
.4.w........0.A.
03deff88 00 00 00 00 80 69 67 ff - ff ff ff ff 0e 38 f1 77
.....ig......8.w
03deff98 49 34 f1 77 e8 03 00 00 - 00 00 00 00 fc af 00 10
I4.w............
03deffa8 e8 03 00 00 20 fc 12 00 - bc 47 ce 03 ec ff de 03 ....
....G......
03deffb8 30 02 41 00 a2 4f ef 77 - 7c 08 00 00 20 fc 12 00 0.A..O.w|...
...
03deffc8 bc 47 ce 03 30 02 41 00 - bc 47 ce 03 c4 ff de 03
.G..0.A..G......
03deffd8 20 d4 2f 10 ff ff ff ff - 90 1d f3 77 a8 3f f3 77
./........w.?.w
03deffe8 00 00 00 00 00 00 00 00 - 00 00 00 00 c0 ae 00 10
................
03defff8 30 02 41 00 00 00 00 00 - 07 00 00 00 02 01 00 00
0.A.............
03df0008 ee ff ee ff 00 00 00 00 - 00 00 30 00 00 60 09 00
..........0..`..
03df0018 00 00 df 03 00 02 00 00 - 38 00 df 03 00 00 ff 03
........8.......
03df0028 ac 00 00 00 03 00 00 00 - d8 04 30 00 00 00 00 00
..........0.....
03df0038 07 10 07 00 02 01 08 00 - 00 00 00 00 04 80 00 00
................
03df0048 68 80 df 03 68 04 f6 00 - 00 00 00 00 00 00 00 00
h...h...........
03df0058 00 00 00 00 25 00 00 00 - b4 5d 41 00 00 00 00 00
....%....]A.....
03df0068 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
03df0078 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
03df0088 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
03df0098 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
03df00a8 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................

State Dump for Thread Id 0x1cf

eax=70527b10 ebx=00000000 ecx=0012f278 edx=00000000 esi=0014482c
edi=00150988
eip=77f681cf esp=0478fe04 ebp=0478ff90 iopl=0 nv up ei pl nz ac pe
nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000
efl=00000212


function: ZwReplyWaitReceivePort
77f681c4 b890000000 mov eax,0x90
77f681c9 8d542404 lea edx,[esp+0x4]
ss:05a7e80b=????????
77f681cd cd2e int 2e
77f681cf c21000 ret 0x10
77f681d2 8bc0 mov eax,eax

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0478ff90 70527e56 70527a85 00150988 0478ffec 00140000
ntdll!ZwReplyWaitReceivePort
00003a98 00000000 00000000 00000000 00000000 00000000 rpcrt4!I_RpcAllocate

*----> Raw Stack Dump <----*
0478fe04 b4 7e 52 70 f0 08 00 00 - 74 ff 78 04 00 00 00 00
.~Rp....t.x.....
0478fe14 b0 2e 16 00 00 27 15 00 - 2c 48 14 00 34 48 14 00
.....'..,H..4H..
0478fe24 01 35 fa 77 00 00 00 00 - 00 00 00 00 0c ff 78 04
.5.w..........x.
0478fe34 e4 07 f9 77 d8 b1 f9 77 - fd d0 f6 77 c8 08 00 00
...w...w...w....
0478fe44 00 00 00 00 00 00 00 00 - 00 c0 fd 7f 00 f0 fd 7f
................
0478fe54 60 35 fa 77 00 00 00 00 - 00 00 00 00 00 00 00 00
`5.w............
0478fe64 00 00 00 00 01 00 00 00 - 02 00 00 00 00 00 00 00
................
0478fe74 00 00 00 00 02 00 00 00 - 36 2a 31 5f 00 00 30 5f
........6*1_..0_
0478fe84 02 00 00 00 00 00 00 00 - 68 cd 14 00 00 f0 fd 7f
........h.......
0478fe94 60 cd 14 00 d0 29 31 5f - 0d d2 f6 77 c8 08 00 00
`....)1_...w....
0478fea4 00 00 00 00 00 f0 fd 7f - 0d 75 f6 77 60 35 fa 77
.........u.w`5.w
0478feb4 44 12 f6 77 60 35 fa 77 - 4a 12 f6 77 30 ff 78 04
D..w`5.wJ..w0.x.
0478fec4 2c 00 00 00 b8 91 14 00 - 00 00 00 00 00 00 00 00
,...............
0478fed4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
0478fee4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
0478fef4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
0478ff04 c0 fe 78 04 00 00 00 00 - ff ff ff ff e4 07 f9 77
..x............w
0478ff14 b0 b0 f9 77 ff ff ff ff - 00 00 00 00 d3 68 f7 77
...w.........h.w
0478ff24 db 68 f7 77 30 ff 78 04 - 01 00 00 00 17 00 01 00
.h.w0.x.........
0478ff34 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................





[Non-text portions of this message have been removed]
Hi,
I am not sure which group this particular error message
belongs to. But I need help. I am running v9.0B with a patch level p90b29. I
get a strange error whenever I compile my program.

It says :
An application error has occurred and an application error
log is being generated.
Prowin32.exe
Exception: access violation (0xc0000005), Address
0x10313d1f.

When I looked at the log file which is listed below. I have
a full access to all the directories and files including the ones in the
subdirectories. Can some one please help me in this situation as I need to
get this resolved ASAP.

I greatly appreciate your help on this matter.

Thank you very much. Have a nice day.
Laxmi.



Application exception occurred:
App: \\ruddles/i_90b_nt/90b/nt/patch/29c/work/rx.exe
(pid=323)
When: 7/27/2000 @ 14:47:8.468
Exception number: c0000005 (access violation)

*----> System Information <----*
Computer Name: MONOLITH
User Name: laxmi
Number of Processors: 2
Processor Type: x86 Family 6 Model 1 Stepping 7
Windows Version: 4.0
Current Build: 1381
Current Type: Multiprocessor Free
Registered Organization: Bermo Inc.
Registered Owner: Bermo Inc.

*----> Task List <----*
0 Idle.exe
2 System.exe
26 SMSS.exe
34 CSRSS.exe
41 WINLOGON.exe
33 SERVICES.exe
49 LSASS.exe
72 SPOOLSS.exe
91 RPCSS.exe
67 msdtc.exe
116 admsrvc.exe
122 llssrv.exe
130 jre.exe
132 prosrvc.exe
139 PSTORES.exe
150 mstask.exe
156 TCPSVCS.exe
173 LSERVER.exe
185 WINS.exe
191 inetinfo.exe
198 TERMSRV.exe
83 jre.exe
293 NDDEAGNT.exe
275 EXPLORER.exe
307 PROMon.exe
320 LOADWC.exe
280 CSRSS.exe
351 prowin32.exe
310 CSRSS.exe
78 prowin32.exe
264 CSRSS.exe
405 WINLOGON.exe
431 NDDEAGNT.exe
443 EXPLORER.exe
341 PROMon.exe
481 LOADWC.exe
458 prowin32.exe
418 _mprosrv.exe
221 _mprshut.exe
147 _mprshut.exe
213 _mprshut.exe
525 CSRSS.exe
516 WINLOGON.exe
216 CSRSS.exe
412 WINLOGON.exe
416 CSRSS.exe
369 WINLOGON.exe
473 NDDEAGNT.exe
140 EXPLORER.exe
332 PROMon.exe
46 LOADWC.exe
323 prowin32.exe
477 DRWTSN32.exe
0 _Total.exe

(00400000 - 00404000)
\\ruddles/i_90b_nt/90b/nt/patch/29c/work/rx.exe
(77f60000 - 77fbc000) dll\ntdll.dbg
(10000000 - 103bc000)
\\ruddles/i_90b_nt/90b/nt/patch/29c/work/prow32.dll
(78000000 - 78040000)
(77ef0000 - 77f57000) dll\kernel32.dbg
(77e60000 - 77eb2000) dll\user32.dbg
(77ec0000 - 77eec000) dll\gdi32.dbg
(77da0000 - 77de4000) dll\advapi32.dbg
(70520000 - 70574000) dll\rpcrt4.dbg
(73940000 - 7394c000) dll\winsta.dbg
(776b0000 - 776b8000) dll\wsock32.dbg
(77690000 - 776a4000) dll\ws2_32.dbg
(77680000 - 77687000) dll\ws2help.dbg
(77d60000 - 77d93000) dll\comdlg32.dbg
(77c20000 - 77d60000) dll\shell32.dbg
(715a0000 - 71629000) COMCTL32.dbg
(777e0000 - 7781a000) dll\netapi32.dbg
(77820000 - 77829000) dll\NetRap.dbg
(777c0000 - 777cd000) dll\samlib.dbg
(77bb0000 - 77bcc000) drv\winspool.dbg
(5f400000 - 5f4f2000)
(77b00000 - 77baf000) dll\ole32.dbg
(65340000 - 653d2000) oleaut32.dbg
(77e00000 - 77e07000) dll\rpcltc1.dbg
(03ff0000 - 03ff0000)
(5f300000 - 5f329000) olepro32.dbg
(6c000000 - 6c02e000) riched32.DBG
(764e0000 - 764fd000) dll\imagehlp.dbg

State Dump for Thread Id 0x1b3

eax=00000000 ebx=00000000 ecx=00005c00 edx=00000000
esi=00000014 edi=0112e3a4
eip=10313d1f esp=0012eee8 ebp=0012ef00 iopl=0 nv up
ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000
efl=00000246


function: stpcmp
10313d05 8b4d08 mov ecx,[ebp+0x8]
ss:0141d906=00000000
10313d08 0fb609 movzx ecx,byte ptr [ecx]
ds:00005c00=??
10313d0b 03c1 add eax,ecx
10313d0d 668945fc mov [ebp-0x4],ax
ss:0141d907=0000
10313d11 8b4508 mov eax,[ebp+0x8]
ss:0141d906=00000000
10313d14 40 inc eax
10313d15 894508 mov [ebp+0x8],eax
ss:0141d906=00000000
10313d18 ebd6 jmp stpcmp+0x62
(10313cf0)
10313d1a eb1c jmp stpcmp+0xaa
(10313d38)
10313d1c 8b4508 mov eax,[ebp+0x8]
ss:0141d906=00000000
FAULT ->10313d1f 0fb600 movzx eax,byte ptr [eax]
ds:00000000=??
10313d22 8b0ddc5b3810 mov ecx,[GlobalUptable
(10385bdc)] ds:10385bdc=004125f4
10313d28 660fb60401 movzx ax,byte ptr
[ecx+eax] ds:00000000=??
10313d2d 668945fc mov [ebp-0x4],ax
ss:0141d907=0000
10313d31 8b4508 mov eax,[ebp+0x8]
ss:0141d906=00000000
10313d34 40 inc eax
10313d35 894508 mov [ebp+0x8],eax
ss:0141d906=00000000
10313d38 833dacbb351000
ds:1035bbac=00411020
cmp dword ptr
[pGlobCpAttrib (1035bbac)],0x0
10313d3f 742c jz stpcmp+0xdf
(10313d6d)
10313d41 a1acbb3510 mov eax,[pGlobCpAttrib
(1035bbac)] ds:1035bbac=00411020
10313d46 0fb74004 movzx eax,word ptr
[eax+0x4] ds:012eea07=0000
10313d4a 83e002 and eax,0x2

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4
Function Name
0012ef00 10331bdd 00000000 0456bbc0 00000000 03f481f1
prow32!stpcmp
0012f544 10336fcb 03f04bf0 00000000 0112e3a4 7ffdebf8
prow32!smxrefWriteRunRefs
0012f6b8 10158acc 0012fa20 00e7c150 04555b18 0455e0d8
prow32!smsem
0012f6e8 10158446 0012fa20 03e70001 00e7c160 0455e060
prow32!crpsrch
0012fcb8 1015738a 04555b18 0000000c 03e70001 00e7c160
prow32!crpsrch
0012fd00 10156ba2 ffffffff 0012fd20 1015723f 00000000
prow32!crrun_entry
0012fd0c 1015723f 00000000 03e76918 00306d70 0012fdd0
prow32!rninterpret
0012fd20 102c55e7 00e7c170 0000000c 00000001 00e7c160
prow32!crrun_rcsv
0012fdd0 101692cf 04564114 04564114 03e768a8 04564114
prow32!rncmpile
0012fdf8 10156ba2 ffffffff 0012fe8c 101b41ec 00000000
prow32!rnexec_entry
0012fe04 101b41ec 00000000 00000000 0000000f 00000000
prow32!rninterpret
0012fe8c 100e6dcf 00000000 00000000 00000000 0012fec4
prow32!umeDispatchEvent
0012fec0 102a9b5c 00e8ca7c 0012fed8 1001bcbc 00000002
prow32!wwRunDispatcher
0012fecc 1001bcbc 00000002 0012ff08 100056e8 00413dcc
prow32!iodispatch
0012fed8 100056e8 00413dcc 04568c00 045bd800 03f517f0
prow32!rnrq
0012ff08 10043eed 00000009 00410600 00000060 0012ff24
prow32!drmain
0012ff1c 00401008 0012ffc0 00401148 00400000 00000000
prow32!ProStartup
0012ff24 00401148 00400000 00000000 00143dde 00000001
rx!WinMain
0012ffc0 77f11be3 0112e3a4 77c25180 7ffdf000 c0000005
rx!WinMainCRTStartup
0012fff0 00000000 00401014 00000000 00000000 77fa5be0
kernel32!GetProcessPriorityBoost
00000000 00000000 00000000 00000000 00000000 00000000
rx!<nosymbols>

*----> Raw Stack Dump <----*
0012eee8 29 00 00 00 00 00 00 00 - 04 ef 12 00 00 00 00 00
)...............
0012eef8 00 5c 00 00 ac c6 59 04 - 44 f5 12 00 dd 1b 33 10
.\....Y.D.....3.
0012ef08 00 00 00 00 c0 bb 56 04 - 00 00 00 00 f1 81 f4 03
......V.........
0012ef18 f1 81 f4 03 34 d3 f4 03 - 34 d3 f4 03 00 00 00 00
....4...4.......
0012ef28 00 00 00 00 00 00 00 00 - d8 bb 56 04 00 00 00 00
..........V.....
0012ef38 f1 81 f4 03 00 00 00 00 - 00 00 00 00 08 20 f5 03
............. ..
0012ef48 08 20 f5 03 c4 1f f5 03 - c4 1f f5 03 00 00 00 00
. ..............
0012ef58 a8 f0 12 00 82 4d 33 10 - 54 f5 f4 03 60 91 56 04
.....M3.T...`.V.
0012ef68 51 00 00 00 b8 1f f5 03 - 00 00 00 00 24 1f f5 03
Q...........$...
0012ef78 6c 00 00 00 84 f3 12 00 - 63 67 23 10 00 46 f2 03
l.......cg#..F..
0012ef88 00 00 00 00 51 00 00 00 - 00 00 00 00 00 00 00 00
....Q...........
0012ef98 04 3e 00 00 74 ef 12 00 - 04 3e 00 00 b0 ff 12 00
.>..t....>......
0012efa8 90 1d f3 77 b0 36 f3 77 - b8 78 38 10 54 f5 f4 03
...w.6.w.x8.T...
0012efb8 54 f5 f4 03 54 00 00 00 - 00 00 00 00 51 00 00 00
T...T.......Q...
0012efc8 00 f1 12 00 37 f1 12 00 - e0 ef 12 00 ee aa 31 10
....7.........1.
0012efd8 c9 f1 12 00 03 00 00 00 - f4 ef 12 00 6e 61 31 10
............na1.
0012efe8 c8 f1 12 00 cb f1 12 00 - 00 00 00 00 20 f0 12 00
............ ...
0012eff8 f1 53 31 10 30 f0 12 00 - 1c f0 12 00 00 00 00 00
.S1.0...........
0012f008 30 f0 12 00 00 00 00 00 - 01 00 00 00 65 f0 12 00
0...........e...
0012f018 a4 e3 12 01 00 43 31 10 - dc 3f f3 03 20 00 00 00
.....C1..?.. ...

State Dump for Thread Id 0x167

eax=1000aec0 ebx=00000000 ecx=03ce47bc edx=00000000
esi=03deff8c edi=77f1343e
eip=77f679df esp=03deff78 ebp=03deff94 iopl=0 nv up
ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000
efl=00000202


function: ZwDelayExecution
77f679d4 b827000000 mov eax,0x27
77f679d9 8d542404 lea edx,[esp+0x4]
ss:050de97f=????????
77f679dd cd2e int 2e
77f679df c20800 ret 0x8
77f679e2 8bc0 mov eax,eax

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4
Function Name
03deff94 77f13449 000003e8 00000000 1000affc 000003e8
ntdll!ZwDelayExecution
77f1380e 006a20ec 6afc458d 0c6a5004 15fffe6a 77f321a4
kernel32!Sleep

*----> Raw Stack Dump <----*
03deff78 80 34 f1 77 00 00 00 00 - 8c ff de 03 30 02 41 00
.4.w........0.A.
03deff88 00 00 00 00 80 69 67 ff - ff ff ff ff 0e 38 f1 77
.....ig......8.w
03deff98 49 34 f1 77 e8 03 00 00 - 00 00 00 00 fc af 00 10
I4.w............
03deffa8 e8 03 00 00 20 fc 12 00 - bc 47 ce 03 ec ff de 03
.... ....G......
03deffb8 30 02 41 00 a2 4f ef 77 - 7c 08 00 00 20 fc 12 00
0.A..O.w|... ...
03deffc8 bc 47 ce 03 30 02 41 00 - bc 47 ce 03 c4 ff de 03
.G..0.A..G......
03deffd8 20 d4 2f 10 ff ff ff ff - 90 1d f3 77 a8 3f f3 77
./........w.?.w
03deffe8 00 00 00 00 00 00 00 00 - 00 00 00 00 c0 ae 00 10
................
03defff8 30 02 41 00 00 00 00 00 - 07 00 00 00 02 01 00 00
0.A.............
03df0008 ee ff ee ff 00 00 00 00 - 00 00 30 00 00 60 09 00
..........0..`..
03df0018 00 00 df 03 00 02 00 00 - 38 00 df 03 00 00 ff 03
........8.......
03df0028 ac 00 00 00 03 00 00 00 - d8 04 30 00 00 00 00 00
..........0.....
03df0038 07 10 07 00 02 01 08 00 - 00 00 00 00 04 80 00 00
................
03df0048 68 80 df 03 68 04 f6 00 - 00 00 00 00 00 00 00 00
h...h...........
03df0058 00 00 00 00 25 00 00 00 - b4 5d 41 00 00 00 00 00
....%....]A.....
03df0068 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
03df0078 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
03df0088 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
03df0098 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
03df00a8 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................

State Dump for Thread Id 0x1cf

eax=70527b10 ebx=00000000 ecx=0012f278 edx=00000000
esi=0014482c edi=00150988
eip=77f681cf esp=0478fe04 ebp=0478ff90 iopl=0 nv up
ei pl nz ac pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000
efl=00000212


function: ZwReplyWaitReceivePort
77f681c4 b890000000 mov eax,0x90
77f681c9 8d542404 lea edx,[esp+0x4]
ss:05a7e80b=????????
77f681cd cd2e int 2e
77f681cf c21000 ret 0x10
77f681d2 8bc0 mov eax,eax

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4
Function Name
0478ff90 70527e56 70527a85 00150988 0478ffec 00140000
ntdll!ZwReplyWaitReceivePort
00003a98 00000000 00000000 00000000 00000000 00000000
rpcrt4!I_RpcAllocate

*----> Raw Stack Dump <----*
0478fe04 b4 7e 52 70 f0 08 00 00 - 74 ff 78 04 00 00 00 00
.~Rp....t.x.....
0478fe14 b0 2e 16 00 00 27 15 00 - 2c 48 14 00 34 48 14 00
.....'..,H..4H..
0478fe24 01 35 fa 77 00 00 00 00 - 00 00 00 00 0c ff 78 04
.5.w..........x.
0478fe34 e4 07 f9 77 d8 b1 f9 77 - fd d0 f6 77 c8 08 00 00
...w...w...w....
0478fe44 00 00 00 00 00 00 00 00 - 00 c0 fd 7f 00 f0 fd 7f
................
0478fe54 60 35 fa 77 00 00 00 00 - 00 00 00 00 00 00 00 00
`5.w............
0478fe64 00 00 00 00 01 00 00 00 - 02 00 00 00 00 00 00 00
................
0478fe74 00 00 00 00 02 00 00 00 - 36 2a 31 5f 00 00 30 5f
........6*1_..0_
0478fe84 02 00 00 00 00 00 00 00 - 68 cd 14 00 00 f0 fd 7f
........h.......
0478fe94 60 cd 14 00 d0 29 31 5f - 0d d2 f6 77 c8 08 00 00
`....)1_...w....
0478fea4 00 00 00 00 00 f0 fd 7f - 0d 75 f6 77 60 35 fa 77
.........u.w`5.w
0478feb4 44 12 f6 77 60 35 fa 77 - 4a 12 f6 77 30 ff 78 04
D..w`5.wJ..w0.x.
0478fec4 2c 00 00 00 b8 91 14 00 - 00 00 00 00 00 00 00 00
,...............
0478fed4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
0478fee4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
0478fef4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
0478ff04 c0 fe 78 04 00 00 00 00 - ff ff ff ff e4 07 f9 77
..x............w
0478ff14 b0 b0 f9 77 ff ff ff ff - 00 00 00 00 d3 68 f7 77
...w.........h.w
0478ff24 db 68 f7 77 30 ff 78 04 - 01 00 00 00 17 00 01 00
.h.w0.x.........
0478ff34 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................





[Non-text portions of this message have been removed]