Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations John Tel on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Exception number: c0000005 (access violation) error while using VB6

Status
Not open for further replies.

ulimxmx

Programmer
Mar 5, 2003
4
PH
Hi,

I am getting an access violation error c0000005 when my VB program starts. My VB program works on the development PC but when installed in another PC, the access violation error occurs.
My VB application will watch a folder for files and FTP these files to an FTP server. The application will use a timer in executing the above mentioned operation. I've tried using XceedFTP and DartFtp components but both still doesnt work. My codes are a bit too lengthy but here is a description of what happens in my application:
The application watches a folder for a certain time. When the application sees a pair of identical files (must have nearly the same filename, i.e., ctc00056.pdf & ctc00056q.pdf), these two files will be copied to a temp dir in the application directory. Afterwards, the files in the temp dir will be FTP'ed to a server. After successful FTP, an email will be sent using EasyMail SMTP dll.
What could be the problem with this application? Please advice. Thanks!

Mike Lim
SPI Technologies, Inc.
 
Mike or Any Other Tek-Tip Guru out there...

Funny you should mention this VB/Win2k error only just a few days ago -- I'm having the exact same errors and I've never had them until a few days ago as well. Strange.

Dr. Watson reports the same "c0000005 (access violation)" message while using FlashFXP and CuteF*P.

This bizarre and life-stopping instability has NEVER happened on any machine until installed service pak 3.

Now, if I run FTP-AnyApp, (sometimes even general IE or Netscape surfing), the system lockes up, screen freezes (no BSOD, thank God!) and Ctrl,Alt,Del usually has no effect forcing hard reboot to clear crash. System has become very unstable, to point of unusable for anything from FTP'ing to simple web browsing.

Mike, have you also recently upgraded to Microsoft Win2k Pro Service Pak 3?

Perhaps Service Pak 3 is our commonality <-- Another Microsoft bug, what's new?! I have installed the latest VB 32b runtimes to assist in Win2k debug-mode, but all is to no avail. These violations are causing severe crash episodes resulting in total kernal dumps.

In any event, I did a Google.com search on the Error Code keyword (Code =87 for &quot;c0000005&quot;) and 90% of the posts I've read all seem pertain to Service Pak 3, most of which people claim issues crop up that are similar to ours and only in the past few months. Very odd, so many coinsidences? Probably not.

Perhaps I should have backed up my Srvc Pak 2 before installing Pak 3, Murphy's Law working against my honest efforts as usual. Thanks Mr. Gates!

Anyway, I don't really know what to do at this point as far as this system is concerned except go back to my XP Pro fallback workstation and suffer with all those goofy Stuffed Animal login profiles and idiotic kindergarten color tones.)

Unless any Gurus out these have some advice, I may be doomed to XP since this computer has become terribly unstable. Access violations have been moment to moment since Service Pak 3 was installed 4 days ago -- locks up anytime FTP-AnyAppYouWant.. runs or more frequently, average run-of-the-mill internet surfing with IE v6x.

I know it's gotta be like other people's errors, possibly a VB/Service Pak 3 compat-issue since so many TSR's I'm running are VB-based--it's impossible for me to sort out the chaotic mess that is Dr. Watson's error reporting tool. Any Guru reading this have advice? It would be much appreciated!

All of you people, you are all TekGods! --Regards, RunningHoove :)

BTW, I had to write this post twice now. 1st post moments ago, system locked up and I lost the initial reply which I have just now rewritten. Also, the above scenario aren't homework cheat questions, I am not a student! ;)

FYI, Here's the latest Dr. Watson32 report (sorry, it's still so damn long, even after truncating it a bit)...

(Another) Application Exception Occurred:

App: IEXPLORE.exe
When: 3/09/2003 @ PM 11:36:18.856
Exception number: c0000005 (access violation)

*----> System Information <----*
Computer Name: AMD2GHz1024DDR
User Name: Administrator
Number of Processors: 1
Processor Type: x86 Family 6 Model 6 Stepping 2
Windows 2000 Version: 5.0
Current Build: 2195
Service Pack: 3
Current Type: Uniprocessor Free
Registered Organization: XXXXXXXXXXX
Registered Owner: XXXXXXX

*----> Task List <----*
0 Idle.exe
8 System.exe
156 SMSS.exe
180 CSRSS.exe
200 WINLOGON.exe
228 SERVICES.exe
240 LSASS.exe
428 svchost.exe
460 spoolsv.exe
496 svchost.exe
524 NAVAPSVC.exe
540 NPROTECT.exe
584 nvsvc32.exe
596 ooccsvc.exe
652 regsvc.exe
684 mstask.exe
692 IEXPLORE.exe
724 NOPDB.exe
816 WinMgmt.exe
836 MsPMSPSv.exe
848 svchost.exe
1208 muamgr.exe
1216 pctspk.exe
1232 FlashFXP.exe
1252 rundll32.exe
748 PopupFilter.exe
796 explorer.exe
1156 DRWTSN32.exe
0 _Total.exe

(00400000 - 0043E000)
(77F80000 - 77FFB000)
(77DB0000 - 77E0B000)
(77E80000 - 77F31000)
(77D30000 - 77DA1000)
(77F40000 - 77F79000)
(77E10000 - 77E6F000)
(70BD0000 - 70C35000)
(78000000 - 78046000)
(71710000 - 71794000)
(75E60000 - 75E7A000)
(732E0000 - 73305000)
(23000000 - 23056000)
(10000000 - 1001A000)
(690A0000 - 690AB000)
(782F0000 - 78534000)
(00940000 - 00A01000)
(77A50000 - 77B45000)
(766F0000 - 766F7000)
(77820000 - 77827000)
(759B0000 - 759B6000)
(695E0000 - 69609000)
(779B0000 - 77A4B000)
(51000000 - 51044000)
(728A0000 - 728A6000)
(775A0000 - 77625000)
(014F0000 - 01639000)
(71160000 - 7125D000)
(77C10000 - 77C6D000)
(1A400000 - 1A47A000)
(70440000 - 704CF000)
(63580000 - 6382C000)
(70200000 - 70295000)
(77440000 - 774B6000)
(77430000 - 77440000)
(774E0000 - 77512000)
(774C0000 - 774D1000)
(75030000 - 75043000)
(75020000 - 75028000)
(77530000 - 77552000)
(77830000 - 7783E000)
(75AB0000 - 75AB5000)
(75170000 - 751BF000)
(77BE0000 - 77BEF000)
(751C0000 - 751C6000)
(75150000 - 75160000)
(77950000 - 77978000)
(77980000 - 779A4000)
(75050000 - 75058000)
(76DF0000 - 76E01000)
(76FA0000 - 76FAF000)
(773E0000 - 773F5000)
(02340000 - 02355000)
(77570000 - 775A0000)
(681A0000 - 681A7000)
(66740000 - 66747000)
(718C0000 - 71944000)
(75AC0000 - 75AE8000)
(76F20000 - 76F95000)
(70340000 - 70381000)
(766D0000 - 766E8000)
(76740000 - 76748000)
(77880000 - 7790D000)
(76620000 - 76630000)
(75160000 - 7516C000)
(75210000 - 75225000)
(751D0000 - 75208000)
(77840000 - 7787D000)
(770C0000 - 770E3000)
(770F0000 - 772ED000)
(40000000 - 40016000)
(77400000 - 77408000)
(77410000 - 77423000)
(770B0000 - 770B7000)
(74F90000 - 74F97000)
(75D40000 - 75D46000)
(74F70000 - 74F75000)
(74F40000 - 74F49000)
(74F30000 - 74F34000)
(66B00000 - 66B07000)
(74F80000 - 74F8B000)
(74F50000 - 74F6D000)
(648C0000 - 648F9000)
(58390000 - 5841A000)
(58340000 - 5838D000)
(02F60000 - 02FFB000)
(03010000 - 0302E000)
(03030000 - 03049000)
(03050000 - 03099000)
(038C0000 - 0392E000)
(03D40000 - 03D8C000)
(041A0000 - 041DC000)
(71F00000 - 71F4D000)
(6A8F0000 - 6A910000)
(74870000 - 74886000)
(70020000 - 70025000)
(71960000 - 71972000)
(04DC0000 - 04DEF000)
(719B0000 - 719B8000)
(04F00000 - 04F31000)
(04F40000 - 0501B000)
(16200000 - 16206000)
(379B0000 - 37A3C000)
(052A0000 - 052C2000)
(053D0000 - 053EA000)
(780C0000 - 78121000)
(053F0000 - 05404000)
(05820000 - 05875000)
(76B30000 - 76B6D000)
(058A0000 - 058A7000)
(76930000 - 7695B000)
(77920000 - 77943000)
(70510000 - 7051A000)
(66650000 - 666A4000)
(76710000 - 76719000)
(06700000 - 06721000)
(65050000 - 6506B000)
(06840000 - 068AA000)
(77800000 - 7781E000)
(069C0000 - 06A0A000)
(06DB0000 - 06DCB000)

State Dump for Thread Id 0x26c

eax=00000676 ebx=00000000 ecx=01010101 edx=b98d7534 esi=000006c8 edi=0006eb54
eip=77f83786 esp=0006e9d4 ebp=0006ece0 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202


function: NtWaitForSingleObject
77f8377b b8ea000000 mov eax,0xea
77f83780 8d542404 lea edx,[esp+0x4] ss:018cbfa7=????????
77f83784 cd2e int 2e
77f83786 c20c00 ret 0xc

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0006ECE0 77EA848F 0006ED08 77ED13B3 0006ED10 00000000 ntdll!NtWaitForSingleObject
0006FFF0 00000000 004015A8 00000000 000000C8 00000100 kernel32!ProcessIdToSessionId

*----> Raw Stack Dump <----*
0006e9d4 8e b6 ea 77 c8 06 00 00 - 01 00 00 00 00 00 00 00 ...w............
0006e9e4 a8 2a e8 77 00 00 00 00 - e0 ff 06 00 d5 ec 30 78 .*.w..........0x
0006e9f4 20 21 08 00 de ec 30 78 - 64 72 77 74 73 6e 33 32 !....0xdrwtsn32
0006ea04 20 2d 70 20 37 39 36 20 - 2d 65 20 31 37 33 36 20 -p 796 -e 1736
0006ea14 2d 67 00 00 2e 00 00 00 - 72 00 65 00 63 00 74 00 -g......r.e.c.t.
0006ea24 6f 00 72 00 79 00 00 00 - c0 b4 b3 ff 40 4b 4c 00 o.r.y.......@KL.
0006ea34 40 4b 4c 00 00 00 00 00 - 00 00 00 00 00 00 00 00 @KL.............
0006ea44 00 00 00 00 ff ff ff ff - 00 00 00 00 00 00 00 00 ................
0006ea54 00 04 00 00 e4 02 00 00 - 00 00 00 00 00 00 00 00 ................
0006ea64 00 04 00 00 e4 02 00 00 - 0e ff ff ff 54 ec 06 00 ............T...
0006ea74 54 ec 06 00 54 ec 06 00 - 36 aa e8 77 6a 77 95 00 T...T...6..wjw..
0006ea84 68 5e 34 01 54 ec 06 00 - 04 00 52 01 10 59 52 01 h^4.T.....R..YR.
0006ea94 00 00 52 01 00 00 00 00 - fb 95 95 00 b8 ea 06 00 ..R.............
0006eaa4 78 00 03 00 04 00 52 01 - 00 00 52 01 00 00 00 00 x.....R...R.....
0006eab4 00 00 00 00 00 00 00 00 - 09 00 00 00 c0 33 07 00 .............3..
0006eac4 ac ef 06 00 f4 ea 06 00 - a8 50 ec 77 c0 33 07 00 .........P.w.3..
0006ead4 ac ef 06 00 00 00 00 00 - ac ef 06 00 09 00 00 00 ................
0006eae4 e6 2d fd 7f 09 00 00 00 - ac ef 06 00 a2 02 54 00 .-............T.
0006eaf4 2c eb 06 00 91 44 e2 77 - 09 04 00 00 0c 00 00 00 ,....D.w........
0006eb04 00 00 00 00 01 00 00 00 - ac ef 06 00 44 00 00 00 ............D...

State Dump for Thread Id 0x310

eax=05d74b88 ebx=00000000 ecx=10950011 edx=00000000 esi=00084020 edi=05d787b0
eip=77f83bb8 esp=014efe28 ebp=014eff74 iopl=0 nv up ei pl nz na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000206


function: NtReplyWaitReceivePortEx
77f83bad b8ac000000 mov eax,0xac
77f83bb2 8d542404 lea edx,[esp+0x4] ss:02d4d3fb=????????
77f83bb6 cd2e int 2e
77f83bb8 c21400 ret 0x14

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
014EFF74 77D420D9 77D425B9 00084020 00000000 40083B1C ntdll!NtReplyWaitReceivePortEx
014EFFA8 77D424DA 00079F60 014EFFEC 77E8B2D8 00083F70 rpcrt4!NdrConformantArrayMemorySize
014EFFB4 77E8B2D8 00083F70 00000000 40083B1C 00083F70 rpcrt4!NdrConformantArrayMemorySize
014EFFEC 00000000 77D424C2 00083F70 00000000 00905A4D kernel32!lstrcmpiW

*----> Raw Stack Dump <----*
014efe28 85 22 d4 77 64 01 00 00 - 54 ff 4e 01 00 00 00 00 .&quot;.wd...T.N.....
014efe38 28 75 0d 00 58 ff 4e 01 - e8 9e 07 00 60 30 08 00 (u..X.N.....`0..
014efe48 6d 31 f8 77 70 f4 0a 82 - 70 f4 0a 82 00 00 00 00 m1.wp...p.......
014efe58 01 00 00 00 b0 fb 24 ba - 00 00 00 00 58 5d 2f e3 ......$.....X]/.
014efe68 74 fb 00 00 00 00 00 00 - 72 4f 41 80 90 f5 0a 82 t.......rOA.....
014efe78 e0 b4 0a 82 64 fc 24 ba - ca 08 45 80 03 00 00 00 ....d.$...E.....
014efe88 a8 75 e8 81 66 41 4a 80 - 80 f3 06 00 00 00 00 00 .u..fAJ.........
014efe98 48 f3 06 00 2b 9a 1a 00 - 00 00 00 00 00 00 00 00 H...+...........
014efea8 01 00 00 00 19 00 02 00 - 00 00 00 00 19 00 02 00 ................
014efeb8 00 00 00 00 00 00 00 00 - 00 00 00 00 1c 03 00 00 ................
014efec8 00 00 00 00 08 fc 24 ba - 00 00 00 00 00 00 00 00 ......$.........
014efed8 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
014efee8 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
014efef8 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
014eff08 00 00 00 00 e0 29 50 c0 - 9a 00 00 00 00 20 50 c0 .....)P...... P.
014eff18 e0 29 50 c0 9a 00 00 00 - 9a 00 00 00 10 29 50 c0 .)P..........)P.
014eff28 01 c0 f4 77 80 6a 6b 81 - 20 70 74 81 00 00 00 00 ...w.jk. pt.....
014eff38 b0 71 74 81 60 fc 24 ba - 46 02 00 00 a4 da 42 80 .qt.`.$.F.....B.
014eff48 10 2f 06 80 80 71 74 81 - 20 70 74 81 02 00 07 80 ./...qt. pt.....
014eff58 00 a2 2f 4d ff ff ff ff - 50 fe 4e 01 02 00 07 80 ../M....P.N.....

State Dump for Thread Id 0x4a8

eax=0013fa00 ebx=00000000 ecx=001e0000 edx=00000000 esi=00000000 edi=00000000
eip=77e585eb esp=0167ff2c ebp=0167ff4c iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246


function: WaitMessage
77e585e0 b836120000 mov eax,0x1236
77e585e5 8d542404 lea edx,[esp+0x4] ss:02edd4ff=????????
77e585e9 cd2e int 2e
77e585eb c3 ret

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0167FF4C 00403743 70C0C464 00400000 0031002D 00070000 user32!WaitMessage
0167FFB4 77E8B2D8 00000000 0031002D 00070000 0006FEE0 explorer!<nosymbols>
0167FFEC 00000000 00000000 00000000 00000000 00000000 kernel32!lstrcmpiW

State Dump for Thread Id 0x178

eax=00000007 ebx=00000008 ecx=01010101 edx=00000000 esi=77f837a7 edi=00000008
eip=77f837b2 esp=0174fd98 ebp=0174fde4 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246


function: NtWaitForMultipleObjects
77f837a7 b8e9000000 mov eax,0xe9
77f837ac 8d542404 lea edx,[esp+0x4] ss:02fad36b=4925a289
77f837b0 cd2e int 2e
77f837b2 c21400 ret 0x14

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0174FDE4 77E1E97B 0174FDBC 00000001 00000000 00000000 ntdll!NtWaitForMultipleObjects
0174FE40 77E1E9C8 0174FE0C 0174FEB8 FFFFFFFF 000000FF user32!MsgWaitForMultipleObjectsEx
0174FE5C 7832A4EB 00000007 0174FEB8 00000000 FFFFFFFF user32!MsgWaitForMultipleObjects
7840ADE0 FFFFFFFF 00000000 00000000 0000019C 00000000 shell32!Ordinal244
00076898 7840ADE0 000768C0 00076880 00000072 00000072 <nosymbols>
00000000 00000000 00000000 00000000 00000000 00000000 shell32!<nosymbols>

*----> Raw Stack Dump <----*
0174fd98 00 9d ea 77 08 00 00 00 - bc fd 74 01 01 00 00 00 ...w......t.....
0174fda8 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0174fdb8 08 00 00 00 d0 01 00 00 - d8 01 00 00 dc 01 00 00 ................
0174fdc8 e0 01 00 00 c8 02 00 00 - 1c 03 00 00 e4 05 00 00 ................
0174fdd8 cc 01 00 00 00 00 00 00 - 00 00 00 00 40 fe 74 01 ............@.t.
0174fde8 7b e9 e1 77 bc fd 74 01 - 01 00 00 00 00 00 00 00 {..w..t.........
0174fdf8 00 00 00 00 00 00 00 00 - 00 00 00 00 78 01 00 00 ............x...
0174fe08 07 00 00 00 d0 01 00 00 - d8 01 00 00 dc 01 00 00 ................
0174fe18 e0 01 00 00 c8 02 00 00 - 1c 03 00 00 e4 05 00 00 ................
0174fe28 cc 01 00 00 07 00 00 00 - 00 00 00 00 cc b6 fd 7f ................
0174fe38 00 00 00 00 cc 01 00 00 - 5c fe 74 01 c8 e9 e1 77 ........\.t....w
0174fe48 0c fe 74 01 b8 fe 74 01 - ff ff ff ff ff 00 00 00 ..t...t.........
0174fe58 00 00 00 00 e0 ad 40 78 - eb a4 32 78 07 00 00 00 ......@x..2x....
0174fe68 b8 fe 74 01 00 00 00 00 - ff ff ff ff ff 00 00 00 ..t.............
0174fe78 95 2b f8 77 00 6c f8 77 - ec ff 74 01 00 00 00 00 .+.w.l.w..t.....
0174fe88 78 01 00 00 00 00 00 00 - 00 00 00 00 d4 01 00 00 x...............
0174fe98 78 01 00 00 00 00 00 00 - 00 04 00 00 00 00 00 00 x...............
0174fea8 00 00 00 00 15 31 4b 00 - 86 00 00 00 4c 00 00 00 .....1K.....L...
0174feb8 d0 01 00 00 d8 01 00 00 - dc 01 00 00 e0 01 00 00 ................
0174fec8 c8 02 00 00 1c 03 00 00 - e4 05 00 00 c0 06 00 00 ................

State Dump for Thread Id 0x46c

eax=778321fe ebx=00000003 ecx=7ffde000 edx=00000000 esi=77f837a7 edi=00000003
eip=77f837b2 esp=01d7fd24 ebp=01d7fd70 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246


function: NtWaitForMultipleObjects
77f837a7 b8e9000000 mov eax,0xe9
77f837ac 8d542404 lea edx,[esp+0x4] ss:035dd2f7=????????
77f837b0 cd2e int 2e
77f837b2 c21400 ret 0x14

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
01D7FD70 77EA9C13 01D7FD48 00000001 00000000 00000000 ntdll!NtWaitForMultipleObjects
01D7FFB4 77E8B2D8 00000004 000B64E4 7FFDE000 000B64F0 kernel32!WaitForMultipleObjects
01D7FFEC 00000000 778321FE 000B64F0 00000000 00000001 kernel32!lstrcmpiW

*----> Raw Stack Dump <----*
01d7fd24 00 9d ea 77 03 00 00 00 - 48 fd d7 01 01 00 00 00 ...w....H.......
01d7fd34 00 00 00 00 00 00 00 00 - 00 00 00 00 f0 64 0b 00 .............d..
01d7fd44 01 00 00 00 5c 02 00 00 - 60 02 00 00 70 02 00 00 ....\...`...p...
01d7fd54 00 00 00 00 3b 00 00 00 - 00 00 00 00 3b 00 00 00 ....;.......;...
01d7fd64 00 00 00 00 3b 00 00 00 - 00 00 00 00 b4 ff d7 01 ....;...........
01d7fd74 13 9c ea 77 48 fd d7 01 - 01 00 00 00 00 00 00 00 ...wH...........
01d7fd84 00 00 00 00 00 00 00 00 - b2 22 83 77 03 00 00 00 .........&quot;.w....
01d7fd94 b0 fe d7 01 00 00 00 00 - ff ff ff ff f0 64 0b 00 .............d..
01d7fda4 00 e0 fd 7f e4 64 0b 00 - 00 00 00 00 38 00 00 00 .....d......8...
01d7fdb4 00 00 00 00 00 00 00 00 - 00 00 00 00 38 00 00 00 ............8...
01d7fdc4 23 00 00 00 23 00 00 00 - e4 64 0b 00 00 e0 fd 7f #...#....d......
01d7fdd4 f0 64 0b 00 00 e0 fd 7f - 00 e0 fd 7f fe 21 83 77 .d...........!.w
01d7fde4 35 83 f8 77 50 b6 e8 77 - 1b 00 00 00 00 02 00 00 5..wP..w........
01d7fdf4 fc ff d7 01 23 00 00 00 - 38 b9 01 00 40 fd 36 82 ....#...8...@.6.
01d7fe04 00 07 00 00 ae cc 44 80 - 38 b9 01 00 40 fd 36 82 ......D.8...@.6.
01d7fe14 38 b9 01 00 40 fd 36 82 - 01 42 fd 7f 8c 03 00 00 8...@.6..B......
01d7fe24 41 d6 44 80 8c 03 00 00 - 50 aa b7 81 00 40 fd 7f A.D.....P....@..
01d7fe34 fc 07 30 c0 00 00 00 00 - cc 35 6f 5b 8c 03 00 00 ..0......5o[....
01d7fe44 cc 35 6f 5b 00 00 00 00 - 01 00 00 00 00 00 00 00 .5o[............
01d7fe54 00 50 fd 7f fc 07 30 c0 - 18 ac b8 b9 c8 d4 44 80 .P....0.......D.

State Dump for Thread Id 0x3d4

eax=01784000 ebx=01deff74 ecx=00000004 edx=00000000 esi=77f8377b edi=000002b8
eip=77f83786 esp=01deff58 ebp=01deff7c iopl=0 nv up ei ng nz ac pe cy
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000293


function: NtWaitForSingleObject
77f8377b b8ea000000 mov eax,0xea
77f83780 8d542404 lea edx,[esp+0x4] ss:0364d52b=????????
77f83784 cd2e int 2e
77f83786 c20c00 ret 0xc

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
01DEFF7C 77E8B32B 000002B8 000927C0 00000000 6367F67E ntdll!NtWaitForSingleObject
77F8316D 4AFFC033 E0850F08 89000005 FF900C42 8D0F044A kernel32!WaitForSingleObject
0424548B 00000000 00000000 00000000 00000000 00000000 <nosymbols>

State Dump for Thread Id 0x4a4

eax=000000c0 ebx=0167fccc ecx=77e8b412 edx=00000000 esi=ffffffff edi=00000557
eip=77f83197 esp=0258ffa0 ebp=0258ffb4 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246


function: NtDelayExecution
77f8318c b832000000 mov eax,0x32
77f83191 8d542404 lea edx,[esp+0x4] ss:03ded573=????????
77f83195 cd2e int 2e
77f83197 c20800 ret 0x8

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0258FFB4 77E8B2D8 0167FCCC 00000557 FFFFFFFF 0167FCCC ntdll!NtDelayExecution
0258FFEC 00000000 00000000 00000000 00000000 00000000 kernel32!lstrcmpiW

State Dump for Thread Id 0x38c

eax=7ffd5000 ebx=00000000 ecx=00000000 edx=00000000 esi=025cfed8 edi=00000000
eip=77e5805f esp=025cfe98 ebp=025cfeb0 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246


function: GetMenuItemRect
77e58046 b899110000 mov eax,0x1199
77e5804b 8d542404 lea edx,[esp+0x4] ss:03e2d46b=????????
77e5804f cd2e int 2e
77e58051 c21000 ret 0x10
77e58054 b89a110000 mov eax,0x119a
77e58059 8d542404 lea edx,[esp+0x4] ss:03e2d46b=????????
77e5805d cd2e int 2e
77e5805f c21000 ret 0x10

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
025CFEB0 76F21AFB 025CFED8 00000000 00000000 00000000 user32!GetMenuItemRect
00000001 00000000 00000000 00000000 00000000 00000000 netshell!DllGetClassObject

State Dump for Thread Id 0x15c

eax=717272d4 ebx=77e2718c ecx=004a5990 edx=00000000 esi=0260fd70 edi=77e27212
eip=77e5805f esp=0260fd04 ebp=0260fd1c iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246


function: GetMenuItemRect
77e58046 b899110000 mov eax,0x1199
77e5804b 8d542404 lea edx,[esp+0x4] ss:03e6d2d7=????????
77e5804f cd2e int 2e
77e58051 c21000 ret 0x10
77e58054 b89a110000 mov eax,0x119a
77e58059 8d542404 lea edx,[esp+0x4] ss:03e6d2d7=????????
77e5805d cd2e int 2e
77e5805f c21000 ret 0x10

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0260FD1C 766D193C 0260FD70 00000000 00000000 00000000 user32!GetMenuItemRect
0260FD90 766D182F 00020068 00000000 766D2A8C 00000001 stobject!DllGetClassObject
0260FFB4 77E8B2D8 00000000 0167FAA0 77F82B95 00000000 stobject!DllGetClassObject
0260FFEC 00000000 00000000 00000000 00000000 00000000 kernel32!lstrcmpiW

State Dump for Thread Id 0x1e4

eax=00000000 ebx=00007530 ecx=0291fd54 edx=00000000 esi=00083260 edi=00007530
eip=77f837dc esp=0291febc ebp=0291fee4 iopl=0 nv up ei ng nz ac po cy
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000297


function: ZwRemoveIoCompletion
77f837d1 b8a8000000 mov eax,0xa8
77f837d6 8d542404 lea edx,[esp+0x4] ss:0417d48f=????????
77f837da cd2e int 2e
77f837dc c21400 ret 0x14
77f837df 53 push ebx
77f837e0 f7e1 mul ecx
77f837e2 8bd8 mov ebx,eax
77f837e4 8b442408 mov eax,[esp+0x8] ss:0417d48f=????????
77f837e8 f7642414 mul dword ptr [esp+0x14] ss:0417d48f=????????
77f837ec 03d8 add ebx,eax
77f837ee 8b442408 mov eax,[esp+0x8] ss:0417d48f=????????
77f837f2 f7e1 mul ecx
77f837f4 03d3 add edx,ebx
77f837f6 5b pop ebx
77f837f7 c21000 ret 0x10

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0291FEE4 77D40090 00000168 0291FF1C 0291FF0C 0291FF14 ntdll!ZwRemoveIoCompletion
0291FF20 77D48565 00007530 0291FF60 0291FF5C 0291FF70 rpcrt4!PerformRpcInitialization
0291FF74 77D48444 77D42528 00083260 00000008 0260F5BC rpcrt4!NdrClientContextUnmarshall
0291FFA8 77D424DA 000A2520 0291FFEC 77E8B2D8 000DBD88 rpcrt4!NdrClientContextUnmarshall
0291FFB4 77E8B2D8 000DBD88 00000008 0260F5BC 000DBD88 rpcrt4!NdrConformantArrayMemorySize
0291FFEC 00000000 00000000 00000000 00000000 00000000 kernel32!lstrcmpiW

State Dump for Thread Id 0x2f8

eax=766d5767 ebx=00000000 ecx=77f83600 edx=00000000 esi=77f8377b edi=0000044c
eip=77f83786 esp=0295ff70 ebp=0295ff94 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246


function: NtWaitForSingleObject
77f8377b b8ea000000 mov eax,0xea
77f83780 8d542404 lea edx,[esp+0x4] ss:041bd543=07ff3d0e
77f83784 cd2e int 2e
77f83786 c20c00 ret 0xc

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0295FF94 77E8B32B 0000044C FFFFFFFF 00000000 766D5793 ntdll!NtWaitForSingleObject
0295FFEC 00000000 00000000 00000000 00000000 00000000 kernel32!WaitForSingleObject

State Dump for Thread Id 0x478

eax=00489810 ebx=00000480 ecx=00489810 edx=00000000 esi=02b2ff98 edi=77e168f1
eip=77e5805f esp=02b2ff58 ebp=02b2ff78 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246


function: GetMenuItemRect
77e58046 b899110000 mov eax,0x1199
77e5804b 8d542404 lea edx,[esp+0x4] ss:0438d52b=????????
77e5804f cd2e int 2e
77e58051 c21000 ret 0x10
77e58054 b89a110000 mov eax,0x119a
77e58059 8d542404 lea edx,[esp+0x4] ss:0438d52b=????????
77e5805d cd2e int 2e
77e5805f c21000 ret 0x10

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
02B2FF78 77575C36 02B2FF98 00000000 00000000 00000000 user32!GetMenuItemRect
02B2FFB4 77E8B2D8 00000480 77595428 0167EEEC 00000480 winmm!midiOutGetNumDevs
02B2FFEC 00000000 77575BB9 00000480 00000000 000000C8 kernel32!lstrcmpiW

*----> Raw Stack Dump <----*
02b2ff58 6f 69 e1 77 98 ff b2 02 - 00 00 00 00 00 00 00 00 oi.w............
02b2ff68 00 00 00 00 80 04 00 00 - 00 00 00 00 f1 68 e1 77 .............h.w
02b2ff78 b4 ff b2 02 36 5c 57 77 - 98 ff b2 02 00 00 00 00 ....6\Ww........
02b2ff88 00 00 00 00 00 00 00 00 - 28 54 59 77 ec ee 67 01 ........(TYw..g.
02b2ff98 56 01 48 00 fa c0 00 00 - 00 00 00 00 00 00 00 00 V.H.............
02b2ffa8 71 6d 4b 00 2c 02 00 00 - d0 01 00 00 ec ff b2 02 qmK.,...........
02b2ffb8 d8 b2 e8 77 80 04 00 00 - 28 54 59 77 ec ee 67 01 ...w....(TYw..g.
02b2ffc8 80 04 00 00 00 70 fd 7f - 00 00 57 77 c0 ff b2 02 .....p....Ww....
02b2ffd8 00 00 57 77 ff ff ff ff - 6c 13 ed 77 98 2a e8 77 ..Ww....l..w.*.w
02b2ffe8 00 00 00 00 00 00 00 00 - 00 00 00 00 b9 5b 57 77 .............[Ww
02b2fff8 80 04 00 00 00 00 00 00 - c8 00 00 00 00 01 00 00 ................
02b30008 ff ee ff ee 02 10 00 00 - 00 00 00 00 00 fe 00 00 ................
02b30018 00 00 10 00 00 20 00 00 - 00 02 00 00 00 20 00 00 ..... ....... ..
02b30028 30 00 00 00 ff ef fd 7f - 11 00 08 06 00 00 00 00 0...............
02b30038 00 00 00 00 00 00 00 00 - 00 00 00 00 98 05 b3 02 ................
02b30048 0f 00 00 00 f8 ff ff ff - 50 00 b3 02 50 00 b3 02 ........P...P...
02b30058 40 06 b3 02 00 00 00 00 - 00 00 00 00 00 00 00 00 @...............
02b30068 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
02b30078 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
02b30088 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

State Dump for Thread Id 0x128

eax=00000102 ebx=00000002 ecx=01010101 edx=00000000 esi=77f837a7 edi=00000002
eip=77f837b2 esp=04d6fe5c ebp=04d6fea8 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246


function: NtWaitForMultipleObjects
77f837a7 b8e9000000 mov eax,0xe9
77f837ac 8d542404 lea edx,[esp+0x4] ss:065cd42f=????????
77f837b0 cd2e int 2e
77f837b2 c21400 ret 0x14

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
04D6FEA8 77E1E97B 04D6FE80 00000001 00000000 04D6FEA0 ntdll!NtWaitForMultipleObjects
04D6FF04 77E1E9C8 04D6FED0 70C2BB38 0000EA60 00000041 user32!MsgWaitForMultipleObjectsEx
04D6FF20 70C1A793 00000001 70C2BB38 00000000 0000EA60 user32!MsgWaitForMultipleObjects
04D6FF74 70C1AB1B 04D6FFA0 04D6FFA4 04D6FFA8 04D6FF9C !Ordinal265
04D6FFAC 70C1ACDF 00000000 77E8B2D8 00000000 7FFDC000 !Ordinal293
04D6FFEC 00000000 00000000 00000000 00000000 00000000 !Ordinal293

State Dump for Thread Id 0x304

eax=00000000 ebx=80070002 ecx=00135590 edx=00000000 esi=00084020 edi=00000100
eip=77f83bb8 esp=0600fe28 ebp=0600ff74 iopl=0 nv up ei pl nz na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000206


function: NtReplyWaitReceivePortEx
77f83bad b8ac000000 mov eax,0xac
77f83bb2 8d542404 lea edx,[esp+0x4] ss:0786d3fb=????????
77f83bb6 cd2e int 2e
77f83bb8 c21400 ret 0x14

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0600FF74 77D420D9 77D42528 00084020 014EFA9C 00000022 ntdll!NtReplyWaitReceivePortEx
0600FFA8 77D424DA 00090080 0600FFEC 77E8B2D8 0009C458 rpcrt4!NdrConformantArrayMemorySize
0600FFB4 77E8B2D8 0009C458 014EFA9C 00000022 0009C458 rpcrt4!NdrConformantArrayMemorySize
0600FFEC 00000000 00000000 00000000 00000000 00000000 kernel32!lstrcmpiW

State Dump for Thread Id 0x4d8

eax=00000021 ebx=00000102 ecx=77d31f70 edx=00000000 esi=77f8318c edi=065cff74
eip=77f83197 esp=065cff60 ebp=065cff7c iopl=0 nv up ei pl nz na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000206


function: NtDelayExecution
77f8318c b832000000 mov eax,0x32
77f83191 8d542404 lea edx,[esp+0x4] ss:07e2d533=????????
77f83195 cd2e int 2e
77f83197 c20800 ret 0x8

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
065CFF7C 77EA9D5F 0000EA60 00000000 77A84D37 0000EA60 ntdll!NtDelayExecution
00007530 00000000 00000000 00000000 00000000 00000000 kernel32!Sleep

State Dump for Thread Id 0x470

eax=00000000 ebx=00007530 ecx=00000232 edx=00000000 esi=00083260 edi=00007530
eip=77f837dc esp=06f1febc ebp=06f1fee4 iopl=0 nv up ei ng nz ac po cy
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000297


function: ZwRemoveIoCompletion
77f837d1 b8a8000000 mov eax,0xa8
77f837d6 8d542404 lea edx,[esp+0x4] ss:0877d48f=????????
77f837da cd2e int 2e
77f837dc c21400 ret 0x14
77f837df 53 push ebx
77f837e0 f7e1 mul ecx
77f837e2 8bd8 mov ebx,eax
77f837e4 8b442408 mov eax,[esp+0x8] ss:0877d48f=????????
77f837e8 f7642414 mul dword ptr [esp+0x14] ss:0877d48f=????????
77f837ec 03d8 add ebx,eax
77f837ee 8b442408 mov eax,[esp+0x8] ss:0877d48f=????????
77f837f2 f7e1 mul ecx
77f837f4 03d3 add edx,ebx
77f837f6 5b pop ebx
77f837f7 c21000 ret 0x10

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
06F1FEE4 77D40090 0000016C 06F1FF1C 06F1FF0C 06F1FF14 ntdll!ZwRemoveIoCompletion
06F1FF20 77D48565 00007530 06F1FF60 06F1FF5C 06F1FF70 rpcrt4!PerformRpcInitialization
06F1FF74 77D48444 77D42528 00083260 77F838E5 00070000 rpcrt4!NdrClientContextUnmarshall
06F1FFA8 77D424DA 05D22888 06F1FFEC 77E8B2D8 0009BC08 rpcrt4!NdrClientContextUnmarshall
06F1FFB4 77E8B2D8 0009BC08 77F838E5 00070000 0009BC08 rpcrt4!NdrConformantArrayMemorySize
06F1FFEC 00000000 00000000 00000000 00000000 00000000 kernel32!lstrcmpiW

State Dump for Thread Id 0x438

eax=01340000 ebx=00959cc0 ecx=06f5fb84 edx=01520000 esi=feae0000 edi=06f5fb84
eip=00959cf2 esp=06f5faa4 ebp=00000438 iopl=0 nv up ei ng nz na po cy
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00010287


function: <nosymbols>
00959cd5 7624 jbe 00963dfb
00959cd7 a168a39a00 mov eax,[009aa368] ds:009aa368=01340000
00959cdc 8b1500309b00 mov edx,[009b3000] ds:009b3000=01520000
00959ce2 8bf0 mov esi,eax
00959ce4 57 push edi
00959ce5 8b7c240c mov edi,[esp+0xc] ss:087bd077=????????
00959ce9 2bf2 sub esi,edx
00959ceb 8b743e08 mov esi,[esi+edi+0x8] ds:087bd157=????????
00959cef 5f pop edi
00959cf0 2bf2 sub esi,edx
FAULT ->00959cf2 8b44065c mov eax,[esi+eax+0x5c] ds:02b9d5d3=????????
00959cf6 894108 mov [ecx+0x8],eax ds:087bd156=????????
00959cf9 33c0 xor eax,eax
00959cfb 5e pop esi
00959cfc c3 ret
00959cfd 90 nop
00959cfe 90 nop
00959cff 90 nop
00959d00 83ec24 sub esp,0x24
00959d03 56 push esi
00959d04 8d442410 lea eax,[esp+0x10] ss:087bd077=????????
00959d08 57 push edi

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
00000438 00000000 00000000 00000000 00000000 00000000 !<nosymbols>

*----> Raw Stack Dump <----*
06f5faa4 f4 c1 53 01 11 a9 95 00 - f4 c1 53 01 84 fb f5 06 ..S.......S.....
06f5fab4 00 00 52 01 b8 c1 53 01 - c0 9c 95 00 3b a9 95 00 ..R...S.....;...
06f5fac4 f4 c1 53 01 c0 9c 95 00 - 84 fb f5 06 84 fb f5 06 ..S.............
06f5fad4 14 b0 53 01 c0 9c 95 00 - 01 a9 95 00 b8 c1 53 01 ..S...........S.
06f5fae4 c0 9c 95 00 84 fb f5 06 - 00 00 52 01 50 b0 53 01 ..........R.P.S.
06f5faf4 c0 9c 95 00 3b a9 95 00 - 14 b0 53 01 c0 9c 95 00 ....;.....S.....
06f5fb04 84 fb f5 06 84 fb f5 06 - b4 9f 53 01 c0 9c 95 00 ..........S.....
06f5fb14 01 a9 95 00 50 b0 53 01 - c0 9c 95 00 84 fb f5 06 ....P.S.........
06f5fb24 00 00 52 01 bc b2 53 01 - c0 9c 95 00 3b a9 95 00 ..R...S.....;...
06f5fb34 b4 9f 53 01 c0 9c 95 00 - 84 fb f5 06 00 00 52 01 ..S...........R.
06f5fb44 f0 9f 53 01 c0 9c 95 00 - 3b a9 95 00 bc b2 53 01 ..S.....;.....S.
06f5fb54 c0 9c 95 00 84 fb f5 06 - 01 00 00 00 04 00 52 01 ..............R.
06f5fb64 1c 03 00 00 47 9d 95 00 - f0 9f 53 01 c0 9c 95 00 ....G.....S.....
06f5fb74 84 fb f5 06 90 fb f5 06 - 00 00 00 00 01 00 00 00 ................
06f5fb84 63 00 00 00 62 00 00 00 - 8e 02 34 00 b0 f0 2a 05 c...b.....4...*.
06f5fb94 e0 fb f5 06 95 2b f8 77 - 08 36 f8 77 47 1f 94 00 .....+.w.6.wG...
06f5fba4 00 00 00 00 bb 1f 94 00 - 62 00 00 00 cc fb f5 06 ........b.......
06f5fbb4 9c fe f5 06 01 00 00 00 - 01 00 00 00 00 00 00 00 ................
06f5fbc4 ec 02 00 00 00 00 00 00 - 8e 02 34 00 62 00 00 00 ..........4.b...
06f5fbd4 04 40 08 00 54 fc f5 06 - 6e 30 2a 05 f0 fb f5 06 .@..T...n0*.....



Application exception occurred:
App: explorer.exe (pid=1260)
When: 3/9/2003 @ 19:45:24.831
Exception number: c0000005 (access violation)

*----> System Information <----*
Computer Name: AMD2000K7VTAB
User Name: Administrator
Number of Processors: 1
Processor Type: x86 Family 6 Model 6 Stepping 2
Windows 2000 Version: 5.0
Current Build: 2195
Service Pack: 3
Current Type: Uniprocessor Free
Registered Organization:
Registered Owner:

*----> Task List <----*
0 Idle.exe
8 System.exe
156 SMSS.exe
180 CSRSS.exe
200 WINLOGON.exe
228 SERVICES.exe
240 LSASS.exe
428 svchost.exe
460 spoolsv.exe
496 svchost.exe
524 NAVAPSVC.exe
540 NPROTECT.exe
584 nvsvc32.exe
596 ooccsvc.exe
652 regsvc.exe
684 mstask.exe
724 NOPDB.exe
816 WinMgmt.exe
836 MsPMSPSv.exe
848 svchost.exe
1208 muamgr.exe
1216 pctspk.exe
1232 FGKey.exe
1252 rundll32.exe
748 PopFilter.exe
1260 explorer.exe
1244 DRWTSN32.exe
0 _Total.exe

(00400000 - 0043E000)
(77F80000 - 77FFB000)
(77DB0000 - 77E0B000)
(77E80000 - 77F31000)
(77D30000 - 77DA1000)
(77F40000 - 77F79000)
(77E10000 - 77E6F000)
(70BD0000 - 70C35000)
(78000000 - 78046000)
(71710000 - 71794000)
(75E60000 - 75E7A000)
(732E0000 - 73305000)
(23000000 - 23056000)
(10000000 - 1001A000)
(690A0000 - 690AB000)
(782F0000 - 78534000)
(00940000 - 00A01000)
(77A50000 - 77B45000)
(766F0000 - 766F7000)
(77820000 - 77827000)
(759B0000 - 759B6000)
(695E0000 - 69609000)
(779B0000 - 77A4B000)
(51000000 - 51044000)
(728A0000 - 728A6000)
(775A0000 - 77625000)

State Dump for Thread Id 0x484

eax=01340000 ebx=00959650 ecx=01520000 edx=feae0000 esi=ffe20000 edi=00000001
eip=00959674 esp=0006e4a8 ebp=00000001 iopl=0 nv up ei ng nz na po cy
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000287


function: <nosymbols>
00959655 57 push edi
00959656 bf01000000 mov edi,0x1
0095965b 85d2 test edx,edx
0095965d 741b jz 0096377a
0095965f a168a39a00 mov eax,[009aa368] ds:009aa368=01340000
00959664 8b0d00309b00 mov ecx,[009b3000] ds:009b3000=01520000
0095966a 8bf0 mov esi,eax
0095966c 2bf1 sub esi,ecx
0095966e 8b541608 mov edx,[esi+edx+0x8] ds:0034d5d3=????????
00959672 2bd1 sub edx,ecx
FAULT ->00959674 8b74025c mov esi,[edx+eax+0x5c] ds:02bad5d3=????????
00959678 eb04 jmp 0096217e
0095967a 8b74240c mov esi,[esp+0xc] ss:018dba7b=????????
0095967e 56 push esi
0095967f ff157c029b00 call dword ptr [009b027c] ds:009b027c=77e15b99
00959685 85c0 test eax,eax
00959687 8b442410 mov eax,[esp+0x10] ss:018dba7b=????????
0095968b 7405 jz 0095cf92
0095968d 39702c cmp [eax+0x2c],esi ds:02bad5d2=????????
00959690 750b jnz 0096219d
00959692 8b08 mov ecx,[eax] ds:01340000=0000000c
00959694 89748804 mov [eax+ecx*4+0x4],esi ds:02d8d5d3=????????

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
00000001 00000000 00000000 00000000 00000000 00000000 !<nosymbols>

*----> Raw Stack Dump <----*
0006e4a8 a4 e5 06 00 f4 c1 53 01 - 11 a9 95 00 f4 c1 53 01 ......S.......S.
0006e4b8 a4 e5 06 00 00 00 52 01 - b8 c1 53 01 50 96 95 00 ......R...S.P...
0006e4c8 3b a9 95 00 f4 c1 53 01 - 50 96 95 00 a4 e5 06 00 ;.....S.P.......
0006e4d8 a4 e5 06 00 14 b0 53 01 - 50 96 95 00 01 a9 95 00 ......S.P.......
0006e4e8 b8 c1 53 01 50 96 95 00 - a4 e5 06 00 00 00 52 01 ..S.P.........R.
0006e4f8 50 b0 53 01 50 96 95 00 - 3b a9 95 00 14 b0 53 01 P.S.P...;.....S.
0006e508 50 96 95 00 a4 e5 06 00 - 00 00 52 01 bc b2 53 01 P.........R...S.
0006e518 50 96 95 00 3b a9 95 00 - 50 b0 53 01 50 96 95 00 P...;...P.S.P...
0006e528 a4 e5 06 00 a4 e5 06 00 - b4 9f 53 01 50 96 95 00 ..........S.P...
0006e538 01 a9 95 00 bc b2 53 01 - 50 96 95 00 a4 e5 06 00 ......S.P.......
0006e548 00 00 52 01 f0 9f 53 01 - 50 96 95 00 3b a9 95 00 ..R...S.P...;...
0006e558 b4 9f 53 01 50 96 95 00 - a4 e5 06 00 00 00 52 01 ..S.P.........R.
0006e568 0a 00 00 00 04 00 52 01 - 71 97 95 00 f0 9f 53 01 ......R.q.....S.
0006e578 50 96 95 00 a4 e5 06 00 - 00 00 00 00 00 00 00 00 P...............
0006e588 01 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0006e598 00 00 00 00 00 00 00 00 - 00 00 00 00 06 00 00 00 ................
0006e5a8 42 02 2b 00 e0 00 2d 00 - 42 01 2d 00 54 01 2e 00 B.+...-.B.-.T...
0006e5b8 dc 00 2f 00 76 02 32 00 - 00 00 00 00 00 00 00 00 ../.v.2.........
0006e5c8 00 00 00 00 00 00 00 00 - 00 00 00 00 21 ad 96 00 ............!...
0006e5d8 80 00 03 00 00 00 00 00 - 05 80 09 18 01 00 00 00 ................

State Dump for Thread Id 0x334

eax=77d424c2 ebx=00083f70 ecx=00083fdc edx=00000000 esi=00084020 edi=00000100
eip=77f83bb8 esp=014efe28 ebp=014eff74 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000202


function: NtReplyWaitReceivePortEx
77f83bad b8ac000000 mov eax,0xac
77f83bb2 8d542404 lea edx,[esp+0x4] ss:02d5d3fb=????????
77f83bb6 cd2e int 2e
77f83bb8 c21400 ret 0x14

*----> Stack Back Trace *** Truncated EOF <----*
 
Hi,
I'm using a Windows NT 4.0 with a service pack6 Build 1381. My problem is not with my PC but when I tried installing the application in another PC. I am unsure what OS the other PC to which I am installing to is using, but I tried compiling the program and creating the install package in the PC I am installing to. With this, executing my application did not cause any Dr. Watson errors. I hope this could determine what caused my application to get a Dr. Watson C0000005 error in other PC's.
 
Possible solution or pointer for help

I had the same problems when developing a database using Windows 2000 and rolling out to users with NT. Although both were using Access 2000 the NT version would crash with an access violation.

Access 2000 for Win2000 and NT use different builds (or at least that's what our IT team told me) but should still work. Our solution was to update the Microsoft JET SQL components on the NT machines.

I will update when I find out more.
 
Not sure how much help you can get with that problem on a VBA forum, there is a VBA forum somewhere round here.

I'm not 100% sure but there are some memory addresses that are reserved and they start in the low zeroes, I think the problem is that the program is trying to access reserved memory, but I could be totally wrong.

And to whoever it is who posted all those error messages up there, the Lord of the Rings trilogy is more readable!

 
There is a bug in the bounds checking algorithm which checks memory access. As the object in question reside close to a memory page boundary the checker falsely returns that the current memory access is out of bounds (C0000005).

Microsoft is well aware of this error as it is happening in every Office product and every Visual Tool created app. There are patches by product at MS.

Ouch! That is really some prick MS put in that service pak.
When is the sp fix coming? Bill? You there?

Of course I am just assuming that there is a SP coming soon!
 
Funny, this is the exact same error I have got and i was trying to find out if any body ahd solution fot or suggestion for this error. I get the &quot;exception-access_violation&quot; error/bug when I try to run my BO report (which has a VBA macro to it). My macro goes and fetches the &quot;computer name&quot; and &quot;user name&quot; and compares it to two hard-coded strings which gives two computer names. If it is equal then, the macro goes and saves one copy on to that particular computer's disk, then it saves one copy on to my local disk . My macro also appends the &quot;current date/time stamp to the document name and posts it to &quot;corporate documents&quot;. In order to get &quot;computer name&quot; etc.,, my macro goes and accesses some DLLs. My first guess was, it didn't like me accessing the DLLs.
Does any body have a solution to my problem? Please help.
 
This is what my error-log file says regarding the &quot;exception_access_violation&quot; bug appearing at the end of the refresh.

----------------------------------------------------------

1 processor Pentium Family 6 Model 8 Stepping 6
Windows 2000 Workstation v5.1 build 2600 (Service Pack 1)
Physical Total/Avail: 261.352 Kb / 90.324 Kb
Temp directory C:\DOCUME~1\AV2272\LOCALS~1\Temp\ (3712608 Kb available)
'Unknown' video card
1024 x 768 with 65536 colors
------------------------------------------------------------------


Unhandled Exception
Code: c0000005
Description: EXCEPTION_ACCESS_VIOLATION

Call stack:
------------------------------------------------------------------
Module at 0x73dd0000: C:\WINDOWS\System32\MFC42.DLL v 6.0.8665.0 [English (United States)]
address: 0x73dd7085
address: 0x73e5c0e6
Module at 0x33af0000: C:\Program Files\Business Objects\BusinessObjects 5.0\report50.dll v 5.1.7.42 [English (United States)]
address: 0x33b1532c
Module at 0x00400000: C:\Program Files\Business Objects\BusinessObjects 5.0\BUSOBJ.EXE v 5.1.7.42 [English (United States)]
address: 0x00402614
Module at 0x73dd0000: C:\WINDOWS\System32\MFC42.DLL v 6.0.8665.0 [English (United States)]
address: 0x73dd23d8
address: 0x73dd22ae
address: 0x73dd2c99
address: 0x73dd3333
Module at 0x00400000: C:\Program Files\Business Objects\BusinessObjects 5.0\BUSOBJ.EXE v 5.1.7.42 [English (United States)]
address: 0x00427bca
Module at 0x73dd0000: C:\WINDOWS\System32\MFC42.DLL v 6.0.8665.0 [English (United States)]
address: 0x73dd2c66
Module at 0x00400000: C:\Program Files\Business Objects\BusinessObjects 5.0\BUSOBJ.EXE v 5.1.7.42 [English (United States)]
address: 0x0042472d
Module at 0x73dd0000: C:\WINDOWS\System32\MFC42.DLL v 6.0.8665.0 [English (United States)]
address: 0x73dd2ba2
Module at 0x00400000: C:\Program Files\Business Objects\BusinessObjects 5.0\BUSOBJ.EXE v 5.1.7.42 [English (United States)]
address: 0x004107f9
Module at 0x73dd0000: C:\WINDOWS\System32\MFC42.DLL v 6.0.8665.0 [English (United States)]
address: 0x73dd2976
address: 0x73dd29d7
address: 0x73dd1cea
address: 0x73dd1c73
address: 0x73de14e7
address: 0x73dd1cea
address: 0x73dd1c73
address: 0x73dd1bfb
address: 0x73dd1bba
Module at 0x77d40000: C:\WINDOWS\system32\USER32.dll v 5.1.2600.1255 [English (United States)]
address: 0x77d43a50
address: 0x77d43b1f
address: 0x77d45453
address: 0x77d454b4
Module at 0x77340000: C:\WINDOWS\system32\COMCTL32.dll v 5.82.2800.1106 [English (United States)]
address: 0x7735c4b4
address: 0x7735c3a3
Module at 0x77d40000: C:\WINDOWS\system32\USER32.dll v 5.1.2600.1255 [English (United States)]
address: 0x77d43a50
address: 0x77d43b1f
address: 0x77d45b2c
address: 0x77d45f73
Module at 0x73dd0000: C:\WINDOWS\System32\MFC42.DLL v 6.0.8665.0 [English (United States)]
address: 0x73dd20f2
address: 0x73dd1d01
address: 0x73dd2b0e
Module at 0x347d0000: C:\Program Files\Business Objects\BusinessObjects 5.0\uitls50.dll v 5.1.7.42 [English (United States)]
address: 0x347d1f78
Module at 0x73dd0000: C:\WINDOWS\System32\MFC42.DLL v 6.0.8665.0 [English (United States)]
address: 0x73dd1c73
address: 0x73dd1bfb
address: 0x73dd1bba
Module at 0x77d40000: C:\WINDOWS\system32\USER32.dll v 5.1.2600.1255 [English (United States)]
address: 0x77d43a50
address: 0x77d43b1f
address: 0x77d43d79
address: 0x77d43ddf
address: 0x77d65906
Module at 0x73dd0000: C:\WINDOWS\System32\MFC42.DLL v 6.0.8665.0 [English (United States)]
address: 0x73de690f
address: 0x73dd1448
Module at 0x33af0000: C:\Program Files\Business Objects\BusinessObjects 5.0\report50.dll v 5.1.7.42 [English (United States)]
address: 0x33c99ada
Module at 0x77e60000: C:\WINDOWS\system32\kernel32.dll v 5.1.2600.1106 [English (United States)]
address: 0x77e814c7
------------------------------------------------------------------
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top