HTTrack Website Copier
Free software offline browser - FORUM
Subject: Re: Crash while mirroring site
Author: Kai Middleton
Date: 03/05/2004 19:07
 
I'm also getting a crash with a large site with the latest 
version of httrack, 3.30.  I just downloaded the beta and 
will try it as a recent forum message indicates there's a 
probable fix.  

I'm running win2K and I simply get a message from windows 
saying the program has crashed.  Below is a Dr. Watson 
dump.  The program tends to run for a couple hours then 
dies.  It has done this about five times.  The site I'm 
trying to mirror is 
<http://www.grafitti.org>

Here's the log:
Application exception occurred:
        App:  (pid=1784)
        When: 3/5/2004 @ 01:17:23.146
        Exception number: c0000005 (access violation)

*----> System Information <----*
        Computer Name: MONOLITH
        User Name: Kai Middleton
        Number of Processors: 1
        Processor Type: x86 Family 6 Model 6 Stepping 2
        Windows 2000 Version: 5.0
        Current Build: 2195
        Service Pack: 4
        Current Type: Uniprocessor Free
        Registered Organization: 
        Registered Owner: Kai Middleton

*----> Task List <----*
   0 Idle.exe
   8 System.exe
 152 SMSS.exe
 180 CSRSS.exe
 200 WINLOGON.exe
 228 SERVICES.exe
 248 LSASS.exe
 516 svchost.exe
 556 spoolsv.exe
 584 ati2evxx.exe
 624 avgserv.exe
 636 Ctsvccda.exe
 652 svchost.exe
 672 gearsec.exe
 796 mysqld-max-nt.e.exe
 732 NAVAPSVC.exe
 872 regsvc.exe
 896 mstask.exe
 940 stisvc.exe
1012 vsmon.exe
 604 explorer.exe
 712 WinMgmt.exe
 776 MsPMSPSv.exe
1080 svchost.exe
 756 ggviewer67-89.e.exe
1336 devldr32.exe
1420 ahqtb.exe
1468 avgcc32.exe
1508 winampa.exe
1516 Hpi_monitor.exe
1524 hpgs2wnd.exe
1532 NAVAPW32.exe
1544 hpgs2wnf.exe
1572 InCD.exe
1600 jusched.exe
1612 iTunesHelper.ex.exe
1608 qttask.exe
1644 zlclient.exe
1656 iPodService.exe
1688 grubgui.exe
1696 mozilla.exe
1724 achron.exe
1816 soffice.exe
1460 TASKMGR.exe
1784 WinHTTrack.exe
  92 DRWTSN32.exe
   0 _Total.exe

(00400000 - 004F8000) 
(77F80000 - 77FFB000) 
(75050000 - 75058000) 
(7C570000 - 7C623000) 
(75030000 - 75044000) 
(78000000 - 78045000) 
(7C2D0000 - 7C332000) 
(77D30000 - 77D9E000) 
(75020000 - 75028000) 
(10000000 - 100CC000) 
(6C1E0000 - 6C2D2000) 
(77F40000 - 77F79000) 
(77E10000 - 77E6F000) 
(782F0000 - 78538000) 
(70A70000 - 70AD5000) 
(71710000 - 71794000) 
(77A50000 - 77B3C000) 
(75E60000 - 75E7A000) 
(00900000 - 00911000) 
(74FA0000 - 74FC7000) 
(00920000 - 00946000) 
(00950000 - 009F9000) 
(00A00000 - 00A15000) 
(779B0000 - 77A4B000) 
(775A0000 - 77626000) 
(77840000 - 7787E000) 
(770C0000 - 770E3000) 
(76B30000 - 76B6E000) 
(782C0000 - 782CC000) 
(77980000 - 779A4000) 
(77340000 - 77353000) 
(77520000 - 77525000) 
(77320000 - 77337000) 
(75150000 - 7515F000) 
(75170000 - 751BF000) 
(7C340000 - 7C34F000) 
(751C0000 - 751C6000) 
(77950000 - 7797A000) 
(773B0000 - 773DF000) 
(77380000 - 773A3000) 
(77830000 - 7783E000) 
(77880000 - 7790E000) 
(7C0F0000 - 7C151000) 
(774E0000 - 77513000) 
(774C0000 - 774D1000) 
(77530000 - 77552000) 
(77360000 - 77379000) 
(777E0000 - 777E8000) 
(777F0000 - 777F5000) 
(74FD0000 - 74FEE000) 
(75010000 - 75017000) 

State Dump for Thread Id 0x710

eax=6c272cfe ebx=00000000 ecx=40000000 edx=00000000 
esi=004ba8b4 edi=004ba8b4
eip=77e580ff esp=0012fea4 ebp=0012fec4 iopl=0         nv up 
ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=0038  
gs=0000             efl=00000246


function: GetMenuItemRect
        77e580e6 b899110000       mov     eax,0x1199
        77e580eb 8d542404         lea     edx,
[esp+0x4]          ss:00c29d8b=????????        77e580ef cd2e             int    
2e
        77e580f1 c21000           ret     0x10
        77e580f4 b89a110000       mov     eax,0x119a
        77e580f9 8d542404         lea     edx,
[esp+0x4]          ss:00c29d8b=????????        77e580fd cd2e             int    
2e
        77e580ff c21000           ret     0x10

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  
Function Name
0012FEC4 6C1E11A7 004BA8B4 00000000 00000000 00000000 
user32!GetMenuItemRect 
004BA8B4 00000113 00000113 00000000 002EDF3F 0000018F !
Ordinal5307 

*----> Raw Stack Dump <----*
0012fea4  6f 69 e1 77 b4 a8 4b 00 - 00 00 00 00 00 00 00 
00  oi.w..K.........
0012feb4  00 00 00 00 00 00 00 00 - 80 a8 4b 00 b4 a8 4b 
00  ..........K...K.
0012fec4  b4 a8 4b 00 a7 11 1e 6c - b4 a8 4b 00 00 00 00 
00  ..K....l..K.....
0012fed4  00 00 00 00 00 00 00 00 - 00 00 00 00 80 a8 4b 
00  ..............K.
0012fee4  a4 91 1e 6c 80 a8 4b 00 - 80 a8 4b 00 c0 ff 12 
00  ...l..K...K.....
0012fef4  ff ff ff ff 02 00 00 00 - 54 91 1e 6c 80 a8 4b 
00  ........T..l..K.
0012ff04  fe b4 1e 6c 00 00 00 00 - a5 a3 17 00 00 00 00 
00  ...l............
0012ff14  85 30 45 00 00 00 40 00 - 00 00 00 00 a5 a3 17 
00  .0E...@.........
0012ff24  01 00 00 00 06 30 45 00 - 00 00 40 00 00 00 00 
00  .....0E...@.....
0012ff34  a5 a3 17 00 01 00 00 00 - 00 00 00 00 00 00 00 
00  ................
0012ff44  00 f0 fd 7f 10 2f 06 80 - a5 a3 17 00 a0 3e 2f 
00  ...../.......>/.
0012ff54  00 00 00 00 00 00 f8 77 - a8 2b 2f 00 01 00 00 
00  .......w.+/.....
0012ff64  44 00 00 00 a8 ad 17 00 - b8 ad 17 00 d0 ad 17 
00  D...............
0012ff74  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 
00  ................
0012ff84  00 00 00 00 00 00 00 00 - 00 00 00 00 01 0c 00 
00  ................
0012ff94  01 00 00 00 00 00 00 00 - 00 00 00 00 01 00 01 
00  ................
0012ffa4  00 00 00 00 3c ff 12 00 - 00 00 00 00 e0 ff 12 
00  ....<...........
0012ffb4  36 30 45 00 00 dd 45 00 - 00 00 00 00 f0 ff 12 
00  60E...E.........
0012ffc4  e7 87 59 7c 00 00 00 00 - 00 00 00 00 00 f0 fd 
7f  ..Y|............
0012ffd4  00 00 00 00 c8 ff 12 00 - 00 00 00 00 ff ff ff 
ff  ................

State Dump for Thread Id 0x604

eax=00000000 ebx=00000014 ecx=000000c0 edx=00000000 
esi=77f89153 edi=0139be6c
eip=77f8915e esp=0139be58 ebp=0139be74 iopl=0         nv up 
ei pl nz na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=0038  
gs=0000             efl=00000206


function: ZwDelayExecution
        77f89153 b832000000       mov     eax,0x32
        77f89158 8d542404         lea     edx,
[esp+0x4]          ss:01e95d3f=726f2e69
        77f8915c cd2e             int     2e
        77f8915e c20800           ret     0x8

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  
Function Name
0139BE74 7C59A0B8 00000064 00000000 0043CA37 00000064 ntdll!
ZwDelayExecution 
78020FAB 74FF0C24 84E80C24 83FFFFFF 55C30CC4 FF6AEC8B 
kernel32!Sleep 
74FF406A 00000000 00000000 00000000 00000000 00000000 
<nosymbols> 

*----> Raw Stack Dump <----*
0139be58  ed a0 59 7c 00 00 00 00 - 6c be 39 01 4d f2 00 
78  ..Y|....l.9.M..x
0139be68  ad a0 59 7c c0 bd f0 ff - ff ff ff ff ab 0f 02 
78  ..Y|...........x
0139be78  b8 a0 59 7c 64 00 00 00 - 00 00 00 00 37 ca 43 
00  ..Y|d.......7.C.
0139be88  64 00 00 00 dc f4 12 00 - 00 00 00 00 7c ff 3a 
01  d...........|.:.
0139be98  54 01 00 00 01 00 00 00 - 00 00 00 00 00 00 00 
00  T...............
0139bea8  00 00 00 00 00 00 00 00 - 14 00 00 00 bc df 39 
01  ..............9.
0139beb8  63 3a 5c 70 61 67 65 73 - 5c 67 72 61 66 69 74 
74  c:\pages\grafitt
0139bec8  69 5c 00 00 00 00 00 00 - 00 00 00 00 00 00 00 
00  i\..............
0139bed8  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 
00  ................
0139bee8  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 
00  ................
0139bef8  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 
00  ................
0139bf08  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 
00  ................
0139bf18  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 
00  ................
0139bf28  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 
00  ................
0139bf38  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 
00  ................
0139bf48  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 
00  ................
0139bf58  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 
00  ................
0139bf68  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 
00  ................
0139bf78  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 
00  ................
0139bf88  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 
00  ................

State Dump for Thread Id 0x408

eax=04bbf524 ebx=00018a34 ecx=04bbf524 edx=014b0048 
esi=014609b0 edi=2497add7
eip=100367de esp=014455ac ebp=014455bc iopl=0         nv up 
ei pl nz ac pe cy
cs=001b  ss=0023  ds=0023  es=0023  fs=0038  
gs=0000             efl=00000213


function: <nosymbols>
        100367c2 8d8496d43a0100   lea    eax,
[esi+edx*4+0x13ad4] ds:014c3b1c=03e6d51c
        100367c9 7504             jnz     hts_main+0x1a87f 
(1003f2cf)
        100367cb 8bc8             mov     ecx,eax
        100367cd eb20             jmp     hts_main+0x1a89f 
(1003f2ef)
        100367cf 8b16             mov     edx,
[esi]              ds:014609b0=014b0048
        100367d1 8b048a           mov     eax,
[edx+ecx*4]        ds:04bbf524=00000000
        100367d4 8b4038           mov     eax,
[eax+0x38]         ds:056b940a=????????        100367d7 83f8ff           cmp    
eax,0xff
        100367da 740d             jz      hts_main+0x1a899 
(1003f2e9)
        100367dc 8bc8             mov     ecx,eax
FAULT ->100367de 8b048a           mov     eax,
[edx+ecx*4]        ds:04bbf524=00000000
        100367e1 8b4038           mov     eax,
[eax+0x38]         ds:056b940a=????????        100367e4 83f8ff           cmp    
eax,0xff
        100367e7 75f3             jnz     hts_main+0x1a98c 
(1003f3dc)
        100367e9 8b0c8a           mov     ecx,
[edx+ecx*4]        ds:04bbf524=00000000
        100367ec 83c138           add     ecx,0x38
        100367ef 8919             mov     
[ecx],ebx              ds:04bbf524=00000000
        100367f1 8b0e             mov     ecx,
[esi]              ds:014609b0=014b0048
        100367f3 8b0499           mov     eax,
[ecx+ebx*4]        ds:00018a34=????????        100367f6 8b482c           mov    
ecx,
[eax+0x2c]         ds:056b940a=????????        100367f9 85c9             test   
ecx,ecx
        100367fb 0f848a000000     je      hts_main+0x11e3b 
(1003688b)

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  
Function Name
014455BC 74617473 2F6E6F69 6167616D 656E697A 67616D2F !
hts_main 
646E652F 00000000 00000000 00000000 00000000 00000000 
<nosymbols> 

*----> Raw Stack Dump <----*
014455ac  cc 9b bc 04 8c 73 8e 04 - 48 00 4b 01 c8 8f 44 
01  .....s..H.K...D.
014455bc  2f 65 6e 64 73 74 61 74 - 69 6f 6e 2f 6d 61 67 
61  /endstation/maga
014455cc  7a 69 6e 65 2f 6d 61 67 - 32 2f 70 69 65 63 65 
73  zine/mag2/pieces
014455dc  2f 77 61 72 7a 2d 6b 6f - 62 6f 6c 74 31 2e 6a 
70  /warz-kobolt1.jp
014455ec  67 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 
00  g...............
014455fc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 
00  ................
0144560c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 
00  ................
0144561c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 
00  ................
0144562c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 
00  ................
0144563c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 
00  ................
0144564c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 
00  ................
0144565c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 
00  ................
0144566c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 
00  ................
0144567c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 
00  ................
0144568c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 
00  ................
0144569c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 
00  ................
014456ac  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 
00  ................
014456bc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 
00  ................
014456cc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 
00  ................
014456dc  0c 57 44 01 00 00 00 00 - 64 99 f8 77 00 00 13 
00  .WD.....d..w....

State Dump for Thread Id 0xec

eax=778321fe ebx=00000004 ecx=0000004c edx=00000000 
esi=77f93233 edi=00000004
eip=77f9323e esp=04d9fd24 ebp=04d9fd70 iopl=0         nv up 
ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=0038  
gs=0000             efl=00000246


function: NtWaitForMultipleObjects
        77f93233 b8e9000000       mov     eax,0xe9
        77f93238 8d542404         lea     edx,
[esp+0x4]          ss:05899c0b=????????        77f9323c cd2e             int    
2e
        77f9323e c21400           ret     0x14

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  
Function Name
04D9FD70 7C599F6C 04D9FD48 00000001 00000000 00000000 ntdll!
NtWaitForMultipleObjects 
04D9FFB4 7C57B382 00000005 000B000A 7C2D02A7 001E9C80 
kernel32!WaitForMultipleObjects 
04D9FFEC 00000000 778321FE 001E9C80 00000000 000000C8 
kernel32!lstrcmpiW 

*----> Raw Stack Dump <----*
04d9fd24  59 a0 59 7c 04 00 00 00 - 48 fd d9 04 01 00 00 
00  Y.Y|....H.......
04d9fd34  00 00 00 00 00 00 00 00 - 01 00 00 00 80 9c 1e 
00  ................
04d9fd44  01 00 00 00 b0 01 00 00 - b4 01 00 00 c4 01 00 
00  ................
04d9fd54  20 02 00 00 00 00 00 00 - 00 00 00 00 00 00 00 
00   ...............
04d9fd64  00 00 00 00 00 00 00 00 - 00 00 00 00 b4 ff d9 
04  ................
04d9fd74  6c 9f 59 7c 48 fd d9 04 - 01 00 00 00 00 00 00 
00  l.Y|H...........
04d9fd84  00 00 00 00 00 00 00 00 - b2 22 83 77 04 00 00 
00  .........".w....
04d9fd94  b0 fe d9 04 00 00 00 00 - ff ff ff ff 80 9c 1e 
00  ................
04d9fda4  a7 02 2d 7c 0a 00 0b 00 - 00 00 00 00 00 00 00 
00  ..-|............
04d9fdb4  00 00 00 00 00 00 00 00 - 01 00 00 00 38 00 00 
00  ............8...
04d9fdc4  23 00 00 00 23 00 00 00 - 0a 00 0b 00 a7 02 2d 
7c  #...#.........-|
04d9fdd4  80 9c 1e 00 68 02 2d 7c - 4c 00 00 00 fe 21 83 
77  ....h.-|L....!.w
04d9fde4  f8 ab fd 7f 00 b7 57 7c - 1b 00 00 00 00 02 00 
00  ......W|........
04d9fdf4  fc ff d9 04 23 00 00 00 - f3 55 45 80 80 db fe 
b6  ....#....UE.....
04d9fe04  88 6b 58 81 88 6b 58 81 - 20 00 00 00 00 00 00 
00  .kX..kX. .......
04d9fe14  20 38 48 80 00 07 00 00 - 8c dd 44 80 00 70 d5 
81   8H.......D..p..
04d9fe24  9d 10 00 00 01 00 00 00 - 56 ec 00 00 10 c8 23 
82  ........V.....#.
04d9fe34  00 07 00 00 4c d1 44 80 - 56 ec 00 00 10 c8 23 
82  ....L.D.V.....#.
04d9fe44  56 ec 00 00 10 c8 23 82 - 01 b2 fd 7f be 00 00 
00  V.....#.........
04d9fe54  f1 da 44 80 be 00 00 00 - 70 89 a4 81 00 b0 fd 
7f  ..D.....p.......

State Dump for Thread Id 0x124

eax=00000000 ebx=001e9f80 ecx=00000000 edx=00000000 
esi=74fea3a0 edi=00000000
eip=77f8beb2 esp=04eaff84 ebp=04eaffb4 iopl=0         nv up 
ei pl nz na pe nc
cs=001b  ss=0023  ds=0023  es=0023  fs=0038  
gs=0000             efl=00000202


function: NtRemoveIoCompletion
        77f8bea7 b8a8000000       mov     eax,0xa8
        77f8beac 8d542404         lea     edx,
[esp+0x4]          ss:059a9e6b=????????        77f8beb0 cd2e             int    
2e
        77f8beb2 c21400           ret     0x14

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  
Function Name
04EAFFB4 7C57B382 74FD9048 00000000 00000038 001E9F80 ntdll!
NtRemoveIoCompletion 
04EAFFEC 00000000 74FD6311 001E9F80 00000000 00000008 
kernel32!lstrcmpiW 

*----> Raw Stack Dump <----*
04eaff84  63 63 fd 74 30 02 00 00 - bc ff ea 04 b0 ff ea 
04  cc.t0...........
04eaff94  a4 ff ea 04 08 64 fd 74 - 00 00 00 00 38 00 00 
00  .....d.t....8...
04eaffa4  36 02 00 c0 00 00 00 00 - 00 00 fd 74 58 52 1d 
00  6..........tXR..
04eaffb4  ec ff ea 04 82 b3 57 7c - 48 90 fd 74 00 00 00 
00  ......W|H..t....
04eaffc4  38 00 00 00 80 9f 1e 00 - 00 90 fd 7f 00 00 00 
00  8...............
04eaffd4  c0 ff ea 04 00 00 00 00 - ff ff ff ff b4 1b 5c 
7c  ..............\|
04eaffe4  f0 2a 57 7c 00 00 00 00 - 00 00 00 00 00 00 00 
00  .*W|............
04eafff4  11 63 fd 74 80 9f 1e 00 - 00 00 00 00 08 00 00 
00  .c.t............
04eb0004  02 01 00 00 ee ff ee ff - 00 00 00 00 00 00 13 
00  ................
04eb0014  00 40 14 00 00 00 eb 04 - 00 02 00 00 40 00 eb 
04  .@..........@...
04eb0024  00 00 0b 05 8a 01 00 00 - 02 00 00 00 e8 05 13 
00  ................
04eb0034  00 00 00 00 58 b4 f6 04 - 00 00 00 00 91 4d 08 
00  ....X........M..
04eb0044  02 01 0c 00 00 00 00 00 - 00 00 00 00 00 00 00 
00  ................
04eb0054  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 
00  ................
04eb0064  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 
00  ................
04eb0074  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 
00  ................
04eb0084  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 
00  ................
04eb0094  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 
00  ................
04eb00a4  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 
00  ................
04eb00b4  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 
00  ................

State Dump for Thread Id 0x728

eax=77d41c54 ebx=80020000 ecx=00130000 edx=00000000 
esi=0018b420 edi=00000100
eip=77f839c7 esp=055afe28 ebp=055aff74 iopl=0         nv up 
ei pl nz na pe nc
cs=001b  ss=0023  ds=0023  es=0023  fs=0038  
gs=0000             efl=00000202


function: NtReplyWaitReceivePortEx
        77f839bc b8ac000000       mov     eax,0xac
        77f839c1 8d542404         lea     edx,
[esp+0x4]          ss:060a9d0f=????????        77f839c5 cd2e             int    
2e
        77f839c7 c21400           ret     0x14
        77f839ca 8b4710           mov     eax,
[edi+0x10]         ds:00af9fe6=00000000
        77f839cd 8b483c           mov     ecx,
[eax+0x3c]         ds:7883bb3a=????????        77f839d0 f6400801         test   
byte ptr 
[eax+0x8],0x1       ds:7883bb3a=??        77f839d4 7502             jnz     
RtlCreateProcessParameters+0xd (77f83cd8)
        77f839d6 03c8             add     ecx,eax
        77f839d8 894de4           mov     
[ebp+0xe4],ecx         ss:060a9e5a=????????        77f839db 8b4710          
mov     eax,
[edi+0x10]         ds:00af9fe6=00000000
        77f839de 668b4038         mov     ax,
[eax+0x38]              ds:7883bb3b=????        77f839e2 668945e0         mov    

[ebp+0xe0],ax              ss:060a9e5b=????        77f839e6 668945e2        
mov     
[ebp+0xe2],ax              ss:060a9e5b=????        77f839ea 53              
push    ebx

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  
Function Name
055AFF74 77D56D9E 77D39A00 0018B420 00130000 04F1DB48 ntdll!
NtReplyWaitReceivePortEx 
055AFFA8 77D41C6C 001D5430 055AFFEC 7C57B382 011C5F20 
rpcrt4!TowerConstruct 
055AFFB4 7C57B382 011C5F20 00130000 04F1DB48 011C5F20 
rpcrt4!I_RpcServerInqTransportType 
055AFFEC 00000000 00000000 00000000 00000000 00000000 
kernel32!lstrcmpiW 

State Dump for Thread Id 0x464

eax=77d41c54 ebx=00189dd0 ecx=00130000 edx=00000000 
esi=0018b420 edi=00000100
eip=77f839c7 esp=056afe28 ebp=056aff74 iopl=0         nv up 
ei pl nz na pe nc
cs=001b  ss=0023  ds=0023  es=0023  fs=0038  
gs=0000             efl=00000202


function: NtReplyWaitReceivePortEx
        77f839bc b8ac000000       mov     eax,0xac
        77f839c1 8d542404         lea     edx,
[esp+0x4]          ss:061a9d0f=????????        77f839c5 cd2e             int    
2e
        77f839c7 c21400           ret     0x14
        77f839ca 8b4710           mov     eax,
[edi+0x10]         ds:00af9fe6=00000000
        77f839cd 8b483c           mov     ecx,
[eax+0x3c]         ds:7883bb3a=????????        77f839d0 f6400801         test   
byte ptr 
[eax+0x8],0x1       ds:7883bb3a=??        77f839d4 7502             jnz     
RtlCreateProcessParameters+0xd (77f83cd8)
        77f839d6 03c8             add     ecx,eax
        77f839d8 894de4           mov     
[ebp+0xe4],ecx         ss:061a9e5a=????????        77f839db 8b4710          
mov     eax,
[edi+0x10]         ds:00af9fe6=00000000
        77f839de 668b4038         mov     ax,
[eax+0x38]              ds:7883bb3b=????        77f839e2 668945e0         mov    

[ebp+0xe0],ax              ss:061a9e5b=????        77f839e6 668945e2        
mov     
[ebp+0xe2],ax              ss:061a9e5b=????        77f839ea 53              
push    ebx

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  
Function Name
056AFF74 77D56D9E 77D39A00 0018B420 00130000 04F447D0 ntdll!
NtReplyWaitReceivePortEx 
056AFFA8 77D41C6C 011C2A48 056AFFEC 7C57B382 00189DD0 
rpcrt4!TowerConstruct 
056AFFB4 7C57B382 00189DD0 00130000 04F447D0 00189DD0 
rpcrt4!I_RpcServerInqTransportType 
056AFFEC 00000000 00000000 00000000 00000000 00000000 
kernel32!lstrcmpiW 

 
Reply Create subthread


All articles

Subject Author Date
Crash while mirroring site

02/16/2004 11:45
Re: Crash while mirroring site

02/18/2004 08:50
Re: Crash while mirroring site

02/20/2004 01:24
Re: Crash while mirroring site

02/20/2004 06:44
Re: Crash while mirroring site

03/05/2004 19:07
Re: Crash while mirroring site

03/07/2004 06:43
Re: Crash while mirroring site

06/06/2004 20:21




7

Created with FORUM 2.0.11