| I'm also getting a crash with a large site with the latest
version of httrack, 3.30. I just downloaded the beta and
will try it as a recent forum message indicates there's a
probable fix.
I'm running win2K and I simply get a message from windows
saying the program has crashed. Below is a Dr. Watson
dump. The program tends to run for a couple hours then
dies. It has done this about five times. The site I'm
trying to mirror is
<http://www.grafitti.org>
Here's the log:
Application exception occurred:
App: (pid=1784)
When: 3/5/2004 @ 01:17:23.146
Exception number: c0000005 (access violation)
*----> System Information <----*
Computer Name: MONOLITH
User Name: Kai Middleton
Number of Processors: 1
Processor Type: x86 Family 6 Model 6 Stepping 2
Windows 2000 Version: 5.0
Current Build: 2195
Service Pack: 4
Current Type: Uniprocessor Free
Registered Organization:
Registered Owner: Kai Middleton
*----> Task List <----*
0 Idle.exe
8 System.exe
152 SMSS.exe
180 CSRSS.exe
200 WINLOGON.exe
228 SERVICES.exe
248 LSASS.exe
516 svchost.exe
556 spoolsv.exe
584 ati2evxx.exe
624 avgserv.exe
636 Ctsvccda.exe
652 svchost.exe
672 gearsec.exe
796 mysqld-max-nt.e.exe
732 NAVAPSVC.exe
872 regsvc.exe
896 mstask.exe
940 stisvc.exe
1012 vsmon.exe
604 explorer.exe
712 WinMgmt.exe
776 MsPMSPSv.exe
1080 svchost.exe
756 ggviewer67-89.e.exe
1336 devldr32.exe
1420 ahqtb.exe
1468 avgcc32.exe
1508 winampa.exe
1516 Hpi_monitor.exe
1524 hpgs2wnd.exe
1532 NAVAPW32.exe
1544 hpgs2wnf.exe
1572 InCD.exe
1600 jusched.exe
1612 iTunesHelper.ex.exe
1608 qttask.exe
1644 zlclient.exe
1656 iPodService.exe
1688 grubgui.exe
1696 mozilla.exe
1724 achron.exe
1816 soffice.exe
1460 TASKMGR.exe
1784 WinHTTrack.exe
92 DRWTSN32.exe
0 _Total.exe
(00400000 - 004F8000)
(77F80000 - 77FFB000)
(75050000 - 75058000)
(7C570000 - 7C623000)
(75030000 - 75044000)
(78000000 - 78045000)
(7C2D0000 - 7C332000)
(77D30000 - 77D9E000)
(75020000 - 75028000)
(10000000 - 100CC000)
(6C1E0000 - 6C2D2000)
(77F40000 - 77F79000)
(77E10000 - 77E6F000)
(782F0000 - 78538000)
(70A70000 - 70AD5000)
(71710000 - 71794000)
(77A50000 - 77B3C000)
(75E60000 - 75E7A000)
(00900000 - 00911000)
(74FA0000 - 74FC7000)
(00920000 - 00946000)
(00950000 - 009F9000)
(00A00000 - 00A15000)
(779B0000 - 77A4B000)
(775A0000 - 77626000)
(77840000 - 7787E000)
(770C0000 - 770E3000)
(76B30000 - 76B6E000)
(782C0000 - 782CC000)
(77980000 - 779A4000)
(77340000 - 77353000)
(77520000 - 77525000)
(77320000 - 77337000)
(75150000 - 7515F000)
(75170000 - 751BF000)
(7C340000 - 7C34F000)
(751C0000 - 751C6000)
(77950000 - 7797A000)
(773B0000 - 773DF000)
(77380000 - 773A3000)
(77830000 - 7783E000)
(77880000 - 7790E000)
(7C0F0000 - 7C151000)
(774E0000 - 77513000)
(774C0000 - 774D1000)
(77530000 - 77552000)
(77360000 - 77379000)
(777E0000 - 777E8000)
(777F0000 - 777F5000)
(74FD0000 - 74FEE000)
(75010000 - 75017000)
State Dump for Thread Id 0x710
eax=6c272cfe ebx=00000000 ecx=40000000 edx=00000000
esi=004ba8b4 edi=004ba8b4
eip=77e580ff esp=0012fea4 ebp=0012fec4 iopl=0 nv up
ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038
gs=0000 efl=00000246
function: GetMenuItemRect
77e580e6 b899110000 mov eax,0x1199
77e580eb 8d542404 lea edx,
[esp+0x4] ss:00c29d8b=???????? 77e580ef cd2e int
2e
77e580f1 c21000 ret 0x10
77e580f4 b89a110000 mov eax,0x119a
77e580f9 8d542404 lea edx,
[esp+0x4] ss:00c29d8b=???????? 77e580fd cd2e int
2e
77e580ff c21000 ret 0x10
*----> Stack Back Trace <----*
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4
Function Name
0012FEC4 6C1E11A7 004BA8B4 00000000 00000000 00000000
user32!GetMenuItemRect
004BA8B4 00000113 00000113 00000000 002EDF3F 0000018F !
Ordinal5307
*----> Raw Stack Dump <----*
0012fea4 6f 69 e1 77 b4 a8 4b 00 - 00 00 00 00 00 00 00
00 oi.w..K.........
0012feb4 00 00 00 00 00 00 00 00 - 80 a8 4b 00 b4 a8 4b
00 ..........K...K.
0012fec4 b4 a8 4b 00 a7 11 1e 6c - b4 a8 4b 00 00 00 00
00 ..K....l..K.....
0012fed4 00 00 00 00 00 00 00 00 - 00 00 00 00 80 a8 4b
00 ..............K.
0012fee4 a4 91 1e 6c 80 a8 4b 00 - 80 a8 4b 00 c0 ff 12
00 ...l..K...K.....
0012fef4 ff ff ff ff 02 00 00 00 - 54 91 1e 6c 80 a8 4b
00 ........T..l..K.
0012ff04 fe b4 1e 6c 00 00 00 00 - a5 a3 17 00 00 00 00
00 ...l............
0012ff14 85 30 45 00 00 00 40 00 - 00 00 00 00 a5 a3 17
00 .0E...@.........
0012ff24 01 00 00 00 06 30 45 00 - 00 00 40 00 00 00 00
00 .....0E...@.....
0012ff34 a5 a3 17 00 01 00 00 00 - 00 00 00 00 00 00 00
00 ................
0012ff44 00 f0 fd 7f 10 2f 06 80 - a5 a3 17 00 a0 3e 2f
00 ...../.......>/.
0012ff54 00 00 00 00 00 00 f8 77 - a8 2b 2f 00 01 00 00
00 .......w.+/.....
0012ff64 44 00 00 00 a8 ad 17 00 - b8 ad 17 00 d0 ad 17
00 D...............
0012ff74 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00
00 ................
0012ff84 00 00 00 00 00 00 00 00 - 00 00 00 00 01 0c 00
00 ................
0012ff94 01 00 00 00 00 00 00 00 - 00 00 00 00 01 00 01
00 ................
0012ffa4 00 00 00 00 3c ff 12 00 - 00 00 00 00 e0 ff 12
00 ....<...........
0012ffb4 36 30 45 00 00 dd 45 00 - 00 00 00 00 f0 ff 12
00 60E...E.........
0012ffc4 e7 87 59 7c 00 00 00 00 - 00 00 00 00 00 f0 fd
7f ..Y|............
0012ffd4 00 00 00 00 c8 ff 12 00 - 00 00 00 00 ff ff ff
ff ................
State Dump for Thread Id 0x604
eax=00000000 ebx=00000014 ecx=000000c0 edx=00000000
esi=77f89153 edi=0139be6c
eip=77f8915e esp=0139be58 ebp=0139be74 iopl=0 nv up
ei pl nz na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038
gs=0000 efl=00000206
function: ZwDelayExecution
77f89153 b832000000 mov eax,0x32
77f89158 8d542404 lea edx,
[esp+0x4] ss:01e95d3f=726f2e69
77f8915c cd2e int 2e
77f8915e c20800 ret 0x8
*----> Stack Back Trace <----*
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4
Function Name
0139BE74 7C59A0B8 00000064 00000000 0043CA37 00000064 ntdll!
ZwDelayExecution
78020FAB 74FF0C24 84E80C24 83FFFFFF 55C30CC4 FF6AEC8B
kernel32!Sleep
74FF406A 00000000 00000000 00000000 00000000 00000000
<nosymbols>
*----> Raw Stack Dump <----*
0139be58 ed a0 59 7c 00 00 00 00 - 6c be 39 01 4d f2 00
78 ..Y|....l.9.M..x
0139be68 ad a0 59 7c c0 bd f0 ff - ff ff ff ff ab 0f 02
78 ..Y|...........x
0139be78 b8 a0 59 7c 64 00 00 00 - 00 00 00 00 37 ca 43
00 ..Y|d.......7.C.
0139be88 64 00 00 00 dc f4 12 00 - 00 00 00 00 7c ff 3a
01 d...........|.:.
0139be98 54 01 00 00 01 00 00 00 - 00 00 00 00 00 00 00
00 T...............
0139bea8 00 00 00 00 00 00 00 00 - 14 00 00 00 bc df 39
01 ..............9.
0139beb8 63 3a 5c 70 61 67 65 73 - 5c 67 72 61 66 69 74
74 c:\pages\grafitt
0139bec8 69 5c 00 00 00 00 00 00 - 00 00 00 00 00 00 00
00 i\..............
0139bed8 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00
00 ................
0139bee8 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00
00 ................
0139bef8 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00
00 ................
0139bf08 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00
00 ................
0139bf18 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00
00 ................
0139bf28 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00
00 ................
0139bf38 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00
00 ................
0139bf48 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00
00 ................
0139bf58 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00
00 ................
0139bf68 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00
00 ................
0139bf78 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00
00 ................
0139bf88 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00
00 ................
State Dump for Thread Id 0x408
eax=04bbf524 ebx=00018a34 ecx=04bbf524 edx=014b0048
esi=014609b0 edi=2497add7
eip=100367de esp=014455ac ebp=014455bc iopl=0 nv up
ei pl nz ac pe cy
cs=001b ss=0023 ds=0023 es=0023 fs=0038
gs=0000 efl=00000213
function: <nosymbols>
100367c2 8d8496d43a0100 lea eax,
[esi+edx*4+0x13ad4] ds:014c3b1c=03e6d51c
100367c9 7504 jnz hts_main+0x1a87f
(1003f2cf)
100367cb 8bc8 mov ecx,eax
100367cd eb20 jmp hts_main+0x1a89f
(1003f2ef)
100367cf 8b16 mov edx,
[esi] ds:014609b0=014b0048
100367d1 8b048a mov eax,
[edx+ecx*4] ds:04bbf524=00000000
100367d4 8b4038 mov eax,
[eax+0x38] ds:056b940a=???????? 100367d7 83f8ff cmp
eax,0xff
100367da 740d jz hts_main+0x1a899
(1003f2e9)
100367dc 8bc8 mov ecx,eax
FAULT ->100367de 8b048a mov eax,
[edx+ecx*4] ds:04bbf524=00000000
100367e1 8b4038 mov eax,
[eax+0x38] ds:056b940a=???????? 100367e4 83f8ff cmp
eax,0xff
100367e7 75f3 jnz hts_main+0x1a98c
(1003f3dc)
100367e9 8b0c8a mov ecx,
[edx+ecx*4] ds:04bbf524=00000000
100367ec 83c138 add ecx,0x38
100367ef 8919 mov
[ecx],ebx ds:04bbf524=00000000
100367f1 8b0e mov ecx,
[esi] ds:014609b0=014b0048
100367f3 8b0499 mov eax,
[ecx+ebx*4] ds:00018a34=???????? 100367f6 8b482c mov
ecx,
[eax+0x2c] ds:056b940a=???????? 100367f9 85c9 test
ecx,ecx
100367fb 0f848a000000 je hts_main+0x11e3b
(1003688b)
*----> Stack Back Trace <----*
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4
Function Name
014455BC 74617473 2F6E6F69 6167616D 656E697A 67616D2F !
hts_main
646E652F 00000000 00000000 00000000 00000000 00000000
<nosymbols>
*----> Raw Stack Dump <----*
014455ac cc 9b bc 04 8c 73 8e 04 - 48 00 4b 01 c8 8f 44
01 .....s..H.K...D.
014455bc 2f 65 6e 64 73 74 61 74 - 69 6f 6e 2f 6d 61 67
61 /endstation/maga
014455cc 7a 69 6e 65 2f 6d 61 67 - 32 2f 70 69 65 63 65
73 zine/mag2/pieces
014455dc 2f 77 61 72 7a 2d 6b 6f - 62 6f 6c 74 31 2e 6a
70 /warz-kobolt1.jp
014455ec 67 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00
00 g...............
014455fc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00
00 ................
0144560c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00
00 ................
0144561c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00
00 ................
0144562c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00
00 ................
0144563c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00
00 ................
0144564c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00
00 ................
0144565c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00
00 ................
0144566c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00
00 ................
0144567c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00
00 ................
0144568c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00
00 ................
0144569c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00
00 ................
014456ac 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00
00 ................
014456bc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00
00 ................
014456cc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00
00 ................
014456dc 0c 57 44 01 00 00 00 00 - 64 99 f8 77 00 00 13
00 .WD.....d..w....
State Dump for Thread Id 0xec
eax=778321fe ebx=00000004 ecx=0000004c edx=00000000
esi=77f93233 edi=00000004
eip=77f9323e esp=04d9fd24 ebp=04d9fd70 iopl=0 nv up
ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038
gs=0000 efl=00000246
function: NtWaitForMultipleObjects
77f93233 b8e9000000 mov eax,0xe9
77f93238 8d542404 lea edx,
[esp+0x4] ss:05899c0b=???????? 77f9323c cd2e int
2e
77f9323e c21400 ret 0x14
*----> Stack Back Trace <----*
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4
Function Name
04D9FD70 7C599F6C 04D9FD48 00000001 00000000 00000000 ntdll!
NtWaitForMultipleObjects
04D9FFB4 7C57B382 00000005 000B000A 7C2D02A7 001E9C80
kernel32!WaitForMultipleObjects
04D9FFEC 00000000 778321FE 001E9C80 00000000 000000C8
kernel32!lstrcmpiW
*----> Raw Stack Dump <----*
04d9fd24 59 a0 59 7c 04 00 00 00 - 48 fd d9 04 01 00 00
00 Y.Y|....H.......
04d9fd34 00 00 00 00 00 00 00 00 - 01 00 00 00 80 9c 1e
00 ................
04d9fd44 01 00 00 00 b0 01 00 00 - b4 01 00 00 c4 01 00
00 ................
04d9fd54 20 02 00 00 00 00 00 00 - 00 00 00 00 00 00 00
00 ...............
04d9fd64 00 00 00 00 00 00 00 00 - 00 00 00 00 b4 ff d9
04 ................
04d9fd74 6c 9f 59 7c 48 fd d9 04 - 01 00 00 00 00 00 00
00 l.Y|H...........
04d9fd84 00 00 00 00 00 00 00 00 - b2 22 83 77 04 00 00
00 .........".w....
04d9fd94 b0 fe d9 04 00 00 00 00 - ff ff ff ff 80 9c 1e
00 ................
04d9fda4 a7 02 2d 7c 0a 00 0b 00 - 00 00 00 00 00 00 00
00 ..-|............
04d9fdb4 00 00 00 00 00 00 00 00 - 01 00 00 00 38 00 00
00 ............8...
04d9fdc4 23 00 00 00 23 00 00 00 - 0a 00 0b 00 a7 02 2d
7c #...#.........-|
04d9fdd4 80 9c 1e 00 68 02 2d 7c - 4c 00 00 00 fe 21 83
77 ....h.-|L....!.w
04d9fde4 f8 ab fd 7f 00 b7 57 7c - 1b 00 00 00 00 02 00
00 ......W|........
04d9fdf4 fc ff d9 04 23 00 00 00 - f3 55 45 80 80 db fe
b6 ....#....UE.....
04d9fe04 88 6b 58 81 88 6b 58 81 - 20 00 00 00 00 00 00
00 .kX..kX. .......
04d9fe14 20 38 48 80 00 07 00 00 - 8c dd 44 80 00 70 d5
81 8H.......D..p..
04d9fe24 9d 10 00 00 01 00 00 00 - 56 ec 00 00 10 c8 23
82 ........V.....#.
04d9fe34 00 07 00 00 4c d1 44 80 - 56 ec 00 00 10 c8 23
82 ....L.D.V.....#.
04d9fe44 56 ec 00 00 10 c8 23 82 - 01 b2 fd 7f be 00 00
00 V.....#.........
04d9fe54 f1 da 44 80 be 00 00 00 - 70 89 a4 81 00 b0 fd
7f ..D.....p.......
State Dump for Thread Id 0x124
eax=00000000 ebx=001e9f80 ecx=00000000 edx=00000000
esi=74fea3a0 edi=00000000
eip=77f8beb2 esp=04eaff84 ebp=04eaffb4 iopl=0 nv up
ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038
gs=0000 efl=00000202
function: NtRemoveIoCompletion
77f8bea7 b8a8000000 mov eax,0xa8
77f8beac 8d542404 lea edx,
[esp+0x4] ss:059a9e6b=???????? 77f8beb0 cd2e int
2e
77f8beb2 c21400 ret 0x14
*----> Stack Back Trace <----*
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4
Function Name
04EAFFB4 7C57B382 74FD9048 00000000 00000038 001E9F80 ntdll!
NtRemoveIoCompletion
04EAFFEC 00000000 74FD6311 001E9F80 00000000 00000008
kernel32!lstrcmpiW
*----> Raw Stack Dump <----*
04eaff84 63 63 fd 74 30 02 00 00 - bc ff ea 04 b0 ff ea
04 cc.t0...........
04eaff94 a4 ff ea 04 08 64 fd 74 - 00 00 00 00 38 00 00
00 .....d.t....8...
04eaffa4 36 02 00 c0 00 00 00 00 - 00 00 fd 74 58 52 1d
00 6..........tXR..
04eaffb4 ec ff ea 04 82 b3 57 7c - 48 90 fd 74 00 00 00
00 ......W|H..t....
04eaffc4 38 00 00 00 80 9f 1e 00 - 00 90 fd 7f 00 00 00
00 8...............
04eaffd4 c0 ff ea 04 00 00 00 00 - ff ff ff ff b4 1b 5c
7c ..............\|
04eaffe4 f0 2a 57 7c 00 00 00 00 - 00 00 00 00 00 00 00
00 .*W|............
04eafff4 11 63 fd 74 80 9f 1e 00 - 00 00 00 00 08 00 00
00 .c.t............
04eb0004 02 01 00 00 ee ff ee ff - 00 00 00 00 00 00 13
00 ................
04eb0014 00 40 14 00 00 00 eb 04 - 00 02 00 00 40 00 eb
04 .@..........@...
04eb0024 00 00 0b 05 8a 01 00 00 - 02 00 00 00 e8 05 13
00 ................
04eb0034 00 00 00 00 58 b4 f6 04 - 00 00 00 00 91 4d 08
00 ....X........M..
04eb0044 02 01 0c 00 00 00 00 00 - 00 00 00 00 00 00 00
00 ................
04eb0054 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00
00 ................
04eb0064 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00
00 ................
04eb0074 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00
00 ................
04eb0084 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00
00 ................
04eb0094 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00
00 ................
04eb00a4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00
00 ................
04eb00b4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00
00 ................
State Dump for Thread Id 0x728
eax=77d41c54 ebx=80020000 ecx=00130000 edx=00000000
esi=0018b420 edi=00000100
eip=77f839c7 esp=055afe28 ebp=055aff74 iopl=0 nv up
ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038
gs=0000 efl=00000202
function: NtReplyWaitReceivePortEx
77f839bc b8ac000000 mov eax,0xac
77f839c1 8d542404 lea edx,
[esp+0x4] ss:060a9d0f=???????? 77f839c5 cd2e int
2e
77f839c7 c21400 ret 0x14
77f839ca 8b4710 mov eax,
[edi+0x10] ds:00af9fe6=00000000
77f839cd 8b483c mov ecx,
[eax+0x3c] ds:7883bb3a=???????? 77f839d0 f6400801 test
byte ptr
[eax+0x8],0x1 ds:7883bb3a=?? 77f839d4 7502 jnz
RtlCreateProcessParameters+0xd (77f83cd8)
77f839d6 03c8 add ecx,eax
77f839d8 894de4 mov
[ebp+0xe4],ecx ss:060a9e5a=???????? 77f839db 8b4710
mov eax,
[edi+0x10] ds:00af9fe6=00000000
77f839de 668b4038 mov ax,
[eax+0x38] ds:7883bb3b=???? 77f839e2 668945e0 mov
[ebp+0xe0],ax ss:060a9e5b=???? 77f839e6 668945e2
mov
[ebp+0xe2],ax ss:060a9e5b=???? 77f839ea 53
push ebx
*----> Stack Back Trace <----*
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4
Function Name
055AFF74 77D56D9E 77D39A00 0018B420 00130000 04F1DB48 ntdll!
NtReplyWaitReceivePortEx
055AFFA8 77D41C6C 001D5430 055AFFEC 7C57B382 011C5F20
rpcrt4!TowerConstruct
055AFFB4 7C57B382 011C5F20 00130000 04F1DB48 011C5F20
rpcrt4!I_RpcServerInqTransportType
055AFFEC 00000000 00000000 00000000 00000000 00000000
kernel32!lstrcmpiW
State Dump for Thread Id 0x464
eax=77d41c54 ebx=00189dd0 ecx=00130000 edx=00000000
esi=0018b420 edi=00000100
eip=77f839c7 esp=056afe28 ebp=056aff74 iopl=0 nv up
ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038
gs=0000 efl=00000202
function: NtReplyWaitReceivePortEx
77f839bc b8ac000000 mov eax,0xac
77f839c1 8d542404 lea edx,
[esp+0x4] ss:061a9d0f=???????? 77f839c5 cd2e int
2e
77f839c7 c21400 ret 0x14
77f839ca 8b4710 mov eax,
[edi+0x10] ds:00af9fe6=00000000
77f839cd 8b483c mov ecx,
[eax+0x3c] ds:7883bb3a=???????? 77f839d0 f6400801 test
byte ptr
[eax+0x8],0x1 ds:7883bb3a=?? 77f839d4 7502 jnz
RtlCreateProcessParameters+0xd (77f83cd8)
77f839d6 03c8 add ecx,eax
77f839d8 894de4 mov
[ebp+0xe4],ecx ss:061a9e5a=???????? 77f839db 8b4710
mov eax,
[edi+0x10] ds:00af9fe6=00000000
77f839de 668b4038 mov ax,
[eax+0x38] ds:7883bb3b=???? 77f839e2 668945e0 mov
[ebp+0xe0],ax ss:061a9e5b=???? 77f839e6 668945e2
mov
[ebp+0xe2],ax ss:061a9e5b=???? 77f839ea 53
push ebx
*----> Stack Back Trace <----*
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4
Function Name
056AFF74 77D56D9E 77D39A00 0018B420 00130000 04F447D0 ntdll!
NtReplyWaitReceivePortEx
056AFFA8 77D41C6C 011C2A48 056AFFEC 7C57B382 00189DD0
rpcrt4!TowerConstruct
056AFFB4 7C57B382 00189DD0 00130000 04F447D0 00189DD0
rpcrt4!I_RpcServerInqTransportType
056AFFEC 00000000 00000000 00000000 00000000 00000000
kernel32!lstrcmpiW
| |