Access violation (0xC000000​5) at EIP=0x7C82​19BE

plz help me to fix this crash

duplicate
LabVIEW Champion . Do more with less code and in less time .

Similar Messages

  • Exception: Access violation (0xC000000​05) at EIP=0x0C1E​46A1

    Hola a todos
    Tengo mi aplicación cliente instalada en un equipo en una red tcp/ip, y después de unos minutos me aparece este error "Exception: Access violation (0xC00000005) at EIP=0x0C1E46A1".
    Alguien me podría ayudar
    Saludos

    Hola Rafa_Mata,
    De hecho un error asi es un poco generico. Podrias brindar detalles del software que utilizas, que hace el programa, que toolkits utilizas, etc.
    Saludos,
    Eric NI

  • SeqEdit Crash - Access violation (0xC000000​5)

    I have a very nasty problem: when I open TestStand and click on any step that uses LabVIEW adapter, TS crashes with this message:
    It happens ONLY when I click on the step with LabVIEW Adapter. Everything else works fine.
    ... Help!
    Solved!
    Go to Solution.

    Ok, crash report indicated some problem with LabVIEW Run-Time Engine (missing ""tdtable.tdr" file to be exact). Reinstalling RTE helped. Interestingly, the missing file belonged to 2014 RTE, and it caused crash even when 2013 RTE (or LV 2013 Dev System) was set in LabVIEW Adapter options.
    (Also: thanks to Daniel-E for helping with this issue )

  • Labview crashes with access violation(0xc00000050at EIP=0x7c8219a6

    when i poen my project in labview ,it crashes with "access violation(0xc00000050at EIP=0x7c8219a6.why is this happening?how can i open my project?

    Probably nothing to do with it but I had some dodgy memory, and windows would complain that there was an error to do with that exact memory location: c0000005

  • Access violation (0xC0000005) at EIP=0x012B60E6 within a dynamically called VI

    Hi
    I have been seeing Access violation (0xC0000005) at EIP=0x012B60E6 within a dynamically called VI.
    The VI is called by reference and is strictly typed.
    The VI controls a function generator, a robot and a microcontroller device.
    All of the above are synchronised using functional globals.
    If I let the code run the FG will operate so I know the top level dynamic VI has defiantly been called and successfully entered, however within that VI as other VI’s are called (there are many) LV crashes with access violation.
    The VI's within the top level VI are using HiD communicatiuoins over USB with the peripheral instrumants.
    The LV crashes are totally random and sometimes the code will operate until the end and close down successfully.
    I can only seem to guarantee smooth operation if I set a breakpoint within the top level VI, then the entire system runs perfectly.
    In fact it seems that even if I remove the breakpoint (after the first break) and close the VI the system will continue to run until close.
    Has anyone any ideas? I have run out!

    Hi MAC1,
    I have been looking at your issue and wanted to ask if you are calling the VI's into Teststand, using the LabVIEW adapter?
    If this is the case, it may be worth looking at another forum post regarding the issue.
    LabVIEW Access Violations- Teststand
    I am currently looking into what could have caused this access violation. 
    If you could provide any further information in regards to the top level VI or if you could post it on here, that would be really useful.
    Regards,
    Dom C

  • Access violation (0xC0000005) at EIP=0x0534BABC when launching Exe

    Hi All,
    I am facing "Access violation (0xC0000005) at EIP=0x0534BABC" issue when I tried to launch my exe. Earlier versions of the exe were running fine until I added Email notification features using .net SMTP APIs and built it again. 
    System,
    Development and Deployment systems are different. I am able to run source code on both systems and Exe on Developement system. But exe is not working in Deployment system.
    Exception,
    I have attached the sanpshot of crash report pop-up and Log Report of the exception.
    Please help!
    Anandelamaran Duraisamy,
    Senior Project Engineer,
    Soliton Technologies (P) Ltd,
    www.solitontech.com
    Attachments:
    Crash Report.png ‏11 KB
    Crash Report.zip ‏19 KB

    Additional details,
    When I tried "Run as administrator", I could see the exe icon on the task bar for few seconds then it disappears. It basically fails to launch, also I don't get any error message. 
    The Exe is created in development PC which runs 64 bit Window 7 and 32 bit LabVIEW. The deployment system has 32 bit Windows 7 and 32 bit LabVIEW. I hope it doesn't matter as far as my LabVIEW installations are 32 bit in both systems.
    Anandelamaran Duraisamy,
    Senior Project Engineer,
    Soliton Technologies (P) Ltd,
    www.solitontech.com

  • Access violation error with 1.4.0

    Our client/server application (RMI) ran fine in 1.3.1. When we compiled and deployed with 1.4.0, an error of "access violation" were thrown by Windows NT or Windown 2000 at run time. Stack trace posted as below. Anyone has any ideas on the cause of it. Thanks you very much.
    Application exception occurred:
    App: (pid=346)
    When: 6/18/2002 @ 17:18:40.166
    Exception number: c0000005 (access violation)
    ----> System Information <----
    Computer Name: PAUL
    User Name: paul
    Number of Processors: 1
    Processor Type: x86 Family 6 Model 4 Stepping 2
    Windows Version: 4.0
    Current Build: 1381
    Service Pack: 6
    Current Type: Uniprocessor Free
    Registered Organization: Quarry Technologies
    Registered Owner: Quarry Technologies
    ----> Task List <----
    0 Idle.exe
    2 System.exe
    20 SMSS.exe
    24 CSRSS.exe
    34 winlogon.exe
    40 SERVICES.exe
    43 LSASS.exe
    68 SPOOLSS.exe
    81 defwatch.exe
    86 inetd32.exe
    93 MGABG.exe
    94 mgasc.exe
    97 mgactrl.exe
    99 rtvscan.exe
    45 rtsserv.exe
    112 RPCSS.exe
    117 portserv.exe
    127 wtxregds.exe
    130 WinVNC.exe
    137 PSTORES.exe
    140 mstask.exe
    144 NOPDB.exe
    200 NDDEAGNT.exe
    122 explorer.exe
    186 systray.exe
    187 mgaqdesk.exe
    44 vptray.exe
    113 point32.exe
    91 realplay.exe
    209 winampa.exe
    211 loadqm.exe
    213 aim.exe
    215 msmsgs.exe
    218 wftpd32.exe
    192 OSA.exe
    238 esserver.exe
    240 vpexrt.exe
    241 CMD.exe
    63 vncviewer.exe
    255 JBuilder.exe
    277 DDHELP.exe
    274 CMD.exe
    287 CMD.exe
    293 SYSLOGD.exe
    313 SYSLOGD.exe
    270 P4Win.exe
    310 javaw.exe
    346 javaw.exe
    443 javaw.exe
    433 javaw.exe
    354 DRWTSN32.exe
    0 _Total.exe
    (00400000 - 00406000)
    (77f60000 - 77fbe000) dll\ntdll.dbg
    (77dc0000 - 77dff000) dll\advapi32.dbg
    (77f00000 - 77f5e000) dll\kernel32.dbg
    (77e70000 - 77ec5000) dll\user32.dbg
    (77ed0000 - 77efc000) dll\gdi32.dbg
    (77e10000 - 77e67000) dll\rpcrt4.dbg
    (78000000 - 78046000)
    (6d330000 - 6d330000)
    (77fd0000 - 77ffa000) dll\winmm.dbg
    (6bd00000 - 6bd14000) K:\DDK\lib\i386\free\cm-pci.dll
    (6d1d0000 - 6d1d7000)
    (6d300000 - 6d30d000)
    (6d210000 - 6d228000)
    (6d320000 - 6d32d000)
    (6d2d0000 - 6d2dd000)
    (776d0000 - 776d8000) dll\wsock32.dbg
    (776b0000 - 776c4000) dll\ws2_32.dbg
    (776a0000 - 776a7000) dll\ws2help.dbg
    (74ff0000 - 74ffe000) dll\rnr20.dbg
    (77bf0000 - 77bf7000) dll\rpcltc1.dbg
    (77660000 - 7766f000) dll\msafd.dbg
    (77690000 - 77699000) dll\wshtcpip.dbg
    (6d2f0000 - 6d2f5000)
    (6d000000 - 6d0f6000)
    (77c00000 - 77c18000) drv\winspool.dbg
    (76ab0000 - 76ab5000) dll\imm32.dbg
    (77b20000 - 77bd7000) dll\ole32.dbg
    (6d180000 - 6d1d0000)
    State Dump for Thread Id 0x18b
    eax=6d3fb8cc ebx=00000000 ecx=00762700 edx=00000000 esi=0000012c edi=00000000
    eip=77f682db esp=0006fc10 ebp=0006fc34 iopl=0 nv up ei pl zr na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
    function: NtWaitForSingleObject
    77f682d0 b8c5000000 mov eax,0xc5
    77f682d5 8d542404 lea edx,[esp+0x4] ss:00f6e617=????????
    77f682d9 cd2e int 2e
    77f682db c20c00 ret 0xc
    77f682de 8bc0 mov eax,eax
    ----> Stack Back Trace <----
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    0006fc34 77f04f37 0000012c ffffffff 00000000 6d38b719 ntdll!NtWaitForSingleObject
    0006fc7c 6d3b14c0 00000000 ffffffff 0076219c 007e0330 kernel32!WaitForSingleObject
    ----> Raw Stack Dump <----
    0006fc10 a0 cc f1 77 2c 01 00 00 - 00 00 00 00 00 00 00 00 ...w,...........
    0006fc20 50 05 7e 00 10 2f 76 00 - 30 03 7e 00 00 30 00 00 P.~../v.0.~..0..
    0006fc30 04 01 00 00 7c fc 06 00 - 37 4f f0 77 2c 01 00 00 ....|...7O.w,...
    0006fc40 ff ff ff ff 00 00 00 00 - 19 b7 38 6d 2c 01 00 00 ..........8m,...
    0006fc50 ff ff ff ff 9c 21 76 00 - 10 2f 76 00 a0 21 76 00 .....!v../v..!v.
    0006fc60 00 00 00 00 02 00 00 00 - 00 00 00 00 30 03 7e 00 ............0.~.
    0006fc70 30 03 7e 00 10 2f 76 00 - 01 00 00 00 c0 fc 06 00 0.~../v.........
    0006fc80 c0 14 3b 6d 00 00 00 00 - ff ff ff ff 9c 21 76 00 ..;m.........!v.
    0006fc90 30 03 7e 00 30 03 7e 00 - 00 00 00 00 30 03 7e 00 0.~.0.~.....0.~.
    0006fca0 d0 fc 06 00 05 86 36 6d - 5c 05 41 6d d8 fc 06 00 ......6m\.Am....
    0006fcb0 00 00 00 00 00 00 00 00 - 75 85 36 6d 30 03 7e 00 ........u.6m0.~.
    0006fcc0 d0 fc 06 00 b7 85 36 6d - 50 9c 77 00 30 03 7e 00 ......6mP.w.0.~.
    0006fcd0 14 ff 06 00 d2 14 40 00 - bc 03 7e 00 56 00 00 00 ......@...~.V...
    0006fce0 10 28 07 00 00 00 00 00 - 43 3a 5c 6a 32 73 64 6b .(......C:\j2sdk
    0006fcf0 31 2e 34 2e 30 5c 6a 72 - 65 00 6a 61 76 61 77 2e 1.4.0\jre.javaw.
    0006fd00 65 78 65 00 12 00 00 00 - a0 fe 06 00 00 e0 fd 7f exe.............
    0006fd10 00 00 00 00 a9 a0 f6 77 - 9c fe 06 00 00 00 00 80 .......w........
    0006fd20 70 fe 06 00 00 e0 fd 7f - 00 f0 fd 7f 00 00 00 00 p...............
    0006fd30 5c 00 52 00 65 00 67 00 - 69 00 73 00 74 00 72 00 \.R.e.g.i.s.t.r.
    0006fd40 79 00 5c 00 4d 00 61 00 - 63 00 68 00 69 00 6e 00 y.\.M.a.c.h.i.n.
    State Dump for Thread Id 0x156
    eax=02c29d90 ebx=007648d0 ecx=02c29d90 edx=00000009 esi=02c29d90 edi=26dbfd64
    eip=6d3318d5 esp=26dbfc6c ebp=26dbfc88 iopl=0 nv up ei pl nz na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000206
    function: <nosymbols>
    6d3318c0 8d4df0 lea ecx,[ebp-0x10] ss:27cbe68e=????????
    6d3318c3 e875000000 call 6d33193d
    6d3318c8 5f pop edi
    6d3318c9 5e pop esi
    6d3318ca c9 leave
    6d3318cb c3 ret
    6d3318cc 56 push esi
    6d3318cd 8bf1 mov esi,ecx
    6d3318cf 8b5604 mov edx,[esi+0x4] ds:03b28796=????????
    6d3318d2 83c208 add edx,0x8
    FAULT ->6d3318d5 8b4210 mov eax,[edx+0x10] ds:00efea0f=????????
    6d3318d8 85c0 test eax,eax
    6d3318da 7f25 jg 6d331901
    6d3318dc 7d1b jge 6d3318f9
    6d3318de 83c9ff or ecx,0xff
    6d3318e1 6a04 push 0x4
    6d3318e3 2bc8 sub ecx,eax
    6d3318e5 8b4608 mov eax,[esi+0x8] ds:03b28796=????????
    6d3318e8 d3e0 shl eax,cl
    6d3318ea 8b4a4c mov ecx,[edx+0x4c] ds:00efea0f=????????
    6d3318ed 8d440807 lea eax,[eax+ecx+0x7] ds:03b28797=????????
    6d3318f1 59 pop ecx
    ----> Stack Back Trace <----
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    26dbfc88 6d34d03a 02c29d90 02c37c48 22fc8df4 02c37c48 <nosymbols>
    State Dump for Thread Id 0x160
    eax=00000004 ebx=00000000 ecx=052c2748 edx=00000000 esi=00000320 edi=00000000
    eip=77f682db esp=26dffc10 ebp=26dffc34 iopl=0 nv up ei pl zr na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
    function: NtWaitForSingleObject
    77f682d0 b8c5000000 mov eax,0xc5
    77f682d5 8d542404 lea edx,[esp+0x4] ss:27cfe617=????????
    77f682d9 cd2e int 2e
    77f682db c20c00 ret 0xc
    77f682de 8bc0 mov eax,eax
    ----> Stack Back Trace <----
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    26dffc34 77f04f37 00000320 ffffffff 00000000 6d38d2fe ntdll!NtWaitForSingleObject
    26dffc7c 6d39ead0 00000000 00000000 00000001 00767d30 kernel32!WaitForSingleObject
    State Dump for Thread Id 0x11a
    eax=00000004 ebx=00000000 ecx=052c2a60 edx=00000000 esi=00000430 edi=00000000
    eip=77f682db esp=26e3fbd4 ebp=26e3fbf8 iopl=0 nv up ei pl zr na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
    function: NtWaitForSingleObject
    77f682d0 b8c5000000 mov eax,0xc5
    77f682d5 8d542404 lea edx,[esp+0x4] ss:27d3e5db=????????
    77f682d9 cd2e int 2e
    77f682db c20c00 ret 0xc
    77f682de 8bc0 mov eax,eax
    ----> Stack Back Trace <----
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    26e3fbf8 77f04f37 00000430 ffffffff 00000000 6d38d2fe ntdll!NtWaitForSingleObject
    26e3fc40 6d39ead0 00000000 00000000 00000001 007670b0 kernel32!WaitForSingleObject
    ----> Raw Stack Dump <----
    26e3fbd4 a0 cc f1 77 30 04 00 00 - 00 00 00 00 00 00 00 00 ...w0...........
    26e3fbe4 b0 70 76 00 4c b3 75 00 - 10 87 76 00 30 04 00 00 .pv.L.u...v.0...
    26e3fbf4 2a 14 39 6d 40 fc e3 26 - 37 4f f0 77 30 04 00 00 *.9m@..&7O.w0...
    26e3fc04 ff ff ff ff 00 00 00 00 - fe d2 38 6d 30 04 00 00 ..........8m0...
    26e3fc14 ff ff ff ff 00 00 00 00 - 40 27 2c 05 b0 70 76 00 ........@',..pv.
    26e3fc24 00 00 00 00 b0 70 76 00 - 30 04 00 00 00 00 00 00 .....pv.0.......
    26e3fc34 f4 8f 76 00 02 00 00 00 - 00 00 00 00 64 fc e3 26 ..v.........d..&
    26e3fc44 d0 ea 39 6d 00 00 00 00 - 00 00 00 00 01 00 00 00 ..9m............
    26e3fc54 b0 70 76 00 40 27 2c 05 - b0 70 76 00 70 3c b3 22 .pv.@',..pv.p<."
    26e3fc64 84 fc e3 26 aa e7 36 6d - 00 88 76 00 00 00 00 00 ...&..6m..v.....
    26e3fc74 00 00 00 00 b0 70 76 00 - b0 70 76 00 ac 3c b3 22 .....pv..pv..<."
    26e3fc84 b8 fc e3 26 0d 96 ab 00 - b0 70 76 00 d0 fc e3 26 ...&.....pv....&
    26e3fc94 00 00 00 00 00 00 00 00 - 9c fc e3 26 00 00 00 00 ...........&....
    26e3fca4 d0 fc e3 26 c8 52 b7 22 - 00 00 00 00 70 3c b3 22 ...&.R."....p<."
    26e3fcb4 c8 fc e3 26 f8 fc e3 26 - 9f 2d ab 00 00 00 00 00 ...&...&.-......
    26e3fcc4 51 76 ab 00 00 00 00 00 - 00 00 00 00 40 27 2c 05 Qv..........@',.
    26e3fcd4 03 00 00 00 40 27 2c 05 - d4 fc e3 26 34 0a b8 22 ....@',....&4.."
    26e3fce4 20 fd e3 26 78 0c b8 22 - 00 00 00 00 c8 09 b8 22 ..&x.."......."
    26e3fcf4 18 fd e3 26 40 fd e3 26 - 76 2e ab 00 00 00 00 00 ...&@..&v.......
    26e3fd04 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    State Dump for Thread Id 0x1ca
    eax=00000000 ebx=00000000 ecx=00000001 edx=00000000 esi=26e7ff28 edi=00000000
    eip=77f6791f esp=26e7ff14 ebp=26e7ff30 iopl=0 nv up ei pl nz na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000206
    function: NtDelayExecution
    77f67914 b827000000 mov eax,0x27
    77f67919 8d542404 lea edx,[esp+0x4] ss:27d7e91b=????????
    77f6791d cd2e int 2e
    77f6791f c20800 ret 0x8
    77f67922 8bc0 mov eax,eax
    *----> Stack Back Trace <----*
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    26e7ff30 77f1cebe 0000000a 00000000 6d39138c 0000000a ntdll!NtDelayExecution
    26e7ff5c 6d3af3f5 0076a380 0000000a 00000000 00000000 kernel32!Sleep
    State Dump for Thread Id 0x1c8
    eax=78002432 ebx=00000000 ecx=6d38ac38 edx=00000000 esi=00000120 edi=00000000
    eip=77f682db esp=26ebfef4 ebp=26ebff18 iopl=0 nv up ei pl zr na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
    function: NtWaitForSingleObject
    77f682d0 b8c5000000 mov eax,0xc5
    77f682d5 8d542404 lea edx,[esp+0x4] ss:27dbe8fb=????????
    77f682d9 cd2e int 2e
    77f682db c20c00 ret 0xc
    77f682de 8bc0 mov eax,eax
    *----> Stack Back Trace <----*
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    26ebff18 77f04f37 00000120 ffffffff 00000000 6d38b6bf ntdll!NtWaitForSingleObject
    26ebff60 6d3af53e 00000001 ffffffff 22b40f78 0076a210 kernel32!WaitForSingleObject
    State Dump for Thread Id 0x15e
    eax=78002432 ebx=00000000 ecx=0006fa28 edx=00000000 esi=0000069c edi=00000000
    eip=77f682db esp=26effe3c ebp=26effe60 iopl=0 nv up ei pl zr na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
    function: NtWaitForSingleObject
    77f682d0 b8c5000000 mov eax,0xc5
    77f682d5 8d542404 lea edx,[esp+0x4] ss:27dfe843=????????
    77f682d9 cd2e int 2e
    77f682db c20c00 ret 0xc
    77f682de 8bc0 mov eax,eax
    *----> Stack Back Trace <----*
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    26effe60 77f04f37 0000069c ffffffff 00000000 6d390d49 ntdll!NtWaitForSingleObject
    26effea0 6d390d8d 00000001 6d38e927 0076b370 0076b2c0 kernel32!WaitForSingleObject
    State Dump for Thread Id 0x1c4
    eax=00000001 ebx=00000000 ecx=26f3fc28 edx=00000000 esi=000001f4 edi=00000000
    eip=77f682db esp=26f3fe80 ebp=26f3fea4 iopl=0 nv up ei pl zr na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
    function: NtWaitForSingleObject
    77f682d0 b8c5000000 mov eax,0xc5
    77f682d5 8d542404 lea edx,[esp+0x4] ss:27e3e887=????????
    77f682d9 cd2e int 2e
    77f682db c20c00 ret 0xc
    77f682de 8bc0 mov eax,eax
    *----> Stack Back Trace <----*
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    26f3fea4 77f04f37 000001f4 ffffffff 00000000 6d38b719 ntdll!NtWaitForSingleObject
    26f3feec 6d3c1f67 00000000 ffffffff 0076b190 01e37000 kernel32!WaitForSingleObject
    *----> Raw Stack Dump <----*
    26f3fe80 a0 cc f1 77 f4 01 00 00 - 00 00 00 00 00 00 00 00 ...w............
    26f3fe90 10 c3 76 00 50 29 76 00 - 30 b0 76 00 30 b0 76 00 ..v.P)v.0.v.0.v.
    26f3fea0 e0 c3 76 00 ec fe f3 26 - 37 4f f0 77 f4 01 00 00 ..v....&7O.w....
    26f3feb0 ff ff ff ff 00 00 00 00 - 19 b7 38 6d f4 01 00 00 ..........8m....
    26f3fec0 ff ff ff ff 90 b1 76 00 - 90 b1 76 00 50 29 76 00 ......v...v.P)v.
    26f3fed0 00 00 00 00 02 00 00 00 - cc 03 00 00 30 b0 76 00 ............0.v.
    26f3fee0 30 b0 76 00 50 29 76 00 - 01 00 00 00 00 00 00 00 0.v.P)v.........
    26f3fef0 67 1f 3c 6d 00 00 00 00 - ff ff ff ff 90 b1 76 00 g.<m..........v.
    26f3ff00 00 70 e3 01 40 ff f3 26 - 00 00 00 00 46 29 3c 6d .p..@..&....F)<m
    26f3ff10 e0 b0 76 00 30 b0 76 00 - 80 c2 76 00 30 b0 76 00 ..v.0.v...v.0.v.
    26f3ff20 e0 c3 76 00 00 d8 76 00 - 08 d8 76 00 f4 db 76 00 ..v...v...v...v.
    26f3ff30 54 ff f3 26 30 b0 76 00 - 30 b0 76 00 08 d8 76 00 T..&0.v.0.v...v.
    26f3ff40 6c ff f3 26 02 f9 3a 6d - 30 b0 76 00 30 b0 76 00 l..&..:m0.v.0.v.
    26f3ff50 30 b0 76 00 30 b0 76 00 - e0 c3 76 00 00 d8 76 00 0.v.0.v...v...v.
    26f3ff60 08 d8 76 00 f4 db 76 00 - c0 c3 76 00 84 ff f3 26 ..v...v...v....&
    26f3ff70 d2 f8 3a 6d 18 88 b5 02 - 30 b0 76 00 cb fe 38 6d ..:m....0.v...8m
    26f3ff80 80 c2 76 00 b8 ff f3 26 - 8d 24 00 78 30 b0 76 00 ..v....&.$.x0.v.
    26f3ff90 18 88 b5 02 d0 f8 06 00 - 80 c2 76 00 ff ff ff ff ..........v.....
    26f3ffa0 90 ff f3 26 91 76 11 80 - dc ff f3 26 6a f5 00 78 ...&.v.....&j..x
    26f3ffb0 d0 33 03 78 00 00 00 00 - ec ff f3 26 de 4e f0 77 .3.x.......&.N.w
    State Dump for Thread Id 0x1ac
    eax=00000004 ebx=00000000 ecx=02b73c40 edx=00000000 esi=00000500 edi=2717fbfc
    eip=77f682db esp=2717fbe0 ebp=2717fc04 iopl=0 ov up ei pl nz na pe cy
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000a03
    function: NtWaitForSingleObject
    77f682d0 b8c5000000 mov eax,0xc5
    77f682d5 8d542404 lea edx,[esp+0x4] ss:2807e5e7=????????
    77f682d9 cd2e int 2e
    77f682db c20c00 ret 0xc
    77f682de 8bc0 mov eax,eax
    *----> Stack Back Trace <----*
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    2717fc04 77f04f37 00000500 000493e0 00000000 6d38d2fe ntdll!NtWaitForSingleObject
    2717fc4c 6d39ead0 000493e0 00000000 00000001 0077f5e0 kernel32!WaitForSingleObject
    *----> Raw Stack Dump <----*
    2717fbe0 a0 cc f1 77 00 05 00 00 - 00 00 00 00 fc fb 17 27 ...w...........'
    2717fbf0 e0 f5 77 00 ec b2 75 00 - f0 f4 77 00 00 a2 2f 4d ..w...u...w.../M
    2717fc00 ff ff ff ff 4c fc 17 27 - 37 4f f0 77 00 05 00 00 ....L..'7O.w....
    2717fc10 e0 93 04 00 00 00 00 00 - fe d2 38 6d 00 05 00 00 ..........8m....
    2717fc20 e0 93 04 00 00 00 00 00 - 38 b1 32 05 e0 f5 77 00 ........8.2...w.
    2717fc30 00 00 00 00 e0 f5 77 00 - 00 05 00 00 00 00 00 00 ......w.........
    2717fc40 02 00 00 00 02 00 00 00 - 00 00 00 00 70 fc 17 27 ............p..'
    2717fc50 d0 ea 39 6d e0 93 04 00 - 00 00 00 00 01 00 00 00 ..9m............
    2717fc60 e0 f5 77 00 38 b1 32 05 - e0 f5 77 00 70 3c b3 22 ..w.8.2...w.p<."
    2717fc70 90 fc 17 27 aa e7 36 6d - a0 e3 76 00 e0 93 04 00 ...'..6m..v.....
    2717fc80 00 00 00 00 e0 f5 77 00 - e0 f5 77 00 ac 3c b3 22 ......w...w..<."
    2717fc90 c4 fc 17 27 0d 96 ab 00 - e0 f5 77 00 dc fc 17 27 ...'......w....'
    2717fca0 e0 93 04 00 00 00 00 00 - a8 fc 17 27 ac 3c b3 22 ...........'.<."
    2717fcb0 dc fc 17 27 c8 52 b7 22 - 00 00 00 00 70 3c b3 22 ...'.R."....p<."
    2717fcc0 d4 fc 17 27 0c fd 17 27 - 9f 2d ab 00 00 00 00 00 ...'...'.-......
    2717fcd0 51 76 ab 00 e0 93 04 00 - 00 00 00 00 c0 ae 32 05 Qv............2.
    2717fce0 01 00 00 00 00 00 00 00 - 01 00 00 00 c0 ae 32 05 ..............2.
    2717fcf0 e0 fc 17 27 b9 c8 d6 22 - 3c fd 17 27 60 ca d6 22 ...'..."<..'`.."
    2717fd00 00 00 00 00 b0 c7 d6 22 - 3c fd 17 27 5c fd 17 27 ......."<..'\..'
    2717fd10 9f 2d ab 00 00 00 00 00 - 00 00 00 00 e8 a7 66 05 .-............f.
    State Dump for Thread Id 0x1be
    eax=02b621d8 ebx=7766b100 ecx=00000001 edx=00000000 esi=0007b2b8 edi=00000568
    eip=77f682db esp=271bf6a4 ebp=271bf6f8 iopl=0 nv up ei ng nz ac pe cy
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000293
    function: NtWaitForSingleObject
    77f682d0 b8c5000000 mov eax,0xc5
    77f682d5 8d542404 lea edx,[esp+0x4] ss:280be0ab=????????
    77f682d9 cd2e int 2e
    77f682db c20c00 ret 0xc
    77f682de 8bc0 mov eax,eax
    *----> Stack Back Trace <----*
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    271bf6f8 77661202 00000568 0000052c 00000002 00000004 ntdll!NtWaitForSingleObject
    271bfb60 776bb101 0000052c 271bfc00 271bfc10 00000000 msafd!<nosymbols>
    271bfb98 776bb08c 0000052c 271bfc00 271bfc10 00000000 ws2_32!WSAAccept
    271bfc14 00ab960d 0076fe84 271bfc58 271bfc54 271bfc28 ws2_32!accept
    *----> Raw Stack Dump <----*
    271bf6a4 ce 89 66 77 68 05 00 00 - 01 00 00 00 d0 f6 1b 27 ..fwh..........'
    271bf6b4 d4 b2 07 00 bc b2 07 00 - 1a 00 00 00 00 44 be ab .............D..
    271bf6c4 0d 17 c2 01 ff ff ff ff - ff ff ff 7f ff ff ff ff ................
    271bf6d4 ff ff ff 7f 00 00 00 00 - 58 ae 07 00 ad 1f 6a 77 ........X.....jw
    271bf6e4 d8 11 66 77 2c 05 00 00 - 00 00 00 00 00 00 00 00 ..fw,...........
    271bf6f4 00 00 00 00 60 fb 1b 27 - 02 12 66 77 68 05 00 00 ....`..'..fwh...
    271bf704 2c 05 00 00 02 00 00 00 - 04 00 00 00 00 00 00 00 ,...............
    271bf714 18 69 07 00 28 88 07 00 - 66 00 02 00 00 00 00 00 .i..(...f.......
    271bf724 00 00 00 00 00 00 00 00 - 08 00 00 00 00 00 00 00 ................
    271bf734 00 00 00 00 00 00 00 00 - 00 00 00 00 e9 03 00 00 ................
    271bf744 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271bf754 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271bf764 00 00 00 00 02 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271bf774 01 00 00 00 06 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271bf784 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271bf794 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271bf7a4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271bf7b4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271bf7c4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271bf7d4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    State Dump for Thread Id 0x1ce
    eax=00ab017d ebx=7766b100 ecx=00000011 edx=00000000 esi=0007b548 edi=000005cc
    eip=77f682db esp=271ff6a4 ebp=271ff6f8 iopl=0 nv up ei ng nz ac pe cy
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000293
    function: NtWaitForSingleObject
    77f682d0 b8c5000000 mov eax,0xc5
    77f682d5 8d542404 lea edx,[esp+0x4] ss:280fe0ab=????????
    77f682d9 cd2e int 2e
    77f682db c20c00 ret 0xc
    77f682de 8bc0 mov eax,eax
    *----> Stack Back Trace <----*
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    271ff6f8 77661202 000005cc 00000590 00000002 00000004 ntdll!NtWaitForSingleObject
    271ffb60 776bb101 00000590 271ffc00 271ffc10 00000000 msafd!<nosymbols>
    271ffb98 776bb08c 00000590 271ffc00 271ffc10 00000000 ws2_32!WSAAccept
    271ffc14 00ab960d 00777e44 271ffc58 271ffc54 271ffc28 ws2_32!accept
    *----> Raw Stack Dump <----*
    271ff6a4 ce 89 66 77 cc 05 00 00 - 01 00 00 00 d0 f6 1f 27 ..fw...........'
    271ff6b4 64 b5 07 00 4c b5 07 00 - 1a 00 00 00 f0 7a 09 b5 d...L........z..
    271ff6c4 0d 17 c2 01 ff ff ff ff - ff ff ff 7f ff ff ff ff ................
    271ff6d4 ff ff ff 7f 00 00 00 00 - 84 ae 07 00 ad 1f 6a 77 ..............jw
    271ff6e4 d8 11 66 77 90 05 00 00 - 00 00 00 00 00 00 00 00 ..fw............
    271ff6f4 00 00 00 00 60 fb 1f 27 - 02 12 66 77 cc 05 00 00 ....`..'..fw....
    271ff704 90 05 00 00 02 00 00 00 - 04 00 00 00 00 00 00 00 ................
    271ff714 50 aa 07 00 28 88 07 00 - 66 00 02 00 00 00 00 00 P...(...f.......
    271ff724 00 00 00 00 00 00 00 00 - 08 00 00 00 00 00 00 00 ................
    271ff734 00 00 00 00 00 00 00 00 - 00 00 00 00 e9 03 00 00 ................
    271ff744 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271ff754 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271ff764 00 00 00 00 02 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271ff774 01 00 00 00 06 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271ff784 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271ff794 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271ff7a4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271ff7b4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271ff7c4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271ff7d4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    State Dump for Thread Id 0x1c2
    eax=00ab017d ebx=00000000 ecx=00000019 edx=00000000 esi=000005b0 edi=00000000
    eip=77f682db esp=2723fba0 ebp=2723fbc4 iopl=0 nv up ei pl zr na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
    function: NtWaitForSingleObject
    77f682d0 b8c5000000 mov eax,0xc5
    77f682d5 8d542404 lea edx,[esp+0x4] ss:2813e5a7=????????
    77f682d9 cd2e int 2e
    77f682db c20c00 ret 0xc
    77f682de 8bc0 mov eax,eax
    *----> Stack Back Trace <----*
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    2723fbc4 77f04f37 000005b0 ffffffff 00000000 6d38d2fe ntdll!NtWaitForSingleObject
    2723fc0c 6d39ead0 00000000 00000000 00000001 00780730 kernel32!WaitForSingleObject
    *----> Raw Stack Dump <----*
    2723fba0 a0 cc f1 77 b0 05 00 00 - 00 00 00 00 00 00 00 00 ...w............
    2723fbb0 30 07 78 00 2c b3 75 00 - 00 07 78 00 b0 05 00 00 0.x.,.u...x.....
    2723fbc0 2a 14 39 6d 0c fc 23 27 - 37 4f f0 77 b0 05 00 00 *.9m..#'7O.w....
    2723fbd0 ff ff ff ff 00 00 00 00 - fe d2 38 6d b0 05 00 00 ..........8m....
    2723fbe0 ff ff ff ff 00 00 00 00 - 38 ae b5 02 30 07 78 00 ........8...0.x.
    2723fbf0 00 00 00 00 30 07 78 00 - b0 05 00 00 00 00 00 00 ....0.x.........
    2723fc00 2c b3 75 00 02 00 00 00 - 00 00 00 00 30 fc 23 27 ,.u.........0.#'
    2723fc10 d0 ea 39 6d 00 00 00 00 - 00 00 00 00 01 00 00 00 ..9m............
    2723fc20 30 07 78 00 38 ae b5 02 - 30 07 78 00 70 3c b3 22 0.x.8...0.x.p<."
    2723fc30 50 fc 23 27 aa e7 36 6d - 20 14 78 00 00 00 00 00 P.#'..6m .x.....
    2723fc40 00 00 00 00 30 07 78 00 - 30 07 78 00 ac 3c b3 22 ....0.x.0.x..<."
    2723fc50 84 fc 23 27 0d 96 ab 00 - 30 07 78 00 9c fc 23 27 ..#'....0.x...#'
    2723fc60 00 00 00 00 00 00 00 00 - 68 fc 23 27 ac 3c b3 22 ........h.#'.<."
    2723fc70 9c fc 23 27 c8 52 b7 22 - 00 00 00 00 70 3c b3 22 ..#'.R."....p<."
    2723fc80 94 fc 23 27 c4 fc 23 27 - 9f 2d ab 00 00 00 00 00 ..#'..#'.-......
    2723fc90 51 76 ab 00 00 00 00 00 - 00 00 00 00 08 ac 32 05 Qv............2.
    2723fca0 01 00 00 00 08 ac 32 05 - a0 fc 23 27 34 0a b8 22 ......2...#'4.."
    2723fcb0 ec fc 23 27 78 0c b8 22 - 00 00 00 00 c8 09 b8 22 ..#'x.."......."
    2723fcc0 e4 fc 23 27 0c fd 23 27 - 76 2e ab 00 00 00 00 00 ..#'..#'v.......
    2723fcd0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    State Dump for Thread Id 0x1cd
    eax=00000004 ebx=00000000 ecx=22d8b980 edx=00000000 esi=000005c0 edi=2727fc48
    eip=77f682db esp=2727fc2c ebp=2727fc50 iopl=0 nv up ei pl nz na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000206
    function: NtWaitForSingleObject
    77f682d0 b8c5000000 mov eax,0xc5
    77f682d5 8d542404 lea edx,[esp+0x4] ss:2817e633=????????
    77f682d9 cd2e int 2e
    77f682db c20c00 ret 0xc
    77f682de 8bc0 mov eax,eax
    *----> Stack Back Trace <----*
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    2727fc50 77f04f37 000005c0 0000ea60 00000000 6d38d2fe ntdll!NtWaitForSingleObject
    2727fc98 6d39ead0 0000ea60 00000000 00000001 00781270 kernel32!WaitForSingleObject
    *----> Raw Stack Dump <----*
    2727fc2c a0 cc f1 77 c0 05 00 00 - 00 00 00 00 48 fc 27 27 ...w........H.''
    2727fc3c 70 12 78 00 6c b3 75 00 - c0 11 78 00 00 ba 3c dc p.x.l.u...x...<.
    2727fc4c ff ff ff ff 98 fc 27 27 - 37 4f f0 77 c0 05 00 00 ......''7O.w....
    2727fc5c 60 ea 00 00 00 00 00 00 - fe d2 38 6d c0 05 00 00 `.........8m....
    2727fc6c 60 ea 00 00 00 00 00 00 - 98 d3 32 05 70 12 78 00 `.........2.p.x.
    2727fc7c 00 00 00 00 70 12 78 00 - c0 05 00 00 00 00 00 00 ....p.x.........
    2727fc8c 4b 96 34 6d 02 00 00 00 - 00 00 00 00 bc fc 27 27 K.4m..........''
    2727fc9c d0 ea 39 6d 60 ea 00 00 - 00 00 00 00 01 00 00 00 ..9m`...........
    2727fcac 70 12 78 00 98 d3 32 05 - 70 12 78 00 70 3c b3 22 p.x...2.p.x.p<."
    2727fcbc dc fc 27 27 aa e7 36 6d - 20 28 78 00 60 ea 00 00 ..''..6m (x.`...
    2727fccc 00 00 00 00 70 12 78 00 - 70 12 78 00 ac 3c b3 22 ....p.x.p.x..<."
    2727fcdc 10 fd 27 27 0d 96 ab 00 - 70 12 78 00 28 fd 27 27 ..''....p.x.(.''
    2727fcec 60 ea 00 00 00 00 00 00 - f4 fc 27 27 00 00 00 00 `.........''....
    2727fcfc 28 fd 27 27 c8 52 b7 22 - 00 00 00 00 70 3c b3 22 (.''.R."....p<."
    2727fd0c 20 fd 27 27 50 fd 27 27 - 9f 2d ab 00 00 00 00 00 .''P.''.-......
    2727fd1c 51 76 ab 00 60 ea 00 00 - 00 00 00 00 98 d3 32 05 Qv..`.........2.
    2727fd2c 03 00 00 00 98 d3 32 05 - 2c fd 27 27 92 ea d8 22 ......2.,.''..."
    2727fd3c 74 fd 27 27 28 ed d8 22 - 00 00 00 00 20 ea d8 22 t.''(..".... .."
    2727fd4c 74 fd 27 27 84 fd 27 27 - 7d 01 ab 00 00 00 00 00 t.''..''}.......
    2727fd5c 00 00 00 00 00 00 00 00 - 00 00 00 00 98 d3 32 05 ..............2.
    State Dump for Thread Id 0x1b8
    eax=00000004 ebx=00000000 ecx=2323ba90 edx=00000000 esi=00000924 edi=276cfc38
    eip=77f682db esp=276cfc1c ebp=276cfc40 iopl=0 nv up ei pl nz na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000206
    function: NtWaitForSingleObject
    77f682d0 b8c5000000 mov eax,0xc5
    77f682d5 8d542404 lea edx,[esp+0x4] ss:285ce623=????????
    77f682d9 cd2e int 2e
    77f682db c20c00 ret 0xc
    77f682de 8bc0 mov eax,eax
    ----> Stack Back Trace <----
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    276cfc40 77f04f37 00000924 00007530 00000000 6d38d2fe ntdll!NtWaitForSingleObject
    276cfc88 6d39ead0 00007530 00000000 00000001 007dc330 kernel32!WaitForSingleObject
    State Dump for Thread Id 0x18a
    eax=00000004 ebx=00000000 ecx=02bbf9a0 edx=00000000 esi=000009b0 edi=00000000
    eip=77f682db esp=2770fbe0 ebp=2770fc04 iopl=0 nv up ei pl zr na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
    function: NtWaitForSingleObject
    77f682d0 b8c5000000 mov eax,0xc5
    77f682d5 8d542404 lea edx,[esp+0x4] ss:2860e5e7=????????
    77f682d9 cd2e int 2e
    77f682db c20c00 ret 0xc
    77f682de 8bc0 mov eax,eax
    ----> Stack Back Trace <----
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    2770fc04 77f04f37 000009b0 ffffffff 00000000 6d38d2fe ntdll!NtWaitForSingleObject
    2770fc4c 6d39ead0 00000000 00000000 00000001 007dda00 kernel32!WaitForSingleObject
    ----> Raw Stack Dump <----
    2770fbe0 a0 cc f1 77 b0 09 00 00 - 00 00 00 00 00 00 00 00 ...w............
    2770fbf0 00 da 7d 00 ec b3 75 00 - 80 c1 7d 00 b0 09 00 00 ..}...u...}.....
    2770fc00 2a 14 39 6d 4c fc 70 27 - 37 4f f0 77 b0 09 00 00 *.9mL.p'7O.w....
    2770fc10 ff ff ff ff 00 00 00 00 - fe d2 38 6d b0 09 00 00 ..........8m....
    2770fc20 ff ff ff ff 00 00 00 00 - e8 ef bb 02 00 da 7d 00 ..............}.
    2770fc30 00 00 00 00 00 da 7d 00 - b0 09 00 00 00 00 00 00 ......}.........
    2770fc40 ec b3 75 00 02 00 00 00 - 00 00 00 00 70 fc 70 27 ..u.........p.p'
    2770fc50 d0 ea 39 6d 00 00 00 00 - 00 00 00 00 01 00 00 00 ..9m............
    2770fc60 00 da 7d 00 e8 ef bb 02 - 00 da 7d 00 70 3c b3 22 ..}.......}.p<."
    2770fc70 90 fc 70 27 aa e7 36 6d - 20 dc 7d 00 00 00 00 00 ..p'..6m .}.....
    2770fc80

    I am seeing exactly the same error. I started seeing it after we started making extensive use of introspection in our code. It happens repeatably when we are load testing our software.

  • Why does labview generate Dr. Watson error "C0000005 access violation"

    I am running Labview 5.1.1 in Windows 2000 Professional on a machine with the following configuration
    *----> System Information <----*
    Computer Name: ANDANTE
    User Name: Administrator
    Number of Processors: 2
    Processor Type: x86 Family 6 Model 8 Stepping 3
    Windows 2000 Version: 5.0
    Current Build: 2195
    Service Pack: 4
    Current Type: Multiprocessor Free
    I have all of a sudden begun to experience labview crashes. The crash occurs systematically after tens of minutes; not just a few minutes, but not more than an hour or so. I am running a vi but not actively interacting with the machine (no other applications running, not even moving the mouse around). The problem happens even when running a vi that I have run successfully for extended periods of time (overnight) only 3 months ago. I have tried it with two different vis, one that I have recently made a lot of modifications to and another that has not been touched for months (since before the crashes began), and it happens with both vis. They do much different things (communicate with different GPIB or PCI boards, write to different kinds of files in different locations, etc.), so the problem seems to be vi-independent.
    When the crash occurs, I see a dialog appear with the error
    labview.exe has generated errors and will be closed by windows. You will need to restart the program. An error log has been created.
    The Dr. Watson error log is generated and the error is
    Application exception occurred:
    App: (pid=1160)
    When: 4/25/2004 @ 01:57:56.640
    Exception number: c0000005 (access violation)
    I always get the same Dr. Watson error information -- i.e., it is very reproducible. I don't really know how to interpret the rest of the Dr. Watson log, but I include the report on the first thread, which is the one with the "FAULT" in it, at the end of this email.
    Looking around on the web, it may be that a temporary virus infection could have created the problem. In the period since the machines was last successfully used, I have seen two files be infected by the W32.Welchia.B.Worm virus, the files were svchost.exe and WksPatch[1].exe. These files have been quarantined and no other infected files have been found since this error began to appear.
    Any ideas? I've seen on the web that reinstalling Windows 2000 and/or upgrading to Labview 7.0 might solve the problem, but it would be nice to get some confirmation before taking the time/spending the money.
    Here is the state dump for the thread with the FAULT in it, as provided by Dr. Watson:
    State Dump for Thread Id 0x574
    eax=00000062 ebx=00000000 ecx=00000000 edx=00000004 esi=00000000 edi=05692214
    eip=00748236 esp=0012fb28 ebp=0012fb28 iopl=0 nv up ei pl zr na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
    function: StrLen
    00748230 55 push ebp
    00748231 8bec mov ebp,esp
    00748233 8b4d08 mov ecx,[ebp+0x8] ss:00ba9a0e=????????
    FAULT ->00748236 8a11 mov dl,[ecx] ds:00000000=??
    00748238 8d4101 lea eax,[ecx+0x1] ds:00a79ee6=????????
    0074823b 84d2 test dl,dl
    0074823d 7407 jz GetCDReg+0x6f6 (00750c46)
    0074823f 8a10 mov dl,[eax] ds:00000062=??
    00748241 40 inc eax
    00748242 84d2 test dl,dl
    00748244 75f9 jnz CfgRemove+0x44f (0074ae3f)
    00748246 2bc1 sub eax,ecx
    00748248 48 dec eax
    00748249 5d pop ebp
    0074824a c3 ret
    *----> Stack Back Trace <----*
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    0012FB28 00737A74 00000000 00000000 05692214 00000400 !StrLen
    0012FC40 00736A45 050753E4 05692214 0012FC6C 00736724 !SetKeyboardHandlerProc
    0012FC50 00736724 05692214 0012FCB4 05692214 BDBC0000 !SetKeyboardHandlerProc
    0012FC6C 00736627 05692214 0569232C 00000400 00000000 !SetKeyboardHandlerProc
    0012FC98 0074B470 0012FCB4 BDBD0001 00000000 0569E8E0 !SetKeyboardHandlerProc
    0012FCD0 0074ACD0 00000000 0074AC10 0569FFA4 010A2418 !CfgRemove
    0012FCE8 007808D5 00000000 00000000 00000001 00000000 !CfgRemove
    0012FD08 007ACEB6 00000000 00000000 77E18F95 00000000 !ChkOccurrences
    0012FD9C 006033DE 00000001 00000000 77E2ADC1 007A5C80 !WMainLoop
    0012FF24 007B2186 00400000 00000000 00000001 00000001 !WMain
    0012FFC0 7C581AF6 005C0057 0061006C 7FFDF000 C0000005 !inp
    0012FFF0 00000000 007B2030 00000000 000000C8 00000100 kernel32!OpenEventA
    *----> Raw Stack Dump <----*
    0012fb28 40 fc 12 00 74 7a 73 00 - 00 00 00 00 00 00 00 00 @...tzs.........
    0012fb38 14 22 69 05 00 04 00 00 - 16 4d 65 74 68 6f 64 20 ."i......Method
    0012fb48 4e 6f 74 20 49 6d 70 6c - 65 6d 65 6e 74 65 64 00 Not Implemented.
    0012fb58 55 1f f8 77 18 25 f8 77 - 2f a8 fd 74 c4 01 00 00 U..w.%.w/..t....
    0012fb68 05 a5 fd 74 d0 26 ce 01 - 00 00 06 01 10 04 00 00 ...t.&..........
    0012fb78 00 00 00 00 00 00 00 00 - 2e fb 69 05 42 e9 69 05 ..........i.B.i.
    0012fb88 c1 2f 7b 00 00 00 00 00 - 12 04 00 00 11 04 00 00 ./{.............
    0012fb98 30 fb 69 05 12 04 12 00 - bb 35 7b 00 00 00 06 01 0.i......5{.....
    0012fba8 11 04 00 00 00 00 00 00 - 00 00 00 00 2e fb 69 05 ..............i.
    0012fbb8 35 34 7b 00 4c 34 7b 00 - 48 00 06 01 f8 fb 12 00 54{.L4{.H.......
    0012fbc8 10 04 00 00 ec 53 07 05 - 11 04 00 00 08 fc 00 00 .....S..........
    0012fbd8 ee c8 77 00 30 fb 69 05 - 11 04 00 00 00 00 00 00 ..w.0.i.........
    0012fbe8 00 04 00 00 01 00 00 00 - ec 53 07 05 00 04 00 00 .........S......
    0012fbf8 00 38 83 00 1c fc 12 00 - 23 ca 77 00 00 38 83 00 .8......#.w..8..
    0012fc08 40 ff 69 05 01 00 00 00 - 00 00 00 00 2d 00 00 00 @.i.........-...
    0012fc18 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    0012fc28 00 00 00 00 00 00 00 00 - 00 00 00 00 01 00 00 00 ................
    0012fc38 50 fc 12 00 1a 6a 73 00 - 50 fc 12 00 45 6a 73 00 P....js.P...Ejs.
    0012fc48 e4 53 07 05 14 22 69 05 - 6c fc 12 00 24 67 73 00 .S..."i.l...$gs.
    0012fc58 14 22 69 05 b4 fc 12 00 - 14 22 69 05 00 00 bc bd ."i......"i.....

    For questions like these, you are better off contacting NI directly. Goto www.ni.com/ask for directions. It has been my experience that Dr. Watson error logs are only useful as supplementary information. It is best for support and for the forum if you can provide a clear description on how to cause the error consistently.

  • Access Violation while initialising WEBUTIL on Ora9iDS

    Hello,
    as part of an urgent evaluation I installed WEBUTIL as described in the documentation, did the additional steps described in the readme and added WEBUTIL as described to an existing form. Now the form raises an access violation error while executing trigger WHEN-CUSTOM-ITEM-EVENT on item WEBUTIL.WEBUTIL_FILETRANSFER_FUNCTIONS exactly when calling procedure WEBUTIL_CORE.CustomEventHandler while registering the beans.
    Did anybody experience the like? Any guess what's going wrong or what could help?
    The crash is documented in the log as follows:
    [09/09/03 08:38:46 Westeuropäische Sommerzeit]::Client Status [ConnId=0, PID=3048]
         >> ERROR: Abnormal termination, Error Code: C0000005 ACCESS_VIOLATION
    ======================= STACK DUMP =======================
    Fault address: 60A98D4D 01:00097D4D
    Module: E:\Programme\OraHome1\bin\orapls9.dll
    System Information:
    Operating System: Windows NT Version 5.0 Build 2195 Service Pack 4
    Command line: ifweb90 server webfile=HTTP-0,0,1,53.147.33.61
    FORM/BLOCK/FIELD: DOKUMENTE:DOKUMENTE.KLARTEXT
    Last Trigger: WHEN-CUSTOM-ITEM-EVENT - (In Progress)
    Msg: <NULL>
    Last Builtin: NAME_IN - (Successfully Completed)
    Registers:
    EAX:00000000
    EBX:0012D9C0
    ECX:00000000
    EDX:0012D9C0
    ESI:0777C6E4
    EDI:02A26C78
    CS:EIP:001B:60A98D4D
    SS:ESP:0023:0012D978 EBP:0012D998
    DS:0023 ES:0023 FS:003B GS:0000
    Flags:00010246
    ------------------- Call Stack Trace ---------------------
    Frameptr RetAddr Param#1 Param#2 Param#3 Param#4 Function Name
    0x0012d998 60a3d308 0777c6e4 00000001 0012d9c0 070468a8 pfrb1assign_aad2va
    0x0012d9ec 60a92b11 0777c6e4 00000001 66020030 070468a8 pevmGBVAR+d8
    0x0012e0f0 60a1ce7d 0777c6e4 02a26c78 0776dd6c 00000002 _pfrrun+6841       
    0x0012e158 6601ea45 02a26c78 0777c6e4 02a46f00 029de3b4 _peicnt+ed         
    0x02a26874 029de3b4 65fdb2a0 65fdb2e0 65da1f30 00000000 0x6601ea45
    0x02a46f00 00000001 0000000a 02a46fd8 0026181f 65d51752 0x029de3b4
    ------------------- End of Stack Trace -------------------
    WebUtil-Logfile is not very verbose (despite detailed logging enabled):
    53.147.33.61:ZSCHAU: Connection from Form=E:\ISAP_ASP4\isap\websourcen\Doktestweb.fmx Client O/S=Windows 2000 locale=de
    53.147.33.61:ZSCHAU: 2003-Sep-09 08:38:00.889 WUF[VBeanCommon.getIPAddress()] 53.147.33.61
    53.147.33.61:ZSCHAU: 2003-Sep-09 08:38:00.929 WUH[VBeanCommon.getIPAddress()] 53.147.33.61
    53.147.33.61:ZSCHAU: 2003-Sep-09 08:38:00.949 WUS[VBeanCommon.getIPAddress()] 53.147.33.61
    Java Console prints:
    JInitiator: Version 1.3.1.9
    Verwendung der JRE-Version 1.3.1.9 Java HotSpot(TM) Client VM
    Home-Verzeichnis des Benutzers = C:\Dokumente und Einstellungen\zschau
    Proxy-Konfiguration:Automatische Proxy-Konfiguration
    JAR cache enabled
    Location: C:\Dokumente und Einstellungen\zschau\Oracle Jar Cache
    Maximum size: 50 MB
    Compression level: 0
    c: clear console window
    f: finalize objects on finalization queue
    g: garbage collect
    h: display this help message
    l: dump classloader list
    m: print memory usage
    q: hide console
    s: dump system properties
    t: dump thread list
    x: clear classloader cache
    0-5: set trace level to <n>
    Loading http://localhost:8888/forms90/webutil/webutil.jar from JAR cache
    Loading http://localhost:8888/forms90/webutil/jacob.jar from JAR cache
    Loading http://localhost:8888/forms90/java/f90all_jinit.jar from JAR cache
    RegisterWebUtil - Loading Webutil Version 1.0.2 Beta
    connectMode=HTTP, native.
    Forms Applet-Version : 90290
    2003-Sep-09 08:38:00.819 WUI[VBeanCommon.findLocalHost()] obtaining LocalHost info from InetAddress
    2003-Sep-09 08:38:00.839 WUI[VBeanCommon.getIPAddress()] 53.147.33.61
    2003-Sep-09 08:38:00.879 WUF[VBeanCommon.findLocalHost()] obtaining LocalHost info from InetAddress
    2003-Sep-09 08:38:00.889 WUF[VBeanCommon.getIPAddress()] 53.147.33.61
    2003-Sep-09 08:38:00.909 WUH[VBeanCommon.findLocalHost()] obtaining LocalHost info from InetAddress
    2003-Sep-09 08:38:00.929 WUH[VBeanCommon.getIPAddress()] 53.147.33.61
    2003-Sep-09 08:38:00.939 WUS[VBeanCommon.findLocalHost()] obtaining LocalHost info from InetAddress
    2003-Sep-09 08:38:00.949 WUS[VBeanCommon.getIPAddress()] 53.147.33.61
    2003-Sep-09 08:38:00.969 WUT[VBeanCommon.findLocalHost()] obtaining LocalHost info from InetAddress
    2003-Sep-09 08:38:00.969 WUT[VBeanCommon.getIPAddress()] 53.147.33.61
    2003-Sep-09 08:38:01.460 WUO[VBeanCommon.findLocalHost()] obtaining LocalHost info from InetAddress
    2003-Sep-09 08:38:01.470 WUO[VBeanCommon.getIPAddress()] 53.147.33.61
    2003-Sep-09 08:38:01.500 WUL[VBeanCommon.findLocalHost()] obtaining LocalHost info from InetAddress
    2003-Sep-09 08:38:01.510 WUL[VBeanCommon.getIPAddress()] 53.147.33.61
    2003-Sep-09 08:38:01.550 WUB[VBeanCommon.findLocalHost()] obtaining LocalHost info from InetAddress
    2003-Sep-09 08:38:01.560 WUB[VBeanCommon.getIPAddress()] 53.147.33.61
    2003-Sep-09 08:38:48.268 WUB[VBeanCommon.destroy()] WebUtil Browser Functions being removed..
    2003-Sep-09 08:38:48.298 WUL[VBeanCommon.destroy()] WebUtil C API Functions being removed..
    2003-Sep-09 08:38:49.59 WUO[VBeanCommon.destroy()] WebUtil Client Side Ole Functions being removed..
    2003-Sep-09 08:38:49.89 WUT[VBeanCommon.destroy()] WebUtil File Transfer Bean being removed..
    2003-Sep-09 08:38:49.89 WUS[VBeanCommon.destroy()] WebUtil Session Monitoring Facilities being removed..
    2003-Sep-09 08:38:49.89 WUH[VBeanCommon.destroy()] WebUtil Client Side Host Commands being removed..
    2003-Sep-09 08:38:49.99 WUF[VBeanCommon.destroy()] WebUtil Client Side File Functions being removed..
    2003-Sep-09 08:38:49.99 WUI[VBeanCommon.destroy()] WebUtil GetClientInfo Utility being removed..
    I run Ora9iDS on a Windows2000 system.
    Thanks to anybody who tries to help.

    Hello, Grant,
    the crash occurs before I try to do anything vital. There is some init stuff in the form (initialising items, global variables etc.), query execution for initial displaying of database entries and a sychronize statement. After that the triggers in the WEBUTIL section fire, as I understand to initialise the beans (registering). As part of this registering the crash occurs - before I call any of the WEBUTIL functionality from my own code.

  • Urgent problem: JRE Crashes with Access violation (c0000005)

    I have a problem where the JRE crashes with an Access violation (c0000005) at address (6d4218ce).
    The JVM is:
    java version "1.3.1_01"
    Java(TM) 2 Runtime Environment, Standard Edition (build 1.3.1_01)
    Java HotSpot(TM) Client VM (build 1.3.1_01, mixed mode)The application is swing based, and I have my suspicions that the problem occurs when exec'ing (Runtime.exec()) a script file (deletes data files and FTP's data files around an internal network), but I cannot categorically prove it as yet.
    The lack of a .map file does not help in analysing the Dr Watson log file. Does anyone know if a map file is available for 1.3.1?
    I have tried to raise this as a bug but as we cannot reproduce it on demand, I cannot get Sun to look into it.
    The Dr Watson log file shows:
    State Dump for Thread Id 0x13e
    eax=bf800000 ebx=0336b770 ecx=02b72168 edx=bf800008 esi=02b72168 edi=06ffd12c
    eip=6d4218ce esp=08d0fdbc ebp=08d0fddc iopl=0         nv up ei ng nz na pe nc
    cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00000282
    function: <nosymbols>
            6d4218b9 8d4df0           lea     ecx,[ebp-0x10]         ss:09c0e7e2=00000000
            6d4218bc e875000000       call    6d421936
            6d4218c1 5f               pop     edi
            6d4218c2 5e               pop     esi
            6d4218c3 c9               leave
            6d4218c4 c3               ret
            6d4218c5 56               push    esi
            6d4218c6 8bf1             mov     esi,ecx
            6d4218c8 8b5604           mov     edx,[esi+0x4]          ds:03a70b6e=????????
            6d4218cb 83c208           add     edx,0x8
    FAULT ->6d4218ce 8b4210           mov     eax,[edx+0x10]         ds:c06fea0e=????????
            6d4218d1 85c0             test    eax,eax
            6d4218d3 7f25             jg      6d4218fa
            6d4218d5 7d1b             jge     6d4218f2
            6d4218d7 83c9ff           or      ecx,0xff
            6d4218da 6a04             push    0x4
            6d4218dc 2bc8             sub     ecx,eax
            6d4218de 8b4608           mov     eax,[esi+0x8]          ds:03a70b6e=????????
            6d4218e1 d3e0             shl     eax,cl
            6d4218e3 8b4a44           mov     ecx,[edx+0x44]         ds:c06fea0e=????????
            6d4218e6 8d440807         lea     eax,[eax+ecx+0x7]      ds:03a70b6f=????????
            6d4218ea 59               pop     ecx
    *----> Stack Back Trace <----*
    FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name
    08d0fddc 6d4710ee 0336b734 0336b734 6d4381b7 0336b734 <nosymbols>
    State Dump for Thread Id 0x140
    eax=06a82398 ebx=00000000 ecx=06ab34f0 edx=00000000 esi=0000017c edi=00000000
    eip=77f682db esp=08d4fc24 ebp=08d4fc48 iopl=0         nv up ei pl zr na po nc
    cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00000246
    function: NtWaitForSingleObject
            77f682d0 b8c5000000       mov     eax,0xc5
            77f682d5 8d542404         lea     edx,[esp+0x4]          ss:09c4e62b=00000000
            77f682d9 cd2e             int     2e
            77f682db c20c00           ret     0xc
            77f682de 8bc0             mov     eax,eax
    *----> Stack Back Trace <----*
    FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name
    08d4fc48 77f04f37 0000017c ffffffff 00000000 6d466097 ntdll!NtWaitForSingleObject
    08d4fc90 6d476550 00000000 00000000 00000001 00765d80 kernel32!WaitForSingleObject Any help would be much appreciated.
    Regards,
    Dave Jackson

    Probably nothing to do with it but I had some dodgy memory, and windows would complain that there was an error to do with that exact memory location: c0000005

  • Server JVM(1.4.2_11-b06 mixed mode) crashed suddenly by an Access violation

    We are running a Servlet/JSP application on Tomcat5 (Windows service) and
    WindowsNT4 Workstation(SP6a).
    JVM has crashed suddenly by an Access Violation while it was in its idle state,
    and it happened only once.
    (No access log was left in Apache's access log at the time of the crach, so it
    doesn't seem any Http access has triggered the crash.)
    We are having a trouble finding causes and solution to this problem.
    Could anyone please help us solve this problem? Thank you in advance.
    Attatched below are our environment status, Dr.Watson log and JVM's last
    GC log. (When JVM crashed, hs_err_pid<pid>.log was not generated.)
    [Apache's access log]
    #JVM crashed at 11:45:22.501, while there's no Http access according to Apache's
    #access log.
    127.0.0.1 - - [08/Aug/2006:11:45:00 +0900] "POST /Manage/mode/CNMOD00205Action.do HTTP/1.1" 200 4651
    127.0.0.1 - - [08/Aug/2006:11:45:47 +0900] "POST /Manage/change/CNCHG00601Action.do HTTP/1.1" 503 430
    [Environment]
    OS: Windows NT Workstation 4 SP6a (Japanese Edition)
    CPU: Intel Celeron 566MHz
    Memory: 256MB
    J2SDK: Sun J2SDK 1.4.2_11-b06
    Servlet Containar: Tomcat 5.0.28
    Web Server: Apache 2.0.54
    Tomcat Connector: mod_jk2 2.0.5
    Database: MS-Access
    *Tomcat5.exe run as a service, with jre\bin\server\jvm.dll.
    JVM settings is as follows.
    -XX:NewSize=32m -XX:MaxNewSize=32m -XX:SurvivorRatio=1 -XX:TargetSurvivorRatio=100
    -XX:MaxPermSize=64m -XX:PermSize=32m -XX:+UseCompilerSafepoints -XX:+UseOnStackReplacement
    -Xnoclassgc -XX:+PrintGCDetails -XX:+PrintGCTimeStamps -XX:+PrintHeapAtGC
    -Xloggc:F:\var\log\system\tomcat\gc.log -Xrs -Xms72m -Xmx72m
    [Dr. Watson's log]
    Microsoft(R) Windows NT(R) Version 4.00 DrWtsn32
    Copyright (C) 1985-1996 Microsoft Corp. All rights reserved.
    Application exception occurred:
    App: (pid=305)
    When: 8/8/2006 @ 11:45:22.501
    Exception number: c0000005 (access violation)
    ----> System Information <----*
    Computer Name: TEST-A08
    User Name: SYSTEM
    Number of Processors: 1
    Processor Type: x86 Family 6 Model 8 Stepping 10
    Windows Version: 4.0
    Current Build: 1381
    Service Pack: 6
    Current Type: Uniprocessor Free
    Registered Organization: xxxxxxxx
    Registered Owner: xxxxxxxx
    ----> Task List <----
    0 Idle.exe
    2 System.exe
    26 smss.exe
    34 csrss.exe
    40 winlogon.exe
    46 services.exe
    49 lsass.exe
    61 nddeagnt.exe
    80 X_AAA.exe
    84 Explorer.exe
    87 XBBB.exe
    94 XCCC.exe
    99 RpcSs.exe
    103 ups.exe
    110 SysTray.exe
    111 loadwc.exe
    115 PROMon.exe
    119 smctrlw.exe
    125 pstores.exe
    117 MSTask.exe
    148 conime.exe
    150 xxmanage.exe
    152 XCC.exe
    155 XDD.exe
    78 XEE.exe
    88 XFF.exe
    159 XGG.exe
    164 XHH.exe
    169 XII.exe
    142 XJJ.exe
    213 XKK.exe
    236 XLL.exe
    239 XMM.exe
    242 XNN.exe
    247 XOO.exe
    250 XPP.exe
    254 XQQ.exe
    248 XRR.exe
    258 XSS.exe
    261 XTT.exe
    265 XUU.exe
    269 XVV.exe
    271 XWW.exe
    280 XXX.exe
    283 XYY.exe
    286 XZZ.exe
    232 XMain.exe
    288 XXXMAIN.exe
    294 XWWWW.exe
    292 CMD.exe
    301 XXXXProc.exe
    305 tomcat5.exe
    45 Apache.exe
    328 rotatelogs.exe
    330 rotatelogs.exe
    333 Apache.exe
    323 rotatelogs.exe
    334 rotatelogs.exe
    340 XXMop.exe
    347 XX800.exe
    227 ddhelp.exe
    342 XXXX_XXXX.exe
    418 drwtsn32.exe
    0 _Total.exe
    (00400000 - 00400000)
    (77f50000 - 77fbd000) dll\ntdll.dbg
    (77ed0000 - 77f41000) dll\kernel32.dbg
    (77e40000 - 77e9b000) dll\user32.dbg
    (76680000 - 76698000) dll\imm32.dbg
    (77ea0000 - 77ecc000) dll\gdi32.dbg
    (77d90000 - 77dd0000) dll\advapi32.dbg
    (77de0000 - 77e37000) dll\rpcrt4.dbg
    (70bd0000 - 70c34000)
    (78000000 - 78046000)
    (77c10000 - 77d4f000) dll\shell32.dbg
    (71780000 - 7180a000) COMCTL32.dbg
    (77bc0000 - 77bc7000) dll\rpcltc1.dbg
    (08000000 - 082b8000)
    (77fd0000 - 77ffa000) dll\winmm.dbg
    (6bc00000 - 6bc11000) auddrive.dll
    (6bd00000 - 6bd14000) cm-pci.dll
    (10000000 - 10007000)
    (00c70000 - 00c7e000)
    (00c80000 - 00c99000)
    (00ca0000 - 00cae000)
    (193b0000 - 193bf000)
    (77640000 - 77654000) dll\ws2_32.dbg
    (77630000 - 77637000) dll\ws2help.dbg
    (73f20000 - 73f2e000) dll\rnr20.dbg
    (775f0000 - 775ff000) dll\msafd.dbg
    (77620000 - 77629000) dll\wshtcpip.dbg
    (77660000 - 7766a000) dll\wsock32.dbg
    (1d9d0000 - 1d9dc000)
    (1f7d0000 - 1f804000) dll\ODBC32.dbg
    (77d50000 - 77d83000) dll\comdlg32.dbg
    (1f8c0000 - 1f8c0000)
    (0f9a0000 - 0f9ab000) vbajet32.dbg
    (77b00000 - 77bb7000) dll\ole32.dbg
    (65340000 - 653db000) oleaut32.dll
    (23c40000 - 23c79000) dll\msjtes40.dbg
    (24090000 - 240f2000) expsrv.DBG
    State Dump for Thread Id 0x130
    eax=77bc4030 ebx=0012fe60 ecx=77bc0000 edx=00000000 esi=00000064 edi=00000000
    eip=77f57f07 esp=0012fd80 ebp=0012fde8 iopl=0 nv up ei pl zr na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
    function: ZwReadFile
    77f57efc b886000000 mov eax,0x86
    77f57f01 8d542404 lea edx,[esp+0x4] ss:00f7e787=00021000
    77f57f05 cd2e int 2e
    77f57f07 c22400 ret 0x24
    77f57f0a 8bc0 mov eax,eax
    ----> Stack Back Trace <----
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 ���������
    0012fd7c 77edd3f5 00000064 00000000 00000000 00000000 ntdll!ZwReadFile (FPO: [9,0,0])
    0012fde8 77da8aef 00000064 00132108 0000021a 0012fe18 kernel32!ReadFile (FPO: Non-FPO [5,14,3])
    0012fe1c 77da853b 00000064 00132108 0000021a 0012fe60 advapi32!RegisterServiceCtrlHandlerA (FPO: Non-FPO [4,4,3])
    0012fe80 77da84d4 00000064 00132108 0000021a 00000000 advapi32!StartServiceCtrlDispatcherW (FPO: Non-FPO [3,17,3])
    0012fec4 004026c8 00415724 00ad1ed8 0040280a 00ad1ed8 advapi32!StartServiceCtrlDispatcherW (FPO: Non-FPO [1,10,3])
    ----> Raw Stack Dump <----
    0012fd80 f5 d3 ed 77 64 00 00 00 - 00 00 00 00 00 00 00 00 ...wd...........
    0012fd90 00 00 00 00 bc fd 12 00 - 08 21 13 00 1a 02 00 00 .........!......
    0012fda0 00 00 00 00 00 00 00 00 - 00 00 00 00 08 21 13 00 .............!..
    0012fdb0 60 fe 12 00 00 00 00 00 - 00 00 00 00 00 00 00 00 `...............
    0012fdc0 e8 fd 12 00 30 fe 12 00 - 04 00 00 00 00 00 00 00 ....0...........
    0012fdd0 a8 fd 12 00 00 00 00 00 - 70 fe 12 00 10 c7 f0 77 ........p......w
    0012fde0 50 da f0 77 ff ff ff ff - 1c fe 12 00 ef 8a da 77 P..w...........w
    0012fdf0 64 00 00 00 08 21 13 00 - 1a 02 00 00 18 fe 12 00 d....!..........
    0012fe00 00 00 00 00 00 00 00 00 - a0 52 13 00 1a 02 00 00 .........R......
    0012fe10 64 00 00 00 30 fe 12 00 - 00 00 00 00 80 fe 12 00 d...0...........
    0012fe20 3b 85 da 77 64 00 00 00 - 08 21 13 00 1a 02 00 00 ;..wd....!......
    0012fe30 60 fe 12 00 00 00 00 00 - 08 21 13 00 1a 02 00 00 `........!......
    0012fe40 32 01 00 00 00 00 00 00 - 08 21 13 00 1a 02 00 00 2........!......
    0012fe50 0c 21 13 00 00 00 00 00 - 01 00 00 00 b8 40 13 00 .!...........@..
    0012fe60 00 00 00 00 00 00 00 00 - 34 fe 12 00 04 00 00 00 ........4.......
    0012fe70 b4 fe 12 00 04 11 db 77 - d8 de db 77 ff ff ff ff .......w...w....
    0012fe80 c4 fe 12 00 d4 84 da 77 - 64 00 00 00 08 21 13 00 .......wd....!..
    0012fe90 1a 02 00 00 00 00 00 00 - d8 1e ad 00 a0 56 41 00 .............VA.
    0012fea0 8c fe 12 00 00 00 00 00 - 64 00 00 00 94 fe 12 00 ........d.......
    0012feb0 8c 6f 3c d2 b0 ff 12 00 - 04 11 db 77 c8 de db 77 .o<........w...w
    State Dump for Thread Id 0x132
    eax=001353b8 ebx=00000000 ecx=00135428 edx=00000000 esi=00000390 edi=00000000
    eip=77f582db esp=00bdff28 ebp=00bdff4c iopl=0 nv up ei pl zr na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
    function: NtWaitForSingleObject
    77f582d0 b8c5000000 mov eax,0xc5
    77f582d5 8d542404 lea edx,[esp+0x4] ss:01a2e92f=????????
    77f582d9 cd2e int 2e
    77f582db c20c00 ret 0xc
    77f582de 8bc0 mov eax,eax
    ----> Stack Back Trace <----
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    00bdff24 77eecfd4 00000390 00000000 00000000 77da6ad2 ntdll!NtWaitForSingleObject (FPO: [3,0,0])
    00bdff4c 77ed4f5e 00000390 ffffffff 00000000 004069d8 kernel32!WaitForSingleObjectEx (FPO: Non-FPO [3,3,3])
    00bdffa8 77da8cac 00000001 001352a8 ffffffff 77ed4f05 kernel32!WaitForSingleObject (FPO: [2,0,0])
    00bdffb8 77ed4f05 001352a0 77f8e870 ffffffff 001352a0 advapi32!RegisterServiceCtrlHandlerA (FPO: [1,0,1])
    77ee2bdc 8b550000 68ff6aec 77f0ddc8 f0c71068 89645077 kernel32!lstrcmpiW (FPO: Non-FPO [2,8,3])
    ----> Raw Stack Dump <----
    00bdff28 d4 cf ee 77 90 03 00 00 - 00 00 00 00 00 00 00 00 ...w............
    00bdff38 d2 6a da 77 e8 2e ad 00 - 01 00 00 00 88 df db 77 .j.w...........w
    00bdff48 ac e0 db 77 dc 2b ee 77 - 5e 4f ed 77 90 03 00 00 ...w.+.w^O.w....
    00bdff58 ff ff ff ff 00 00 00 00 - d8 69 40 00 90 03 00 00 .........i@.....
    00bdff68 ff ff ff ff d2 6a da 77 - 00 00 00 00 3e 25 40 00 .....j.w....>%@.
    00bdff78 e8 2e ad 00 ff ff ff ff - 00 00 00 00 00 00 00 00 ................
    00bdff88 00 00 00 00 01 00 00 00 - 44 06 41 00 cf 03 00 00 ........D.A.....
    00bdff98 74 0b 41 00 70 e8 f8 77 - a0 52 13 00 ec ff bd 00 t.A.p..w.R......
    00bdffa8 a0 52 13 00 ac 8c da 77 - 01 00 00 00 a8 52 13 00 .R.....w.....R..
    00bdffb8 ff ff ff ff 05 4f ed 77 - a0 52 13 00 70 e8 f8 77 .....O.w.R..p..w
    00bdffc8 ff ff ff ff a0 52 13 00 - ff ff ff ff c4 ff bd 00 .....R..........
    00bdffd8 dc 4d f5 77 ff ff ff ff - 10 c7 f0 77 48 e2 f0 77 .M.w.......wH..w
    00bdffe8 00 00 00 00 00 00 00 00 - 00 00 00 00 9e 8c da 77 ...............w
    00bdfff8 a0 52 13 00 00 00 00 00 - 03 00 00 00 18 7a 13 00 .R...........z..
    00be0008 10 00 be 00 00 00 00 00 - 18 00 be 00 00 00 00 00 ................
    00be0018 20 00 be 00 00 00 00 00 - 28 00 be 00 00 00 00 00 .......(.......
    00be0028 30 00 be 00 00 00 00 00 - 38 00 be 00 00 00 00 00 0.......8.......
    00be0038 40 00 be 00 00 00 00 00 - 48 00 be 00 00 00 00 00 @.......H.......
    00be0048 50 00 be 00 00 00 00 00 - 58 00 be 00 00 00 00 00 P.......X.......
    00be0058 60 00 be 00 00 00 00 00 - 68 00 be 00 00 00 00 00 `.......h.......
    State Dump for Thread Id 0x135
    eax=00000000 ebx=00000000 ecx=008a86f0 edx=00000000 esi=0000010c edi=189afe84
    eip=77f582db esp=189afe68 ebp=189afe8c iopl=0 nv up ei pl nz na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000206
    function: NtWaitForSingleObject
    77f582d0 b8c5000000 mov eax,0xc5
    77f582d5 8d542404 lea edx,[esp+0x4] ss:197fe86f=00000019
    77f582d9 cd2e int 2e
    77f582db c20c00 ret 0xc
    77f582de 8bc0 mov eax,eax
    ----> Stack Back Trace <----
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    189afe64 77eecfd4 0000010c 00000000 189afe84 00000000 ntdll!NtWaitForSingleObject (FPO: [3,0,0])
    189afe8c 77ed4f5e 0000010c 000003e8 00000000 08170894 kernel32!WaitForSingleObjectEx (FPO: Non-FPO [3,3,3])
    189afe9c 08170894 0000010c 000003e8 008a15e0 00000001 kernel32!WaitForSingleObject (FPO: [2,0,0])
    189afee8 081ed3a3 00000001 000003e8 008a1510 008ab040 !JVM_FindSignal
    008ab040 00000000 00000000 00000000 00000000 008acf90 !JVM_RegisterUnsafeMethods
    0823703c 081ed120 081ed160 0806e710 0806e620 0806e620 !<nosymbols>
    0803a810 90909090 90909090 90909090 0424448b 7c8b5756 !JVM_RegisterUnsafeMethods
    State Dump for Thread Id 0x136
    eax=00000004 ebx=00000000 ecx=125bce20 edx=00000000 esi=000001c0 edi=00000000
    eip=77f582db esp=18aafbb4 ebp=18aafbd8 iopl=0 nv up ei pl zr na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
    function: NtWaitForSingleObject
    77f582d0 b8c5000000 mov eax,0xc5
    77f582d5 8d542404 lea edx,[esp+0x4] ss:198fe5bb=????????
    77f582d9 cd2e int 2e
    77f582db c20c00 ret 0xc
    77f582de 8bc0 mov eax,eax
    ----> Stack Back Trace <----
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    18aafbb0 77eecfd4 000001c0 00000000 00000000 00d71254 ntdll!NtWaitForSingleObject (FPO: [3,0,0])
    18aafbd8 77ed4f5e 000001c0 ffffffff 00000000 08177e73 kernel32!WaitForSingleObjectEx (FPO: Non-FPO [3,3,3])
    18aafbe8 08177e73 000001c0 ffffffff 18aafc78 00000000 kernel32!WaitForSingleObject (FPO: [2,0,0])
    18aafc38 081be7b0 00000000 00000000 00000001 008ac5b0 !JVM_FindSignal
    008ac5b0 00000000 00000000 00000000 00000000 008ac950 !JVM_RegisterPerfMethods
    08236450 08126b20 081cfc10 0806e620 0806e710 0806e620 !<nosymbols>
    0803a810 90909090 90909090 90909090 0424448b 7c8b5756 !JVM_FindSignal
    ----> Raw Stack Dump <----
    18aafbb4 d4 cf ee 77 c0 01 00 00 - 00 00 00 00 00 00 00 00 ...w............
    18aafbc4 54 12 d7 00 b0 c5 8a 00 - 50 c5 8a 00 c2 2e ed 77 T.......P......w
    18aafbd4 c0 01 00 00 00 00 00 00 - 5e 4f ed 77 c0 01 00 00 ........^O.w....
    18aafbe4 ff ff ff ff 00 00 00 00 - 73 7e 17 08 c0 01 00 00 ........s~......
    18aafbf4 ff ff ff ff 78 fc aa 18 - 00 00 00 00 00 00 00 00 ....x...........
    18aafc04 00 00 00 00 ff ff ff ff - 00 00 00 00 29 31 86 14 ............)1..
    18aafc14 02 00 00 00 00 00 00 00 - b0 c5 8a 00 c0 01 00 00 ................
    18aafc24 00 00 00 00 80 fc aa 18 - 00 00 00 00 ac fc aa 18 ................
    18aafc34 ed 85 db 00 b0 c5 8a 00 - b0 e7 1b 08 00 00 00 00 ................
    18aafc44 00 00 00 00 01 00 00 00 - b0 c5 8a 00 e8 ca 5b 12 ..............[.
    18aafc54 b0 c5 8a 00 3b 3c 11 08 - 20 a8 8a 00 00 00 00 00 ....;<.. .......
    18aafc64 00 00 00 00 b0 c5 8a 00 - b0 c5 8a 00 20 44 81 14 ............ D..
    18aafc74 c8 43 81 14 ac fc aa 18 - 03 86 db 00 4c c6 8a 00 .C..........L...
    18aafc84 c4 fc aa 18 00 00 00 00 - 00 00 00 00 90 fc aa 18 ................
    18aafc94 00 00 00 00 c4 fc aa 18 - 58 73 85 14 00 00 00 00 ........Xs......
    18aafca4 c8 43 81 14 bc fc aa 18 - e4 fc aa 18 33 2d db 00 .C..........3-..
    18aafcb4 00 00 00 00 59 65 db 00 - 00 00 00 00 00 00 00 00 ....Ye..........
    18aafcc4 e8 ca 5b 12 c8 fc aa 18 - ba 43 81 14 ec fc aa 18 ..[......C......
    18aafcd4 58 73 85 14 00 00 00 00 - 60 43 81 14 ec fc aa 18 Xs......`C......
    18aafce4 14 fd aa 18 33 2d db 00 - e8 ca 5b 12 03 00 00 00 ....3-....[.....
    State Dump for Thread Id 0x137
    eax=00000004 ebx=00000000 ecx=125bce20 edx=00000000 esi=00000304 edi=00000000
    eip=77f582db esp=18bafb84 ebp=18bafba8 iopl=0 nv up ei pl zr na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
    function: NtWaitForSingleObject
    77f582d0 b8c5000000 mov eax,0xc5
    77f582d5 8d542404 lea edx,[esp+0x4] ss:199fe58b=00000900
    77f582d9 cd2e int 2e
    77f582db c20c00 ret 0xc
    77f582de 8bc0 mov eax,eax
    ----> Stack Back Trace <----
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    18bafb80 77eecfd4 00000304 00000000 00000000 00d71274 ntdll!NtWaitForSingleObject (FPO: [3,0,0])
    18bafba8 77ed4f5e 00000304 ffffffff 00000000 08177e73 kernel32!WaitForSingleObjectEx (FPO: Non-FPO [3,3,3])
    18bafbb8 08177e73 00000304 ffffffff 18bafc48 00000000 kernel32!WaitForSingleObject (FPO: [2,0,0])
    18bafc08 081be7b0 00000000 00000000 00000001 008ac160 !JVM_FindSignal
    008ac160 00000000 00000000 00000000 00000000 008ac460 !JVM_RegisterPerfMethods
    08236450 08126b20 081cfc10 0806e620 0806e710 0806e620 !<nosymbols>
    0803a810 90909090 90909090 90909090 0424448b 7c8b5756 !JVM_FindSignal
    ----> Raw Stack Dump <----
    18bafb84 d4 cf ee 77 04 03 00 00 - 00 00 00 00 00 00 00 00 ...w............
    18bafb94 74 12 d7 00 60 c1 8a 00 - 30 c1 8a 00 c2 2e ed 77 t...`...0......w
    18bafba4 04 03 00 00 00 00 00 00 - 5e 4f ed 77 04 03 00 00 ........^O.w....
    18bafbb4 ff ff ff ff 00 00 00 00 - 73 7e 17 08 04 03 00 00 ........s~......
    18bafbc4 ff ff ff ff 48 fc ba 18 - 00 00 00 00 00 00 00 00 ....H...........
    18bafbd4 00 00 00 00 c0 da 8a 00 - 00 00 00 00 9c fb ba 18 ................
    18bafbe4 02 00 00 00 00 00 00 00 - 60 c1 8a 00 04 03 00 00 ........`.......
    18bafbf4 00 00 00 00 50 fc ba 18 - 00 00 00 00 7c fc ba 18 ....P.......|...
    18bafc04 ed 85 db 00 60 c1 8a 00 - b0 e7 1b 08 00 00 00 00 ....`...........
    18bafc14 00 00 00 00 01 00 00 00 - 60 c1 8a 00 18 ce 5b 12 ........`.....[.
    18bafc24 60 c1 8a 00 3b 3c 11 08 - 20 dc 8a 00 00 00 00 00 `...;<.. .......
    18bafc34 00 00 00 00 60 c1 8a 00 - 60 c1 8a 00 20 44 81 14 ....`...`... D..
    18bafc44 c8 43 81 14 7c fc ba 18 - 03 86 db 00 fc c1 8a 00 .C..|...........
    18bafc54 94 fc ba 18 00 00 00 00 - 00 00 00 00 60 fc ba 18 ............`...
    18bafc64 00 00 00 00 94 fc ba 18 - 58 73 85 14 00 00 00 00 ........Xs......
    18bafc74 c8 43 81 14 8c fc ba 18 - bc fc ba 18 33 2d db 00 .C..........3-..
    18bafc84 00 00 00 00 59 65 db 00 - 00 00 00 00 00 00 00 00 ....Ye..........
    18bafc94 18 ce 5b 12 03 00 00 00 - 18 ce 5b 12 98 fc ba 18 ..[.......[.....
    18bafca4 04 3c 86 14 d8 fc ba 18 - e0 3e 86 14 00 00 00 00 .<.......>......
    18bafcb4 80 3b 86 14 d0 fc ba 18 - f8 fc ba 18 0a 2e db 00 .;..............
    State Dump for Thread Id 0x138
    eax=7802a830 ebx=00000000 ecx=008af5f0 edx=00000000 esi=00000094 edi=00000000
    eip=77f582db esp=18cafeb8 ebp=18cafedc iopl=0 nv up ei pl zr na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
    function: NtWaitForSingleObject
    77f582d0 b8c5000000 mov eax,0xc5
    77f582d5 8d542404 lea edx,[esp+0x4] ss:19afe8bf=000000ff
    77f582d9 cd2e int 2e
    77f582db c20c00 ret 0xc
    77f582de 8bc0 mov eax,eax
    ----> Stack Back Trace <----
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    18cafeb4 77eecfd4 00000094 00000000 00000000 00000000 ntdll!NtWaitForSingleObject (FPO: [3,0,0])
    18cafedc 77ed4f5e 00000094 ffffffff 00000000 08170894 kernel32!WaitForSingleObjectEx (FPO: Non-FPO [3,3,3])
    18cafeec 08170894 00000094 ffffffff 7800139d 008afeb0 kernel32!WaitForSingleObject (FPO: [2,0,0])
    18caff38 081cf6e4 00000001 ffffffff 00000000 18caff84 !JVM_FindSignal
    78001d42 32a068ff 11687803 647800db 000000a1 89645000 !JVM_RegisterPerfMethods
    State Dump for Thread Id 0x139
    eax=0000000f ebx=00000000 ecx=010d8d29 edx=00000000 esi=0000015c edi=00000000
    eip=77f582db esp=18dafe24 ebp=18dafe48 iopl=0 nv up ei pl zr na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
    function: NtWaitForSingleObject
    77f582d0 b8c5000000 mov eax,0xc5
    77f582d5 8d542404 lea edx,[esp+0x4] ss:19bfe82b=26c89808
    77f582d9 cd2e int 2e
    77f582db c20c00 ret 0xc
    77f582de 8bc0 mov eax,eax
    ----> Stack Back Trace <----
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    18dafe20 77eecfd4 0000015c 00000000 00000000 008b0710 ntdll!NtWaitForSingleObject (FPO: [3,0,0])
    18dafe48 77ed4f5e 0000015c ffffffff 00000000 0817091c kernel32!WaitForSingleObjectEx (FPO: Non-FPO [3,3,3])
    18dafe58 0817091c 0000015c ffffffff 008af220 008af5d0 kernel32!WaitForSingleObject (FPO: [2,0,0])
    18dafea4 0806f032 00000000 ffffffff 008af220 008a0dc0 !JVM_FindSignal
    00000000 00000000 00000000 00000000 00000000 00000000 !<nosymbols>
    State Dump for Thread Id 0x13a
    eax=7ffad000 ebx=00000024 ecx=00000005 edx=28f40080 esi=28ef5e28 edi=19af5ec0
    eip=77eedbe3 esp=18eaf2bc ebp=77eedbdd iopl=0 nv up ei pl nz na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000206
    function: TlsGetValue
    77eedbdd 64a118000000 mov eax,fs:[00000018] fs:00000018=????????
    77eedbe3 8b4830 mov ecx,[eax+0x30] ds:80dfba06=????????
    77eedbe6 8b542404 mov edx,[esp+0x4] ss:19cfdcc3=26c89808
    77eedbea 8b4940 mov ecx,[ecx+0x40] ds:00e4ea0b=e006c0e0
    77eedbed 3911 cmp [ecx],edx ds:00000005=????????
    77eedbef 770e ja TlsGetValue+0x22 (77eedbff)
    77eedbf1 680d0000c0 push 0xc000000d
    77eedbf6 e8673bfeff call EnumResourceNamesW+0x37c (77ed1762)
    77eedbfb 33c0 xor eax,eax
    77eedbfd eb0e jmp TlsGetValue+0x30 (77eedc0d)
    77eedbff c7403400000000 mov dword ptr [eax+0x34],0x0 ds:80dfba06=????????
    77eedc06 8b8490100e0000 mov eax,[eax+edx*4+0xe10] ds:28f40e90=00000000
    77eedc0d c20400 ret 0x4
    ----> Stack Back Trace <----
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    18eaf2b8 080c656f 00000005 00000024 18eaf308 00002460 kernel32!TlsGetValue (FPO: [1,0,0])
    77eedbdd 488b0000 24548b30 40498b04 0e771139 00000d68 !<nosymbols>
    ----> Raw Stack Dump <----
    18eaf2bc 6f 65 0c 08 05 00 00 00 - 24 00 00 00 08 f3 ea 18 oe......$.......
    18eaf2cc 60 24 00 00 f0 f3 ea 18 - ec 6a 0c 08 24 00 00 00 `$.......j..$...
    18eaf2dc 01 00 00 00 23 01 00 00 - 74 31 0c 08 fe ff 00 00 ....#...t1......
    18eaf2ec d4 f6 ea 18 60 24 00 00 - 00 00 00 00 f0 f3 ea 18 ....`$..........
    18eaf2fc 28 81 00 29 23 01 00 00 - 00 5e 0b 00 00 00 00 00 (..)#....^......
    18eaf30c 8f 17 00 00 05 00 00 00 - c0 5e af 19 18 00 00 00 .........^......
    18eaf31c d8 50 f6 19 32 00 00 00 - 28 5e ef 28 dc b5 04 08 .P..2...(^.(....
    18eaf32c 01 40 00 00 b8 c8 26 08 - d4 f6 ea 18 88 f3 ea 18 .@....&.........
    18eaf33c dd db ee 77 b0 3a e3 1a - 00 00 00 00 00 00 00 00 ...w.:..........
    18eaf34c 63 24 00 00 08 00 00 00 - a0 2a 17 1a 32 00 00 00 c$.......*..2...
    18eaf35c c0 54 f6 19 32 00 00 00 - b8 5f ef 28 28 11 00 00 .T..2...._.((...
    18eaf36c d4 f6 ea 18 6d b4 04 08 - 00 00 00 01 b8 c8 26 08 ....m.........&.
    18eaf37c d4 f6 ea 18 dd db ee 77 - 00 00 00 00 00 00 00 00 .......w........
    18eaf38c fd a8 04 08 00 00 00 00 - 24 fa ea 18 00 00 00 00 ........$.......
    18eaf39c c8 8f 20 1a b0 f3 ea 18 - 00 b4 2d 1d 08 b4 2d 1d .. .......-...-.
    18eaf3ac f4 b7 2d 1d 00 b4 2d 1d - 08 57 95 09 38 cc 95 09 ..-...-..W..8...
    18eaf3bc fc d6 95 09 74 ff ea 18 - 0c 00 00 00 24 fa ea 18 ....t.......$...
    18eaf3cc 10 10 2f 1b e8 84 5b 09 - 18 83 3e 09 48 5d 35 09 ../...[...>.H]5.
    18eaf3dc 08 25 2d 1b 38 f5 ea 18 - 40 f7 ea 18 22 31 00 00 .%-.8...@..."1..
    18eaf3ec b0 f3 ea 18 0d 00 00 00 - 24 fa ea 18 28 00 e4 28 ........$...(..(
    State Dump for Thread Id 0x13b
    eax=00000000 ebx=00000000 ecx=099c4b40 edx=0000edd5 esi=18faf354 edi=0000001b
    eip=080c6ad4 esp=18faf334 ebp=18faf3f0 iopl=0 nv up ei pl zr na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
    function: <nosymbols>
    080c6ab3 8b4618 mov eax,[esi+0x18] ds:19dfdd5a=00000000
    080c6ab6 3bf8 cmp edi,eax
    080c6ab8 0f83d6000000 jnb 080c6b94
    080c6abe 8b4614 mov eax,[esi+0x14] ds:19dfdd5a=00000000
    080c6ac1 8b0cb8 mov ecx,[eax+edi*4] ds:0000001b=????????
    080c6ac4 81f998c82608 cmp ecx,0x826c898
    080c6aca 7420 jz 080c6aec
    080c6acc 894e0c mov [esi+0xc],ecx ds:19dfdd5a=00000000
    080c6acf 33c0 xor eax,eax
    080c6ad1 833900 cmp dword ptr [ecx],0x0 ds:099c4b40=00000000
    080c6ad4 7561 jnz 080c6b37
    080c6ad6 40 inc eax
    080c6ad7 83c104 add ecx,0x4
    080c6ada 83f808 cmp eax,0x8
    080c6add 72f2 jb 080c6ad1
    080c6adf 8b4e1c mov ecx,[esi+0x1c] ds:19dfdd5a=00000000
    080c6ae2 85c9 test ecx,ecx
    080c6ae4 7406 jz 080c6aec
    080c6ae6 57 push edi
    080c6ae7 e864faffff call 080c6550
    080c6aec 8b4618 mov eax,[esi+0x18] ds:19dfdd5a=00000000
    080c6aef 47 inc edi
    *----> Stack Back Trace <----*
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    18faf3f0 18fafa24 29050028 00000001 29170028 0000384e !<nosymbols>
    *----> Raw Stack Dump <----*
    18faf334 00 00 00 00 01 00 00 00 - cc 33 0c 08 f0 f3 fa 18 .........3......
    18faf344 c8 6d 1e 29 a0 6d 07 00 - 9c 15 00 00 04 00 00 00 .m.).m..........
    18faf354 00 00 00 00 a4 15 00 00 - 05 00 00 00 40 4b 9c 09 ............@K..
    18faf364 16 00 00 00 80 d9 30 09 - 39 00 00 00 e8 c0 0b 29 ......0.9......)
    18faf374 ee 2e 0c 08 01 00 00 00 - d4 f6 fa 18 00 00 00 00 ................
    18faf384 b8 c8 26 08 dd db ee 77 - 21 aa 04 08 00 00 00 00 ..&....w!.......
    18faf394 24 fa fa 18 00 00 00 00 - 28 f4 17 1a b0 f3 fa 18 $.......(.......
    18faf3a4 b0 c4 32 1d b8 c4 32 1d - a4 c8 32 1d b0 c4 32 1d ..2...2...2...2.
    18faf3b4 f8 57 a4 09 40 b1 a4 09 - ec d7 a4 09 74 ff fa 18 [email protected]...
    18faf3c4 0c 00 00 00 24 fa fa 18 - d0 e1 60 09 40 1b 68 09 ....$.....`[email protected].
    18faf3d4 20 55 76 09 c4 bf 76 09 - e0 3c 10 1a 38 f5 fa 18 Uv...v..<..8...
    18faf3e4 40 f7 fa 18 4e 38 00 00 - b0 f3 fa 18 0d 00 00 00 @...N8..........
    18faf3f4 24 fa fa 18 28 00 05 29 - 01 00 00 00 28 00 17 29 $...(..)....(..)
    18faf404 4e 38 00 00 b0 f3 fa 18 - b8 c4 32 1d 40 53 22 08 N8........2.@S".
    18faf414 0e 00 00 00 24 fa fa 18 - d4 f6 fa 18 5d 4f 00 00 ....$.......]O..
    18faf424 00 00 00 00 00 00 00 00 - 01 00 00 00 d4 f6 fa 18 ................
    18faf434 00 00 00 00 00 00 00 00 - d4 f4 fa 18 3c 2c 25 1a ............<,%.
    18faf444 00 00 00 00 d4 f6 fa 18 - 69 a4 04 08 70 0d 8a 00 ........i...p...
    18faf454 00 00 00 00 00 00 00 00 - 0c 00 00 00 95 d6 26 e8 ..............&.
    18faf464 0b 2e 11 3e f0 05 00 00 - db 02 00 00 1f 03 00 00 ...>............
    State Dump for Thread Id 0x13c
    eax=008b39b0 ebx=00000000 ecx=008a5010 edx=00000000 esi=190afeb8 edi=00000000
    eip=77f5791f esp=190afea4 ebp=190afec0 iopl=0 nv up ei pl nz na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000206
    function: NtDelayExecution
    77f57914 b827000000 mov eax,0x27
    77f57919 8d542404 lea edx,[esp+0x4] ss:19efe8ab=00004f00
    77f5791d cd2e int 2e
    77f5791f c20800 ret 0x8
    77f57922 8bc0 mov eax,eax
    ----> Stack Back Trace <----
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    190afea0 77eed227 00000000 190afeb8 008b3040 00000032 ntdll!NtDelayExecution (FPO: [2,0,0])
    190afec0 77eed1f0 00000032 00000000 0817d087 00000032 kernel32!SleepEx (FPO: Non-FPO [2,3,2])
    190afecc 0817d087 00000032 00000032 00000000 008b3900 kernel32!Sleep (FPO: [1,0,0])
    190aff00 081cf47b 008b3900 00000032 008b3040 00000000 !JVM_FindSignal
    00000000 00000000 00000000 00000000 00000000 00000000 !JVM_RegisterPerfMethods
    State Dump for Thread Id 0x13d
    eax=191af53c ebx=775fb100 ecx=001304d0 edx=00000000 esi=0013df48 edi=0000096c
    eip=77f582db esp=191af2f0 ebp=191af344 iopl=0 nv up ei ng nz ac pe cy
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000293
    function: NtWaitForSingleObject
    77f582d0 b8c5000000 mov eax,0xc5
    77f582d5 8d542404 lea edx,[esp+0x4] ss:19ffdcf7=26c89808
    77f582d9 cd2e int 2e
    77f582db c20c00 ret 0xc
    77f582de 8bc0 mov eax,eax
    ----> Stack Back Trace <----
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    191af2ec 775f89fa 0000096c 00000001 191af31c 0013df64 ntdll!NtWaitForSingleObject (FPO: [3,0,0])
    191af344 775f1202 0000096c 000008c0 00000002 00000004 msafd!<nosymbols> (FPO: Non-FPO [4,15,3])
    191af7ac 7764c1f3 000008c0 191af81c 191af82c 00000000 msafd!<nosymbols> (FPO: Non-FPO [6,274,3])
    191af7e4 7764c17e 000008c0 191af81c 191af82c 00000000 ws2_32!WSAAccept (FPO: Non-FPO [5,4,3])
    191af7fc 193b44a6 000008c0 191af81c 191af82c 008b6600 ws2_32!accept (FPO: [3,0,0])
    191af81c 08035288 00000014 191af7e4 00000010 191af860 !Java_java_net_PlainSocketImpl_socketAccept
    00000000 00000000 00000000 00000000 00000000 00000000 !<nosymbols>
    ----> Raw Stack Dump <----
    191af2f0 fa 89 5f 77 6c 09 00 00 - 01 00 00 00 1c f3 1a 19 .._wl...........
    191af300 64 df 13 00 4c df 13 00 - 1a 00 00 00 c0 65 8d 78 d...L........e.x
    191af310 96 ba c6 01 ff ff ff ff - ff ff ff 7f ff ff ff ff ................
    191af320 ff ff ff 7f 00 00 00 00 - 80 c3 13 00 ad 1f 63 77 ..............cw
    191af330 d8 11 5f 77 c0 08 00 00 - 00 00 00 00 00 00 00 00 .._w............
    191af340 00 00 00 00 ac f7 1a 19 - 02 12 5f 77 6c 09 00 00 .........._wl...
    191af350 c0 08 00 00 02 00 00 00 - 04 00 00 00 00 00 00 00 ................
    191af360 28 e0 13 00 50 c0 13 00 - 60 7c 8b 00 70 7c 8b 00 (...P...`|..p|..
    191af370 74 7c 8b 00 80 7c 8b 00 - 00 00 00 00 00 66 8b 00 t|...|.......f..
    191af380 60 7c 8b 00 00 66 8b 00 - 54 7c 8b 00 f4 7f 8b 00 `|...f..T|......
    191af390 e0 65 8b 00 b0 6b 8b 00 - cc 6b 8b 00 a4 6f 8b 00 .e...k...k...o..
    191af3a0 3d ca 14 08 d4 f5 1a 19 - 74 7c 8b 00 60 7c 8b 00 =.......t|..`|..
    191af3b0 54 7c 8b 00 70 7c 8b 00 - 01 00 00 00 80 7c 8b 00 T|..p|.......|..
    191af3c0 00 66 8b 00 d0 e3 98 14 - 74 7c 8b 00 04 d7 14 08 .f......t|......
    191af3d0 d4 f5 1a 19 54 7c 8b 00 - 70 7c 8b 00 60 7c 8b 00 ....T|..p|..`|..
    191af3e0 64 7c 8b 00 68 7c 8b 00 - 6c 7c 8b 00 01 00 00 00 d|..h|..l|......
    191af3f0 24 f4 1a 19 8c 8f e8 00 - 59 f9 f7 77 23 00 00 00 $.......Y..w#...
    191af400 5c f4 1a 19 70 f4 1a 19 - 7a a1 83 14 98 1d 5d 12 \...p...z.....].
    191af410 e8 fb 1a 16 0c f7 1a 19 - 01 00 00 00 83 7d de 00 .............}..
    191af420 5c f4 1a 19 70 f4 1a 19 - 54 47 f5 77 34 f4 1a 19 \...p...TG.w4...
    State Dump for Thr

    user4815182 ,
    You should start a new thread. The thread you added to was posted in 2007.
    Also, what I would recommend is that you go to http://java.sun.com/webapps/bugreport/crash.jsp and follow the steps there, adding flags etc, to help identify or even solve the issue you are seeing.
    The initial post indicated that they are using 1.4.2, which is super old. Bugs are fixed in releases that have higher numbers. I recommend that you run, or at least try, to run with the latest 1.7 release. The downloads can be found here: http://www.oracle.com/technetwork/java/javase/downloads/index.html
    If you you are convinced that you need 1.4.2, or there are other issues seen with 1.7, a more recent 1.4.2 release can be found in the archive. Please note that security vulnerabilities are fixed with each release. As 1.4.2 has reached the End of Public Releases, there has not been a new public release in a long time. Current 1.4.2 releases with vulnerabilities fixes can be obtained through a support contract http://www.oracle.com/us/technologies/java/standard-edition/support/overview/index.html.
    That said, you can still access the Download Archive: http://www.oracle.com/technetwork/java/archive-139210.html .
    -Roger

  • Labview application crashes with a Dr Watson Access violation c0000005 in win2K service pack 2 and 3

    The application was developed on a Dell Optiplex PIV 2GHz, 512 MB Ram using LabVIEW 6.1 Profesional Control Development Suite. The exe runs for between 10 minutes and 21 days before exiting with a Dr Watson Access Violation error 0xc0000005. The basic stack dump info is as follows:
    Application exception occurred:
    App: (pid=312)
    When: 2/4/2003 @ 20:54:51.843
    Exception number: c0000005 (access violation)
    *----> System Information <----*
    Computer Name: NO1
    User Name: No1
    Number of Processors: 1
    Processor Type: x86 Family 15 Model 2 Stepping 4
    Windows 2000 Version: 5.0
    Current Build: 2195
    Service Pack: 2
    Current Type: Uniprocessor Free
    Registered Organization: xxxxxxxxxxxx
    Registered Owner: xxxxxxxxxx
    *----> Task List <----* edited for brevity
    312 xxxxxxx.exe
    1056 drwtsn32.exe
    0 _Total.exe
    State Dump for Thread Id 0x38c
    eax=78e34ff8 ebx=79288ab8 ecx=00000001 edx=78e338cc esi=78e34ffd edi=78e338d1
    eip=3027bf0d esp=0012fc70 ebp=0012fc7c iopl=0 nv up ei pl nz na pe nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000202
    function: MoveBlock
    3027bef7 fc cld
    3027bef8 eb15 jmp CheckFPStat+0xe52 (3027ce0f)
    3027befa 0fbae100 bt ecx,0x0
    3027befe 7301 jnb CheckFPStat+0xa344 (30286301)
    3027bf00 a4 movsb ds:78e34ffd=32 es:78e338d1=00
    3027bf01 d1f9 sar ecx,1
    3027bf03 0fbae100 bt ecx,0x0
    3027bf07 7302 jnb CheckFPStat+0x654e (3028250b)
    3027bf09 66a5 movsw ds:78e34ffd=3532 es:78e338d1=0000
    3027bf0b d1f9 sar ecx,1
    FAULT ->3027bf0d f3a5 rep movsd ds:78e34ffd=???????? es:78e338d1=00000000
    3027bf0f 5e pop esi
    3027bf10 5f pop edi
    3027bf11 59 pop ecx
    3027bf12 8be5 mov esp,ebp
    3027bf14 5d pop ebp
    3027bf15 c3 ret
    The error is always "move block" and leads me to believe that it is a windows memory manager issue but I cannot resolve it. The application connects to an ethernet GPIB interface and to 10 Opto22 Ethernet brains via activeX. The processor runs about 25%, there are no apparent memory leaks, and there is at least 300Mb of free ram when the crashes occur. Any suggestions?
    Thanks,
    Ian

    I am having the same issue with LabVIEW 7.1
    From Dr. Watson:
    Microsoft (R) Windows 2000 (TM) Version 5.00 DrWtsn32
    Copyright (C) 1985-1999 Microsoft Corp. All rights reserved.
    Application exception occurred:
    App: (pid=2208)
    When: 10/21/2005 @ 13:09:12.530
    Exception number: c0000005 (access violation)
    *----> System Information <----*
    Computer Name: WEESUSCILPCWRM0
    User Name: RDL
    Number of Processors: 2
    Processor Type: x86 Family 15 Model 4 Stepping 1
    Windows 2000 Version: 5.0
    Current Build: 2195
    Service Pack: 4
    Current Type: Multiprocessor Free
    Registered Organization:
    Registered Owner: Administrator
    *----> Task List <----*
    0 Idle.exe
    8 System.exe
    168 SMSS.exe
    192 CSRSS.exe
    188 WINLOGON.exe
    240 SERVICES.exe
    252 LSASS.exe
    396 scardsvr.exe
    472 svchost.exe
    500 spoolsv.exe
    568 dklog.exe
    592 svchost.exe
    616 FrameworkServic.exe
    688 mcshield.exe
    708 vstskmgr.exe
    728 naPrdMgr.exe
    844 regsvc.exe
    860 mstask.exe
    900 Smc.exe
    1020 WinMgmt.exe
    1048 Wuser32.exe
    1076 CcmExec.exe
    1188 dkcktkn.exe
    1876 svchost.exe
    916 explorer.exe
    2172 shstat.exe
    1988 tbmon.exe
    1200 UpdaterUI.exe
    2012 dkAutoReg.exe
    2072 ERClient7.exe
    1916 LabVIEW.exe
    2288 notepad.exe
    2284 notepad.exe
    2208 WINWORD.exe
    2424 agentsvr.exe
    1900 DRWTSN32.exe

  • How to resolve and debug access violation Error.

    Hello
    I'm stucked with an access violation error which forces my exe build to shut down. I tried also from development environment but its the same there. The error happens after 5-60minutes.
    I played around with disabling a part of the program where it was possible and I think I'm now able to accuse the vi "gastimer.vi". But since this vi leads through the measurement procedure, there are some commands outgoing which I was not able to map one to one.
    My question is: what can cause such access violation errors? I have no dll calls, no third party library, actually the hardware communication is done serial by COM ports. The architecture principle is something adapted from producer consumer loop, except that i have often more than one consumer, so I called them like controller loop - multiple task. The communication within this loops (tasks) are done by queue cluster with an enumerator and variant.
    The indicted vi "gastimer.vi" was transfered from an older and more simply architecture. This vi works with sequence structure and a lot of local variables.
    Since I'm testing sensor on their response to gas concentration I have 10 comports to which I'm listening in parallel.
    What styles or archtiecture are prone to access violations? Where can they happened? where should I look more carefully in the code?
    How can I use the desktop execution trace toolkit to get more information about the cause of the access violation?
    Attached are two different lvlog but I guess with the same error source. In the second lvlog are two vi's named. What have they to do with the access violation error? What kind of information can i get from these lvlog files?
    Last attachement shows a runtime fatal error which happens quite a bit frequently in the recent time when working with this project. Might there be a connection, propably a crashed vi, typedef or whatever?
    Thanks for any help
    U. Siegenthaler
    Solved!
    Go to Solution.
    Attachments:
    first.zip ‏203 KB
    second.zip ‏40 KB
    Fatalerror.PNG ‏21 KB

     Have you checked your code to try to isolate any areas of possible memory leaks? I was able to find some discussion forums with similar problems. Check out the links below to see if any of these resources can be of assistance to you. 
    "Exception: Access violation (0xC0000005) at EIP=0xFDD76383" 
    http://forums.ni.com/t5/LabVIEW/Exception-Access-violation-0xC0000005-at-EIP-0xFDD76383/m-p/2257502 
    "Exception: access violation (0xc0000005) at EIP=0x00BD0984 " 
    http://forums.ni.com/t5/LabVIEW/Exception-access-violation-0xc0000005-at-EIP-0x00BD0984/m-p/2303864 
    "Access violation (0xC0000005)" 
    http://forums.ni.com/t5/LabVIEW/Access-violation-0xC0000005/m-p/2269694 
    Let me know what you find and if you have any other questions. 
    Best regards
    Matijas

  • Access violation (0xC0000005)

    Hi 
    I am getting continuing problem with the crashing and Access violation (0xC0000005) at EIP=0x00962D22.
    When the crash happens the vi is gettting corrupt and impossible to open next time, so I need to work of the back up. 
    I tried to recompile everything, change the type defs, update to LabVIEW 12, open on another PC, same thing. I can work for 10min save the work several times do different things, and at one point LV crashes with that error. 
    Any ideas what to do? It is really a show stopper for me.
    The report dump below.
    thanks
    #Date: Thu, Jan 03, 2013 3:42:12 PM
    #OSName: Windows 7 Enterprise
    #OSVers: 6.1
    #OSBuild: 7600
    #AppName: LabVIEW
    #Version: 12.0f3 32-bit
    #AppKind: FDS
    #AppModDate: 10/05/2012 00:12 GMT
    #LabVIEW Base Address: 0x00400000
    <DEBUG_OUTPUT>
    1/3/2013 3:44:28.199 PM
    Crash 0x0: Crash caught by NIER
    File Unknown(0) : Crash 0x0: Crash caught by NIER
    minidump id: 7eb8157a-59f0-40af-acb9-a7b7df11beb2
    ExceptionCode: 0xC0000005
    </DEBUG_OUTPUT>
    0x01AF1179 - LabVIEW <unknown> + 0
    0x01AF1688 - LabVIEW <unknown> + 0
    0x7C37FDB4 - MSVCR71 <unknown> + 0
    0x771973E7 - ntdll <unknown> + 0
    0x77159F15 - ntdll <unknown> + 0
    0x00000000 - <unknown> <unknown> + 0
    *** Dumping Bread Crumb Stack ***
    *** LabVIEW Base Address: 0x00400000 ***

    pawel,
    I found your post here very interesting as I was having a VERY similar problem.  The only notable difference I could find with my situation is I only seemed to encounter this problem on 64-bit systems, and only when my application was a deployed exe.  However, I too was using a number of 3rd party .ocx and .dll utilities.  But this stubborn Access Violation error was so sporadic (it might have triggered 5 seconds into execution, or 5 hours) it was near impossible to track exactly WHY it was happening.
    Have you tried using the LabVIEW Desktop Trace Execution Toolkit yet?  I used it to tap into my deployed executable on the target machine while monitoring all VI calls, memory adjustements, etc from my development machine.  Although it wasn't a definitive sure-fire way to a solution, it did help me pin-point a pattern.
    For about 80% of my crashes, I noticed the last applicable VI to execute (after filtering out a bunch of typical utility VI calls) was "Wait On ActiveX Event.vi".  After a bit of digging, this VI was retired quite some time ago and has been upconverted from version to version since.  It was written into a library that has been rock solid for years.  Although it seemed to execute fine on my devlopment machine (as source code - not a built exe, 32 bit, 64 bit..whatever) and also functioned on all target 32-bit environments wrapped in an exe, it was actually the culprit to my Access Violation errors.
    I know how frustrating it is to narrow something like this down.  If you're still having issues and you haven't tried that Toolkit, I would suggest giving it a shot.
    Good luck.
    -Chris
    Sr Software and Automation Engineer
    Certified LabVIEW Architect
    Kod Integrations, LLC
    http://www.kodintegrations.com

  • Access violation in vpnapi!ConnectIfcData::updateHostAddresses+0x1765f

    Just for information
    1618.1d5c): Access violation - code c0000005 (!!! second chance !!!)
    eax=0000005c ebx=00000000 ecx=00000000 edx=73c6b3e6 esi=00000000 edi=0000005c
    eip=73c1c0f5 esp=0a06f7f8 ebp=0a06f81c iopl=0         nv up ei pl zr na pe nc
    cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00010246
    vpnapi!ConnectIfcData::updateHostAddresses+0x1765f:
    73c1c0f5 8b4804          mov     ecx,dword ptr [eax+4] ds:0023:00000060=????????
    0a06f81c 73c4c0e6 0a06f97c 1b36bccb 73c87160 vpnapi!ConnectIfcData::updateHostAddresses+0x1765f
    0a06f9f4 73c4be14 0a06faf8 6e6e6f63 69746365 vpnapi!CAHSSettings::getAHSPreferences+0x12aa
    0a06fac0 73c4b967 053614b0 0a06fae8 0a06faf8 vpnapi!CAHSSettings::getAHSPreferences+0xfd8
    0a06fb18 73bebf06 771aee1c 053614b0 0a06fb68 vpnapi!CAHSSettings::getAHSPreferences+0xb2b
    0a06fb28 776d37fb 053614b0 7d727ae6 00000000 vpnapi!VPNStatsWriter::VPNStatsWriter+0x4dfe
    0a06fb68 776d37ce 73bebefd 053614b0 00000000 ntdll!RtlInitializeExceptionChain+0xef
    0a06fb80 00000000 73bebefd 053614b0 00000000 ntdll!RtlInitializeExceptionChain+0xc2
    Application using c#.net 2.0, Windows 7/64
    C:\Program Files\Cisco\Cisco AnyConnect Secure Mobility Client\vpnapi.dll, file version 3.1.3103.0
    Seen one time so far.

Maybe you are looking for

  • Can anyone help with Adobe Revel Question?

    Hi Guys I was setting up Revel and in set up it asked me to select which files i wanted to see on my smart phone and I selected all the files.  I now have changed my mind and I want to be able to select the files.  However I cant see where the heck t

  • Please help convert MSSQL Stored Procedure to Oracle PL/SQL

    Hi there to all, this be my first post to these forums. I have already posted this question on a microsoft msdn forum, until someone advised that I ask my question here - dunno why I didnt think of that! ?:| Im working with an Oracle 10g Database fro

  • Aperture - a few questions

    Hi there I've been doing lot of reading but struggling to find (or understand!) answers to a few questions. I have decided that the simplest way to do things is to import files straight from camera into aperture (although one forum member mentioned s

  • Calling in external files?

    I see this in the docs: Q: Can AIR applications for iOS devices load SWF files or other code at  runtime, such as a module from a website? Are AIR applications for iOS  built with Flash Platform tools interpreted at runtime? A: No. AIR applications b

  • Zoom presentor display only for presentations

    I use the UA "zoom" function for all my work. I must give a presentation soon demonstrating a website. Is there a way to have the magnifier function activated on my (presentor) screen while rendering the projected display "normal" or without the zoom