Access violation wlserver.exe

while installing my weblogic server 5.1,it is giving an application error has occured,and access violation?

hai , i am mailing regarding the memory refrence error shown by Dr watson in nt when you were running the wl server5.0posted by you in the bea site. in novemberi face the same error when i run wl 6.0 console . If you have a solution to the problem please reply back regarding the samebyethomas

Similar Messages

  • CR XI Unhandled exception in crw32.exe Access violation switching printers

    I'm running Crystal Reports Developer 11.0.0.2495. On any report, when I go to page setup and attempt to change the printer to my Dymo 400 Turbo label writer, I get an "unhandled win32 exception occured in crw32.exe [8420]" error. When I go into the debugger it tells me :
    Unhandled exception at 0x6a901e35 in crw32.exe: 0xC0000005: Access violation writing location 0x42747570.
    I have made an exception in the DEP. Any ideas?

    Are you using dual monitor?
    Regards,
    Shweta

  • InitCVIRTE generates error message "Unhandled exception in "MyApp.exe": 0xC0000005: Access violation reading location 0x00000000."

    Hi,
    I have converted a LabWindows CVI project to Visual Studio 2005. When I start the application i debug mode I get the message "Unhandled exception at 0x685662ba in EE352-500V.exe: 0xC0000005: Access violation reading location 0x00000000."
    It comes when the application calls:  InitCVIRTE in this context:
    int __stdcall WinMain (HINSTANCE hInstance, HINSTANCE hPrevInstance, LPSTR lpszCmdLine, int nCmdShow)
    // Initialize LabWindows/CVI run-time library
    if (InitCVIRTE (hInstance, 0, 0) == 0)
    return -1; /* out of memory */
    The debugger indicates that value of hInstance is 0x00400000 {unused=9460301} 
    Can someone give me a solution to this problem. I have done some search on the Web without success.
    Thanks!

    I think that exception might be coming from the data execution prevention service that is part of Win XP SP2.  The OS thinks that you're somehow trying to execute in the data segment and kills the process.  It's intended to catch worms and viruses.
    You can turn this service off for non-Microsoft programs using the control panel.
    Many pointer handling errors now report as this exception instead of as a memory violation exception.  That looks like a null pointer derefence to me.
    Menchar
    Message Edited by menchar on 11-09-2007 07:12 PM

  • Java.exe crashing with Dr Watson access violation at address 500bf974

    We have been sucessfully runing an application delveloped with JDK 1.2.2 on a Pentium III machine with Windows NT 4 SP5 (384Mb RAM). I have replaced the Pentium III machine with a pentium 4 with 1Gb RAM (still running NT4 SP5). In fact, I simply took the HDD out of the PIII and installed it in the P4.
    All applications work correctly (Sybiz Vision, MS Office 97 suite), however, when I go to run the java application is crashes and a Dr Watson Access Violation in java.exe error is generated.
    I have:
    1. Reinstalled the JDK 1.2.2.
    2. Confirmed that all hardware drivers (new NIC, Video and Sound Card) were updated with the appropriate versions from the hardware suppliers web pages.
    3. Read thru previous posts on this site (and others) for similar errors, but have only been able to find similar questions.
    4. Lowered the video card display colours to 256 rather than 65,536.
    None of the above have made any difference.
    I hope this question will prompt the java/Dr Watson gurus out there to help me resolve this frustrating problem.
    Thanks in anticipation.
    Greg

    Consider getting 1.2.2_014, or whatever is the latest version of 1.2.2. I think there were some issues with Pentium IV processors which were fixed in one of the later incarnations of the JDK.
    You can get the latest version of 1.2.2 from the following url:
    http://java.sun.com/products/jdk/1.2/download.html

  • Access violation at address 0041B7D6 in module AcrobatPro_11_Web_WWMUI.exe Read of access 00000008

    When installing Acrobat Pro, I receive these errors:
    EAccess violation in module AcrobatPro_11_Web_WWMUI.exe at 0001B7D6
    access violation at address 0041B7D6 in module AcrobatPro_11_Web_WWMUI.exe Read of access 00000008
    The program will not run.
    Help?

    Sounds like you have a corrupt file and need to download again. As large as the download is, it is not surprising that an error occurs.

  • ACCESS VIOLATION calling SQLPEX - SQLLIBSHRA.EXE

    This is a problem for OpenVMS / Oracle Experts
    I have quit an old large legacy system to integrate - actually migrating away from a CORBA based communication backbone to a webservice AXIS2/Java based backbone using HP's WSIT e all, and yes - this legacy uses an old Oracle 7.3
    The OS is HP OpenVMS / Alpha V 7.3-n,
    When I link all my native code together the process launched through Java JNI is a "NETWORK" detached process which should do a DB_Connect via SQLPEX (ctx, sqlstm );
    The layers involved are like that; AXIS2/J webservice -> WSIT-javaBean ->
    JVM -> JNI -> SPg-Server.c (an wsit outer-wrapper) -> SPg-Legacy.c(my inner wrapper) -> SPS_WRAPPER.PAS (the inner-most wrapper / dispatcher) -> Business-logic-*.PAS -> DataBaseAccess.PAS
    (the database access code was generated by LNPROPAS from statements like EXEC SQL CONNECT .... etc.)
    When I exchange my SPS_WRAPPER.PAS WRAP() by a TestWrapper.PAS WRAP() which bypasses all business logic, SQLPEX(ctx, sqlstm); works perfectly and the database opens, in fact, a new detached second process is launched as ORA_nnnnn and my detached integrated web service process communicates nicely via MailBox Devices.
    However when I link in my original legacy code, LINK is fine, and all my business code runs fine when it gets called from the WRAP(), BUT I get an ACCESS VIOLATION as soon as SQLPEX() is called to connect to the Database.
    I can not debug because the code which does the access violation, for what ever reason, is in SQLLIBSHRA.EXE, and invoked when I call sqlpex( ctx, sqlstm )
    Maybe there is ONLY a resource problem, but why then an ACCESS VIOLAITION and yes, which resource to we have to make bigger. SYSGEN Parameters, autogen feedback did not help.
    I am not an Oracle Expert, so I do not know what and how I can make ORACLE tracing and logging and show me why I get this acess violation in a pice of code which runs nicely since 10 years in a CORBA environment, also runs nicely when my business logic is bypassed.
    And yes: ORA_ROOT:[000000.NETWORK.ADMIN]ORASRV_BEQ_A.COM
    is not hit / called when it comes to the access violation.
    Any hints are welcome before I have to jump into machine code debugging without a source listing.
    [email protected]

    This problem was caused by a user-stack-heap-code-collision
    PTHREAD applications may not do aoutomatic stack size expansions on a per thread basis and hence an access violation deep in long-time-running code is very likely to occure. (code which does not belong to YOU, for which you know it runs basically since 10 years, which migth not be supported any longer by the vendor)
    solution: WSIT (webservice integration toolkit) by default assignes 30000 bytes for each threads user-stack-size, can be adjusted in the .WSI deployment descriptor file; Now running at 60'000. WSIT V3.0 will allow for single threaded legacy server integration and have a automatic stack size expansion supported when running in this mode. (as per HP)
    [email protected]

  • Access violation at 0x6d801017 in java.exe

    History, so you can guess why it bothers me at all:
    When debugging the C++ part of my JNI application occasionally an error
    First-chance exception at 0x6d801017 in javaw.exe: 0xC0000005: Access violation writing location 0x003e0d00.
    pops up in Visual Studio.
    There's no usable call stack, and it happens occasionally only. Ignoring does not seem to hurt anything.
    By reducing everything suspicious and trying to find the trigger for this access violation, I noticed it does not have anything to do with my native code. I don't need to reference any native method or even load my library at all.
    But it seems to be related to Garbage Collection.
    My test now looks like this:
    public class TestGCException {
         public static void main(String[] args) {
              TestGCOnly();
         final static Runtime rt=Runtime.getRuntime();
         static String runFinalize() {
              // can be embedded in code or in Expressions window to be run at every debug step
              rt.runFinalization();
              rt.gc();
              return "Finalized at " + (new java.util.Date(System.currentTimeMillis()));     
         public static void TestGCOnly() {
              //java.util.Properties sysProps = System.getProperties();
              //sysProps.list(System.out);
              try {
                   System.out.print("Press <Enter> after Attach to process javaw.exe :");
                   System.in.read();
              } catch(java.io.IOException iox){};
              System.out.println("Starting Test");
              try {
                   int loops = 5;
                   while (loops-- > 0) {
                        for (int i = 0; i < 100; i++) {
                                  Long l = new Long(123456789);
                                  Long l2 = -l;
                                  l = l2 * 2;  // just to avoid "never read" warnings in Eclipse
                             Thread.sleep(3);
                             runFinalize();
                        runFinalize();
                        System.out.print(".");
              } catch (InterruptedException e) {
                   System.out.print("!");
              System.out.println(" Done");
    } It runs fine, but Visual Studio 2008, when attached, reports about 20 such access violations in those 500 loops.
    If interesting, here are some of the System Properties:
    os.name=Windows XP
    os.arch=x86
    java.vm.name=Java HotSpot(TM) Client VM
    java.vm.version=14.0-b16
    java.runtime.version=1.6.0_14-b08
    java.vendor=Sun Microsystems Inc. (: that's why I post here :)Usually I run it in Eclipse Ganymede, but that behavior also shows up when run from a command prompt like
         java -cp . TestGCException
    Is there more to say than "Ignore that message, and try to avoid (debugging) native code " ?
    Edited by: DataFiddler on Sep 25, 2009 8:45 AM

    I have the same problem. I tried several versions of the JVM: update 1, 7, 16 and 17.
    Access violations are raised at what seems to be random times. I tried your repro above and can confirm access violations are raised.
    Because the JVM handles (and swallows) these errors, I can't debug DLL components accessed through JNI in an optimal manner, since this disturbs the VC++ debugger. If my code does an access violation, the debugger won't tell me where - the application just stops, and the debugging session ends.
    Worse, we want to trap all system exceptions in our application in order to make sure we close database connexions properly and release locks, but we can't, as we cannot detect whether an access violation is expected (JVM) or not (our code).

  • Java.exe Access Violation Error(URGENT)

    Hi all,
    I have created a application for my company. This application requires a user to login into the site by giving his userid/pwd. Once the person logs into the site, there is this error "Java.exe Access Violation Error" which pops up and terminates the Web Server.
    My Login page is a HTML page which inturns calls a Jsp which authenticates the user.Once the authentication is completed, the user id is put into the session so i can check for the existence of user session on each subsequent page. After the user successfully logs in, the error pops up.
    Please get back to me incase u have ever encountered this error and what might be the solution.
    I am using Tomcat Webserver 3.2.3, Sql Server 7.0 as the Database Server, JDK1.3 .
    Regards,
    Yatin

    As far as i remember i faced this problem when the memory of my pc was broken. So it may not be a problem of java or html code.

  • Access violation error message 'WMP54GSv1_1.exe'

    Hi,
    Each time I start my Compaq Presario, I get the following Error message: "Access violation at address 004A55F7 in module ‘WMP54GSv1_1.exe’. Read of address 00000000." I cannot view wireless networks or access internet.
    I have a Linksys wireless card in my PC and it just came back from HP for faulty on/off switch servicing.
    How do I rememdy this situation?
    Thanks!!
    TJ

    The drivers you need to download are your correct product model number and version which you may find underneath the card itself on one of the stickers... or with the card box (if you still have it)
    After you have downloaded them, just 1st transfer them into the non-working PC... the file might be zipped... so you might need to unzip them first...  you then uninstall the card from the PC... either go to add/remove programs and add/remove hardware....
    Then restart the PC... after you restart it, you will probably be prompted for a "found new hardware wizard"... just go through the process... if it asks your for the drivers.. select "specify a location and specify the folder where you actually unzipped the files...
    Sounds lengthy I know...

  • Access violation (0xC0000005) at EIP=0x0534BABC when launching Exe

    Hi All,
    I am facing "Access violation (0xC0000005) at EIP=0x0534BABC" issue when I tried to launch my exe. Earlier versions of the exe were running fine until I added Email notification features using .net SMTP APIs and built it again. 
    System,
    Development and Deployment systems are different. I am able to run source code on both systems and Exe on Developement system. But exe is not working in Deployment system.
    Exception,
    I have attached the sanpshot of crash report pop-up and Log Report of the exception.
    Please help!
    Anandelamaran Duraisamy,
    Senior Project Engineer,
    Soliton Technologies (P) Ltd,
    www.solitontech.com
    Attachments:
    Crash Report.png ‏11 KB
    Crash Report.zip ‏19 KB

    Additional details,
    When I tried "Run as administrator", I could see the exe icon on the task bar for few seconds then it disappears. It basically fails to launch, also I don't get any error message. 
    The Exe is created in development PC which runs 64 bit Window 7 and 32 bit LabVIEW. The deployment system has 32 bit Windows 7 and 32 bit LabVIEW. I hope it doesn't matter as far as my LabVIEW installations are 32 bit in both systems.
    Anandelamaran Duraisamy,
    Senior Project Engineer,
    Soliton Technologies (P) Ltd,
    www.solitontech.com

  • Access violation flash10l.ocx (CP4 exe)

    I get the error access violation flash10l.ocx when running an exe published from CP4. We've tried exporting it as Flash 10, Flash 9, and Flash 8... We've tried reverting to Flash Player 10.1 (works! but when we udate to the latest Flash Player it crashes again and I know my customers will continually update Flash Player, so we need to make it not crash with the current Flash Player.)
    Aaron

    Hi,
    One option is to NOT use ActiveX, they are not multi-platform and difficult to use with Java. (You said you have wrote the ActiveX : write a library instead).
    if(Is your OCX working well with a M$ language ?) {
    Try an other Bridge, they are many (free and commercial).
    Free ones I know : SWT, Jacob, Jawin with no preference order.
    } else {
    debug your OCX;
    }

  • RWRBE60.exe has generated an exception: access violation

    I have a user who uses Oracle report called from a form. Several times a day she reports that she get a Dr. Watson application error saying that RWRBE60.exe has generated an exception: access violation when she invokes the report runtime (while running the report not printing it). She is running Windows NT Version 4.0, SP 6; She has 256K memory. She is running Forms 6.0.5.0.2 and Oracle Report 6.0.5.28.0. Any thoughts?
    Thanks
    Anandhi

    I've got a similar problem. I'm running windows xp and reports 6.0.8.22 including Patch 13. I don't get the same error, but the RWRBE60.exe stops with a problem. That only occurs by using reports where the parameters are variable and only by the second time I call such a report. If I close the RWRBE60.exe after the first report that probem doesn't occur. Maybe you could check, whether the problem doesn't occur if you close RWRBE60.exe between two reports.

  • Access Violation error with Diadem 2011

    I've started using Diadem 2011, and have run into an Access Violation error when loading some of my existing reports.  I've created a simple example which shows what's happening:
    I've created a simple Bar plot:
    If I change the left hand bar to be "Filled" instead of "Right Diagonal", Diadem throws up an access violation error.  I've attached the TDM and TDR files used to create the graph.  The error in the log file is:
    139  Error while executing "" command
         Error type: ACCESS VIOLATION
         Error address: 0004F5E5
         Module nameIAdem.exe
    Diadem: 11.0.3f4563 TDM
    USI: 1.9.0f4551
    DataFinder: 3.0.0f4556
    (By the way, it would be great to be able to copy those version details directly from the About page!)
    Attachments:
    Data.zip ‏7 KB

    I've tried this as administrator, and have exactly the same issues, so it doesn't appear to be a permissions problem.  I've uninstalled and reinstalled DIAdem and everything's the same.
    Here's another ZIP file with hopefully all of the required files.  I've created the data files from scrathc several times, and see the same problem.  One other thing I've just noticed is that it only occurs when filling the bars with the color Black, not blue or red or anything else.
    Attachments:
    Data.zip ‏9 KB

  • Access violation error with 1.4.0

    Our client/server application (RMI) ran fine in 1.3.1. When we compiled and deployed with 1.4.0, an error of "access violation" were thrown by Windows NT or Windown 2000 at run time. Stack trace posted as below. Anyone has any ideas on the cause of it. Thanks you very much.
    Application exception occurred:
    App: (pid=346)
    When: 6/18/2002 @ 17:18:40.166
    Exception number: c0000005 (access violation)
    ----> System Information <----
    Computer Name: PAUL
    User Name: paul
    Number of Processors: 1
    Processor Type: x86 Family 6 Model 4 Stepping 2
    Windows Version: 4.0
    Current Build: 1381
    Service Pack: 6
    Current Type: Uniprocessor Free
    Registered Organization: Quarry Technologies
    Registered Owner: Quarry Technologies
    ----> Task List <----
    0 Idle.exe
    2 System.exe
    20 SMSS.exe
    24 CSRSS.exe
    34 winlogon.exe
    40 SERVICES.exe
    43 LSASS.exe
    68 SPOOLSS.exe
    81 defwatch.exe
    86 inetd32.exe
    93 MGABG.exe
    94 mgasc.exe
    97 mgactrl.exe
    99 rtvscan.exe
    45 rtsserv.exe
    112 RPCSS.exe
    117 portserv.exe
    127 wtxregds.exe
    130 WinVNC.exe
    137 PSTORES.exe
    140 mstask.exe
    144 NOPDB.exe
    200 NDDEAGNT.exe
    122 explorer.exe
    186 systray.exe
    187 mgaqdesk.exe
    44 vptray.exe
    113 point32.exe
    91 realplay.exe
    209 winampa.exe
    211 loadqm.exe
    213 aim.exe
    215 msmsgs.exe
    218 wftpd32.exe
    192 OSA.exe
    238 esserver.exe
    240 vpexrt.exe
    241 CMD.exe
    63 vncviewer.exe
    255 JBuilder.exe
    277 DDHELP.exe
    274 CMD.exe
    287 CMD.exe
    293 SYSLOGD.exe
    313 SYSLOGD.exe
    270 P4Win.exe
    310 javaw.exe
    346 javaw.exe
    443 javaw.exe
    433 javaw.exe
    354 DRWTSN32.exe
    0 _Total.exe
    (00400000 - 00406000)
    (77f60000 - 77fbe000) dll\ntdll.dbg
    (77dc0000 - 77dff000) dll\advapi32.dbg
    (77f00000 - 77f5e000) dll\kernel32.dbg
    (77e70000 - 77ec5000) dll\user32.dbg
    (77ed0000 - 77efc000) dll\gdi32.dbg
    (77e10000 - 77e67000) dll\rpcrt4.dbg
    (78000000 - 78046000)
    (6d330000 - 6d330000)
    (77fd0000 - 77ffa000) dll\winmm.dbg
    (6bd00000 - 6bd14000) K:\DDK\lib\i386\free\cm-pci.dll
    (6d1d0000 - 6d1d7000)
    (6d300000 - 6d30d000)
    (6d210000 - 6d228000)
    (6d320000 - 6d32d000)
    (6d2d0000 - 6d2dd000)
    (776d0000 - 776d8000) dll\wsock32.dbg
    (776b0000 - 776c4000) dll\ws2_32.dbg
    (776a0000 - 776a7000) dll\ws2help.dbg
    (74ff0000 - 74ffe000) dll\rnr20.dbg
    (77bf0000 - 77bf7000) dll\rpcltc1.dbg
    (77660000 - 7766f000) dll\msafd.dbg
    (77690000 - 77699000) dll\wshtcpip.dbg
    (6d2f0000 - 6d2f5000)
    (6d000000 - 6d0f6000)
    (77c00000 - 77c18000) drv\winspool.dbg
    (76ab0000 - 76ab5000) dll\imm32.dbg
    (77b20000 - 77bd7000) dll\ole32.dbg
    (6d180000 - 6d1d0000)
    State Dump for Thread Id 0x18b
    eax=6d3fb8cc ebx=00000000 ecx=00762700 edx=00000000 esi=0000012c edi=00000000
    eip=77f682db esp=0006fc10 ebp=0006fc34 iopl=0 nv up ei pl zr na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
    function: NtWaitForSingleObject
    77f682d0 b8c5000000 mov eax,0xc5
    77f682d5 8d542404 lea edx,[esp+0x4] ss:00f6e617=????????
    77f682d9 cd2e int 2e
    77f682db c20c00 ret 0xc
    77f682de 8bc0 mov eax,eax
    ----> Stack Back Trace <----
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    0006fc34 77f04f37 0000012c ffffffff 00000000 6d38b719 ntdll!NtWaitForSingleObject
    0006fc7c 6d3b14c0 00000000 ffffffff 0076219c 007e0330 kernel32!WaitForSingleObject
    ----> Raw Stack Dump <----
    0006fc10 a0 cc f1 77 2c 01 00 00 - 00 00 00 00 00 00 00 00 ...w,...........
    0006fc20 50 05 7e 00 10 2f 76 00 - 30 03 7e 00 00 30 00 00 P.~../v.0.~..0..
    0006fc30 04 01 00 00 7c fc 06 00 - 37 4f f0 77 2c 01 00 00 ....|...7O.w,...
    0006fc40 ff ff ff ff 00 00 00 00 - 19 b7 38 6d 2c 01 00 00 ..........8m,...
    0006fc50 ff ff ff ff 9c 21 76 00 - 10 2f 76 00 a0 21 76 00 .....!v../v..!v.
    0006fc60 00 00 00 00 02 00 00 00 - 00 00 00 00 30 03 7e 00 ............0.~.
    0006fc70 30 03 7e 00 10 2f 76 00 - 01 00 00 00 c0 fc 06 00 0.~../v.........
    0006fc80 c0 14 3b 6d 00 00 00 00 - ff ff ff ff 9c 21 76 00 ..;m.........!v.
    0006fc90 30 03 7e 00 30 03 7e 00 - 00 00 00 00 30 03 7e 00 0.~.0.~.....0.~.
    0006fca0 d0 fc 06 00 05 86 36 6d - 5c 05 41 6d d8 fc 06 00 ......6m\.Am....
    0006fcb0 00 00 00 00 00 00 00 00 - 75 85 36 6d 30 03 7e 00 ........u.6m0.~.
    0006fcc0 d0 fc 06 00 b7 85 36 6d - 50 9c 77 00 30 03 7e 00 ......6mP.w.0.~.
    0006fcd0 14 ff 06 00 d2 14 40 00 - bc 03 7e 00 56 00 00 00 ......@...~.V...
    0006fce0 10 28 07 00 00 00 00 00 - 43 3a 5c 6a 32 73 64 6b .(......C:\j2sdk
    0006fcf0 31 2e 34 2e 30 5c 6a 72 - 65 00 6a 61 76 61 77 2e 1.4.0\jre.javaw.
    0006fd00 65 78 65 00 12 00 00 00 - a0 fe 06 00 00 e0 fd 7f exe.............
    0006fd10 00 00 00 00 a9 a0 f6 77 - 9c fe 06 00 00 00 00 80 .......w........
    0006fd20 70 fe 06 00 00 e0 fd 7f - 00 f0 fd 7f 00 00 00 00 p...............
    0006fd30 5c 00 52 00 65 00 67 00 - 69 00 73 00 74 00 72 00 \.R.e.g.i.s.t.r.
    0006fd40 79 00 5c 00 4d 00 61 00 - 63 00 68 00 69 00 6e 00 y.\.M.a.c.h.i.n.
    State Dump for Thread Id 0x156
    eax=02c29d90 ebx=007648d0 ecx=02c29d90 edx=00000009 esi=02c29d90 edi=26dbfd64
    eip=6d3318d5 esp=26dbfc6c ebp=26dbfc88 iopl=0 nv up ei pl nz na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000206
    function: <nosymbols>
    6d3318c0 8d4df0 lea ecx,[ebp-0x10] ss:27cbe68e=????????
    6d3318c3 e875000000 call 6d33193d
    6d3318c8 5f pop edi
    6d3318c9 5e pop esi
    6d3318ca c9 leave
    6d3318cb c3 ret
    6d3318cc 56 push esi
    6d3318cd 8bf1 mov esi,ecx
    6d3318cf 8b5604 mov edx,[esi+0x4] ds:03b28796=????????
    6d3318d2 83c208 add edx,0x8
    FAULT ->6d3318d5 8b4210 mov eax,[edx+0x10] ds:00efea0f=????????
    6d3318d8 85c0 test eax,eax
    6d3318da 7f25 jg 6d331901
    6d3318dc 7d1b jge 6d3318f9
    6d3318de 83c9ff or ecx,0xff
    6d3318e1 6a04 push 0x4
    6d3318e3 2bc8 sub ecx,eax
    6d3318e5 8b4608 mov eax,[esi+0x8] ds:03b28796=????????
    6d3318e8 d3e0 shl eax,cl
    6d3318ea 8b4a4c mov ecx,[edx+0x4c] ds:00efea0f=????????
    6d3318ed 8d440807 lea eax,[eax+ecx+0x7] ds:03b28797=????????
    6d3318f1 59 pop ecx
    ----> Stack Back Trace <----
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    26dbfc88 6d34d03a 02c29d90 02c37c48 22fc8df4 02c37c48 <nosymbols>
    State Dump for Thread Id 0x160
    eax=00000004 ebx=00000000 ecx=052c2748 edx=00000000 esi=00000320 edi=00000000
    eip=77f682db esp=26dffc10 ebp=26dffc34 iopl=0 nv up ei pl zr na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
    function: NtWaitForSingleObject
    77f682d0 b8c5000000 mov eax,0xc5
    77f682d5 8d542404 lea edx,[esp+0x4] ss:27cfe617=????????
    77f682d9 cd2e int 2e
    77f682db c20c00 ret 0xc
    77f682de 8bc0 mov eax,eax
    ----> Stack Back Trace <----
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    26dffc34 77f04f37 00000320 ffffffff 00000000 6d38d2fe ntdll!NtWaitForSingleObject
    26dffc7c 6d39ead0 00000000 00000000 00000001 00767d30 kernel32!WaitForSingleObject
    State Dump for Thread Id 0x11a
    eax=00000004 ebx=00000000 ecx=052c2a60 edx=00000000 esi=00000430 edi=00000000
    eip=77f682db esp=26e3fbd4 ebp=26e3fbf8 iopl=0 nv up ei pl zr na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
    function: NtWaitForSingleObject
    77f682d0 b8c5000000 mov eax,0xc5
    77f682d5 8d542404 lea edx,[esp+0x4] ss:27d3e5db=????????
    77f682d9 cd2e int 2e
    77f682db c20c00 ret 0xc
    77f682de 8bc0 mov eax,eax
    ----> Stack Back Trace <----
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    26e3fbf8 77f04f37 00000430 ffffffff 00000000 6d38d2fe ntdll!NtWaitForSingleObject
    26e3fc40 6d39ead0 00000000 00000000 00000001 007670b0 kernel32!WaitForSingleObject
    ----> Raw Stack Dump <----
    26e3fbd4 a0 cc f1 77 30 04 00 00 - 00 00 00 00 00 00 00 00 ...w0...........
    26e3fbe4 b0 70 76 00 4c b3 75 00 - 10 87 76 00 30 04 00 00 .pv.L.u...v.0...
    26e3fbf4 2a 14 39 6d 40 fc e3 26 - 37 4f f0 77 30 04 00 00 *.9m@..&7O.w0...
    26e3fc04 ff ff ff ff 00 00 00 00 - fe d2 38 6d 30 04 00 00 ..........8m0...
    26e3fc14 ff ff ff ff 00 00 00 00 - 40 27 2c 05 b0 70 76 00 ........@',..pv.
    26e3fc24 00 00 00 00 b0 70 76 00 - 30 04 00 00 00 00 00 00 .....pv.0.......
    26e3fc34 f4 8f 76 00 02 00 00 00 - 00 00 00 00 64 fc e3 26 ..v.........d..&
    26e3fc44 d0 ea 39 6d 00 00 00 00 - 00 00 00 00 01 00 00 00 ..9m............
    26e3fc54 b0 70 76 00 40 27 2c 05 - b0 70 76 00 70 3c b3 22 .pv.@',..pv.p<."
    26e3fc64 84 fc e3 26 aa e7 36 6d - 00 88 76 00 00 00 00 00 ...&..6m..v.....
    26e3fc74 00 00 00 00 b0 70 76 00 - b0 70 76 00 ac 3c b3 22 .....pv..pv..<."
    26e3fc84 b8 fc e3 26 0d 96 ab 00 - b0 70 76 00 d0 fc e3 26 ...&.....pv....&
    26e3fc94 00 00 00 00 00 00 00 00 - 9c fc e3 26 00 00 00 00 ...........&....
    26e3fca4 d0 fc e3 26 c8 52 b7 22 - 00 00 00 00 70 3c b3 22 ...&.R."....p<."
    26e3fcb4 c8 fc e3 26 f8 fc e3 26 - 9f 2d ab 00 00 00 00 00 ...&...&.-......
    26e3fcc4 51 76 ab 00 00 00 00 00 - 00 00 00 00 40 27 2c 05 Qv..........@',.
    26e3fcd4 03 00 00 00 40 27 2c 05 - d4 fc e3 26 34 0a b8 22 ....@',....&4.."
    26e3fce4 20 fd e3 26 78 0c b8 22 - 00 00 00 00 c8 09 b8 22 ..&x.."......."
    26e3fcf4 18 fd e3 26 40 fd e3 26 - 76 2e ab 00 00 00 00 00 ...&@..&v.......
    26e3fd04 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    State Dump for Thread Id 0x1ca
    eax=00000000 ebx=00000000 ecx=00000001 edx=00000000 esi=26e7ff28 edi=00000000
    eip=77f6791f esp=26e7ff14 ebp=26e7ff30 iopl=0 nv up ei pl nz na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000206
    function: NtDelayExecution
    77f67914 b827000000 mov eax,0x27
    77f67919 8d542404 lea edx,[esp+0x4] ss:27d7e91b=????????
    77f6791d cd2e int 2e
    77f6791f c20800 ret 0x8
    77f67922 8bc0 mov eax,eax
    *----> Stack Back Trace <----*
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    26e7ff30 77f1cebe 0000000a 00000000 6d39138c 0000000a ntdll!NtDelayExecution
    26e7ff5c 6d3af3f5 0076a380 0000000a 00000000 00000000 kernel32!Sleep
    State Dump for Thread Id 0x1c8
    eax=78002432 ebx=00000000 ecx=6d38ac38 edx=00000000 esi=00000120 edi=00000000
    eip=77f682db esp=26ebfef4 ebp=26ebff18 iopl=0 nv up ei pl zr na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
    function: NtWaitForSingleObject
    77f682d0 b8c5000000 mov eax,0xc5
    77f682d5 8d542404 lea edx,[esp+0x4] ss:27dbe8fb=????????
    77f682d9 cd2e int 2e
    77f682db c20c00 ret 0xc
    77f682de 8bc0 mov eax,eax
    *----> Stack Back Trace <----*
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    26ebff18 77f04f37 00000120 ffffffff 00000000 6d38b6bf ntdll!NtWaitForSingleObject
    26ebff60 6d3af53e 00000001 ffffffff 22b40f78 0076a210 kernel32!WaitForSingleObject
    State Dump for Thread Id 0x15e
    eax=78002432 ebx=00000000 ecx=0006fa28 edx=00000000 esi=0000069c edi=00000000
    eip=77f682db esp=26effe3c ebp=26effe60 iopl=0 nv up ei pl zr na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
    function: NtWaitForSingleObject
    77f682d0 b8c5000000 mov eax,0xc5
    77f682d5 8d542404 lea edx,[esp+0x4] ss:27dfe843=????????
    77f682d9 cd2e int 2e
    77f682db c20c00 ret 0xc
    77f682de 8bc0 mov eax,eax
    *----> Stack Back Trace <----*
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    26effe60 77f04f37 0000069c ffffffff 00000000 6d390d49 ntdll!NtWaitForSingleObject
    26effea0 6d390d8d 00000001 6d38e927 0076b370 0076b2c0 kernel32!WaitForSingleObject
    State Dump for Thread Id 0x1c4
    eax=00000001 ebx=00000000 ecx=26f3fc28 edx=00000000 esi=000001f4 edi=00000000
    eip=77f682db esp=26f3fe80 ebp=26f3fea4 iopl=0 nv up ei pl zr na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
    function: NtWaitForSingleObject
    77f682d0 b8c5000000 mov eax,0xc5
    77f682d5 8d542404 lea edx,[esp+0x4] ss:27e3e887=????????
    77f682d9 cd2e int 2e
    77f682db c20c00 ret 0xc
    77f682de 8bc0 mov eax,eax
    *----> Stack Back Trace <----*
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    26f3fea4 77f04f37 000001f4 ffffffff 00000000 6d38b719 ntdll!NtWaitForSingleObject
    26f3feec 6d3c1f67 00000000 ffffffff 0076b190 01e37000 kernel32!WaitForSingleObject
    *----> Raw Stack Dump <----*
    26f3fe80 a0 cc f1 77 f4 01 00 00 - 00 00 00 00 00 00 00 00 ...w............
    26f3fe90 10 c3 76 00 50 29 76 00 - 30 b0 76 00 30 b0 76 00 ..v.P)v.0.v.0.v.
    26f3fea0 e0 c3 76 00 ec fe f3 26 - 37 4f f0 77 f4 01 00 00 ..v....&7O.w....
    26f3feb0 ff ff ff ff 00 00 00 00 - 19 b7 38 6d f4 01 00 00 ..........8m....
    26f3fec0 ff ff ff ff 90 b1 76 00 - 90 b1 76 00 50 29 76 00 ......v...v.P)v.
    26f3fed0 00 00 00 00 02 00 00 00 - cc 03 00 00 30 b0 76 00 ............0.v.
    26f3fee0 30 b0 76 00 50 29 76 00 - 01 00 00 00 00 00 00 00 0.v.P)v.........
    26f3fef0 67 1f 3c 6d 00 00 00 00 - ff ff ff ff 90 b1 76 00 g.<m..........v.
    26f3ff00 00 70 e3 01 40 ff f3 26 - 00 00 00 00 46 29 3c 6d .p..@..&....F)<m
    26f3ff10 e0 b0 76 00 30 b0 76 00 - 80 c2 76 00 30 b0 76 00 ..v.0.v...v.0.v.
    26f3ff20 e0 c3 76 00 00 d8 76 00 - 08 d8 76 00 f4 db 76 00 ..v...v...v...v.
    26f3ff30 54 ff f3 26 30 b0 76 00 - 30 b0 76 00 08 d8 76 00 T..&0.v.0.v...v.
    26f3ff40 6c ff f3 26 02 f9 3a 6d - 30 b0 76 00 30 b0 76 00 l..&..:m0.v.0.v.
    26f3ff50 30 b0 76 00 30 b0 76 00 - e0 c3 76 00 00 d8 76 00 0.v.0.v...v...v.
    26f3ff60 08 d8 76 00 f4 db 76 00 - c0 c3 76 00 84 ff f3 26 ..v...v...v....&
    26f3ff70 d2 f8 3a 6d 18 88 b5 02 - 30 b0 76 00 cb fe 38 6d ..:m....0.v...8m
    26f3ff80 80 c2 76 00 b8 ff f3 26 - 8d 24 00 78 30 b0 76 00 ..v....&.$.x0.v.
    26f3ff90 18 88 b5 02 d0 f8 06 00 - 80 c2 76 00 ff ff ff ff ..........v.....
    26f3ffa0 90 ff f3 26 91 76 11 80 - dc ff f3 26 6a f5 00 78 ...&.v.....&j..x
    26f3ffb0 d0 33 03 78 00 00 00 00 - ec ff f3 26 de 4e f0 77 .3.x.......&.N.w
    State Dump for Thread Id 0x1ac
    eax=00000004 ebx=00000000 ecx=02b73c40 edx=00000000 esi=00000500 edi=2717fbfc
    eip=77f682db esp=2717fbe0 ebp=2717fc04 iopl=0 ov up ei pl nz na pe cy
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000a03
    function: NtWaitForSingleObject
    77f682d0 b8c5000000 mov eax,0xc5
    77f682d5 8d542404 lea edx,[esp+0x4] ss:2807e5e7=????????
    77f682d9 cd2e int 2e
    77f682db c20c00 ret 0xc
    77f682de 8bc0 mov eax,eax
    *----> Stack Back Trace <----*
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    2717fc04 77f04f37 00000500 000493e0 00000000 6d38d2fe ntdll!NtWaitForSingleObject
    2717fc4c 6d39ead0 000493e0 00000000 00000001 0077f5e0 kernel32!WaitForSingleObject
    *----> Raw Stack Dump <----*
    2717fbe0 a0 cc f1 77 00 05 00 00 - 00 00 00 00 fc fb 17 27 ...w...........'
    2717fbf0 e0 f5 77 00 ec b2 75 00 - f0 f4 77 00 00 a2 2f 4d ..w...u...w.../M
    2717fc00 ff ff ff ff 4c fc 17 27 - 37 4f f0 77 00 05 00 00 ....L..'7O.w....
    2717fc10 e0 93 04 00 00 00 00 00 - fe d2 38 6d 00 05 00 00 ..........8m....
    2717fc20 e0 93 04 00 00 00 00 00 - 38 b1 32 05 e0 f5 77 00 ........8.2...w.
    2717fc30 00 00 00 00 e0 f5 77 00 - 00 05 00 00 00 00 00 00 ......w.........
    2717fc40 02 00 00 00 02 00 00 00 - 00 00 00 00 70 fc 17 27 ............p..'
    2717fc50 d0 ea 39 6d e0 93 04 00 - 00 00 00 00 01 00 00 00 ..9m............
    2717fc60 e0 f5 77 00 38 b1 32 05 - e0 f5 77 00 70 3c b3 22 ..w.8.2...w.p<."
    2717fc70 90 fc 17 27 aa e7 36 6d - a0 e3 76 00 e0 93 04 00 ...'..6m..v.....
    2717fc80 00 00 00 00 e0 f5 77 00 - e0 f5 77 00 ac 3c b3 22 ......w...w..<."
    2717fc90 c4 fc 17 27 0d 96 ab 00 - e0 f5 77 00 dc fc 17 27 ...'......w....'
    2717fca0 e0 93 04 00 00 00 00 00 - a8 fc 17 27 ac 3c b3 22 ...........'.<."
    2717fcb0 dc fc 17 27 c8 52 b7 22 - 00 00 00 00 70 3c b3 22 ...'.R."....p<."
    2717fcc0 d4 fc 17 27 0c fd 17 27 - 9f 2d ab 00 00 00 00 00 ...'...'.-......
    2717fcd0 51 76 ab 00 e0 93 04 00 - 00 00 00 00 c0 ae 32 05 Qv............2.
    2717fce0 01 00 00 00 00 00 00 00 - 01 00 00 00 c0 ae 32 05 ..............2.
    2717fcf0 e0 fc 17 27 b9 c8 d6 22 - 3c fd 17 27 60 ca d6 22 ...'..."<..'`.."
    2717fd00 00 00 00 00 b0 c7 d6 22 - 3c fd 17 27 5c fd 17 27 ......."<..'\..'
    2717fd10 9f 2d ab 00 00 00 00 00 - 00 00 00 00 e8 a7 66 05 .-............f.
    State Dump for Thread Id 0x1be
    eax=02b621d8 ebx=7766b100 ecx=00000001 edx=00000000 esi=0007b2b8 edi=00000568
    eip=77f682db esp=271bf6a4 ebp=271bf6f8 iopl=0 nv up ei ng nz ac pe cy
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000293
    function: NtWaitForSingleObject
    77f682d0 b8c5000000 mov eax,0xc5
    77f682d5 8d542404 lea edx,[esp+0x4] ss:280be0ab=????????
    77f682d9 cd2e int 2e
    77f682db c20c00 ret 0xc
    77f682de 8bc0 mov eax,eax
    *----> Stack Back Trace <----*
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    271bf6f8 77661202 00000568 0000052c 00000002 00000004 ntdll!NtWaitForSingleObject
    271bfb60 776bb101 0000052c 271bfc00 271bfc10 00000000 msafd!<nosymbols>
    271bfb98 776bb08c 0000052c 271bfc00 271bfc10 00000000 ws2_32!WSAAccept
    271bfc14 00ab960d 0076fe84 271bfc58 271bfc54 271bfc28 ws2_32!accept
    *----> Raw Stack Dump <----*
    271bf6a4 ce 89 66 77 68 05 00 00 - 01 00 00 00 d0 f6 1b 27 ..fwh..........'
    271bf6b4 d4 b2 07 00 bc b2 07 00 - 1a 00 00 00 00 44 be ab .............D..
    271bf6c4 0d 17 c2 01 ff ff ff ff - ff ff ff 7f ff ff ff ff ................
    271bf6d4 ff ff ff 7f 00 00 00 00 - 58 ae 07 00 ad 1f 6a 77 ........X.....jw
    271bf6e4 d8 11 66 77 2c 05 00 00 - 00 00 00 00 00 00 00 00 ..fw,...........
    271bf6f4 00 00 00 00 60 fb 1b 27 - 02 12 66 77 68 05 00 00 ....`..'..fwh...
    271bf704 2c 05 00 00 02 00 00 00 - 04 00 00 00 00 00 00 00 ,...............
    271bf714 18 69 07 00 28 88 07 00 - 66 00 02 00 00 00 00 00 .i..(...f.......
    271bf724 00 00 00 00 00 00 00 00 - 08 00 00 00 00 00 00 00 ................
    271bf734 00 00 00 00 00 00 00 00 - 00 00 00 00 e9 03 00 00 ................
    271bf744 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271bf754 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271bf764 00 00 00 00 02 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271bf774 01 00 00 00 06 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271bf784 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271bf794 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271bf7a4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271bf7b4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271bf7c4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271bf7d4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    State Dump for Thread Id 0x1ce
    eax=00ab017d ebx=7766b100 ecx=00000011 edx=00000000 esi=0007b548 edi=000005cc
    eip=77f682db esp=271ff6a4 ebp=271ff6f8 iopl=0 nv up ei ng nz ac pe cy
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000293
    function: NtWaitForSingleObject
    77f682d0 b8c5000000 mov eax,0xc5
    77f682d5 8d542404 lea edx,[esp+0x4] ss:280fe0ab=????????
    77f682d9 cd2e int 2e
    77f682db c20c00 ret 0xc
    77f682de 8bc0 mov eax,eax
    *----> Stack Back Trace <----*
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    271ff6f8 77661202 000005cc 00000590 00000002 00000004 ntdll!NtWaitForSingleObject
    271ffb60 776bb101 00000590 271ffc00 271ffc10 00000000 msafd!<nosymbols>
    271ffb98 776bb08c 00000590 271ffc00 271ffc10 00000000 ws2_32!WSAAccept
    271ffc14 00ab960d 00777e44 271ffc58 271ffc54 271ffc28 ws2_32!accept
    *----> Raw Stack Dump <----*
    271ff6a4 ce 89 66 77 cc 05 00 00 - 01 00 00 00 d0 f6 1f 27 ..fw...........'
    271ff6b4 64 b5 07 00 4c b5 07 00 - 1a 00 00 00 f0 7a 09 b5 d...L........z..
    271ff6c4 0d 17 c2 01 ff ff ff ff - ff ff ff 7f ff ff ff ff ................
    271ff6d4 ff ff ff 7f 00 00 00 00 - 84 ae 07 00 ad 1f 6a 77 ..............jw
    271ff6e4 d8 11 66 77 90 05 00 00 - 00 00 00 00 00 00 00 00 ..fw............
    271ff6f4 00 00 00 00 60 fb 1f 27 - 02 12 66 77 cc 05 00 00 ....`..'..fw....
    271ff704 90 05 00 00 02 00 00 00 - 04 00 00 00 00 00 00 00 ................
    271ff714 50 aa 07 00 28 88 07 00 - 66 00 02 00 00 00 00 00 P...(...f.......
    271ff724 00 00 00 00 00 00 00 00 - 08 00 00 00 00 00 00 00 ................
    271ff734 00 00 00 00 00 00 00 00 - 00 00 00 00 e9 03 00 00 ................
    271ff744 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271ff754 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271ff764 00 00 00 00 02 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271ff774 01 00 00 00 06 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271ff784 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271ff794 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271ff7a4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271ff7b4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271ff7c4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271ff7d4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    State Dump for Thread Id 0x1c2
    eax=00ab017d ebx=00000000 ecx=00000019 edx=00000000 esi=000005b0 edi=00000000
    eip=77f682db esp=2723fba0 ebp=2723fbc4 iopl=0 nv up ei pl zr na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
    function: NtWaitForSingleObject
    77f682d0 b8c5000000 mov eax,0xc5
    77f682d5 8d542404 lea edx,[esp+0x4] ss:2813e5a7=????????
    77f682d9 cd2e int 2e
    77f682db c20c00 ret 0xc
    77f682de 8bc0 mov eax,eax
    *----> Stack Back Trace <----*
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    2723fbc4 77f04f37 000005b0 ffffffff 00000000 6d38d2fe ntdll!NtWaitForSingleObject
    2723fc0c 6d39ead0 00000000 00000000 00000001 00780730 kernel32!WaitForSingleObject
    *----> Raw Stack Dump <----*
    2723fba0 a0 cc f1 77 b0 05 00 00 - 00 00 00 00 00 00 00 00 ...w............
    2723fbb0 30 07 78 00 2c b3 75 00 - 00 07 78 00 b0 05 00 00 0.x.,.u...x.....
    2723fbc0 2a 14 39 6d 0c fc 23 27 - 37 4f f0 77 b0 05 00 00 *.9m..#'7O.w....
    2723fbd0 ff ff ff ff 00 00 00 00 - fe d2 38 6d b0 05 00 00 ..........8m....
    2723fbe0 ff ff ff ff 00 00 00 00 - 38 ae b5 02 30 07 78 00 ........8...0.x.
    2723fbf0 00 00 00 00 30 07 78 00 - b0 05 00 00 00 00 00 00 ....0.x.........
    2723fc00 2c b3 75 00 02 00 00 00 - 00 00 00 00 30 fc 23 27 ,.u.........0.#'
    2723fc10 d0 ea 39 6d 00 00 00 00 - 00 00 00 00 01 00 00 00 ..9m............
    2723fc20 30 07 78 00 38 ae b5 02 - 30 07 78 00 70 3c b3 22 0.x.8...0.x.p<."
    2723fc30 50 fc 23 27 aa e7 36 6d - 20 14 78 00 00 00 00 00 P.#'..6m .x.....
    2723fc40 00 00 00 00 30 07 78 00 - 30 07 78 00 ac 3c b3 22 ....0.x.0.x..<."
    2723fc50 84 fc 23 27 0d 96 ab 00 - 30 07 78 00 9c fc 23 27 ..#'....0.x...#'
    2723fc60 00 00 00 00 00 00 00 00 - 68 fc 23 27 ac 3c b3 22 ........h.#'.<."
    2723fc70 9c fc 23 27 c8 52 b7 22 - 00 00 00 00 70 3c b3 22 ..#'.R."....p<."
    2723fc80 94 fc 23 27 c4 fc 23 27 - 9f 2d ab 00 00 00 00 00 ..#'..#'.-......
    2723fc90 51 76 ab 00 00 00 00 00 - 00 00 00 00 08 ac 32 05 Qv............2.
    2723fca0 01 00 00 00 08 ac 32 05 - a0 fc 23 27 34 0a b8 22 ......2...#'4.."
    2723fcb0 ec fc 23 27 78 0c b8 22 - 00 00 00 00 c8 09 b8 22 ..#'x.."......."
    2723fcc0 e4 fc 23 27 0c fd 23 27 - 76 2e ab 00 00 00 00 00 ..#'..#'v.......
    2723fcd0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    State Dump for Thread Id 0x1cd
    eax=00000004 ebx=00000000 ecx=22d8b980 edx=00000000 esi=000005c0 edi=2727fc48
    eip=77f682db esp=2727fc2c ebp=2727fc50 iopl=0 nv up ei pl nz na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000206
    function: NtWaitForSingleObject
    77f682d0 b8c5000000 mov eax,0xc5
    77f682d5 8d542404 lea edx,[esp+0x4] ss:2817e633=????????
    77f682d9 cd2e int 2e
    77f682db c20c00 ret 0xc
    77f682de 8bc0 mov eax,eax
    *----> Stack Back Trace <----*
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    2727fc50 77f04f37 000005c0 0000ea60 00000000 6d38d2fe ntdll!NtWaitForSingleObject
    2727fc98 6d39ead0 0000ea60 00000000 00000001 00781270 kernel32!WaitForSingleObject
    *----> Raw Stack Dump <----*
    2727fc2c a0 cc f1 77 c0 05 00 00 - 00 00 00 00 48 fc 27 27 ...w........H.''
    2727fc3c 70 12 78 00 6c b3 75 00 - c0 11 78 00 00 ba 3c dc p.x.l.u...x...<.
    2727fc4c ff ff ff ff 98 fc 27 27 - 37 4f f0 77 c0 05 00 00 ......''7O.w....
    2727fc5c 60 ea 00 00 00 00 00 00 - fe d2 38 6d c0 05 00 00 `.........8m....
    2727fc6c 60 ea 00 00 00 00 00 00 - 98 d3 32 05 70 12 78 00 `.........2.p.x.
    2727fc7c 00 00 00 00 70 12 78 00 - c0 05 00 00 00 00 00 00 ....p.x.........
    2727fc8c 4b 96 34 6d 02 00 00 00 - 00 00 00 00 bc fc 27 27 K.4m..........''
    2727fc9c d0 ea 39 6d 60 ea 00 00 - 00 00 00 00 01 00 00 00 ..9m`...........
    2727fcac 70 12 78 00 98 d3 32 05 - 70 12 78 00 70 3c b3 22 p.x...2.p.x.p<."
    2727fcbc dc fc 27 27 aa e7 36 6d - 20 28 78 00 60 ea 00 00 ..''..6m (x.`...
    2727fccc 00 00 00 00 70 12 78 00 - 70 12 78 00 ac 3c b3 22 ....p.x.p.x..<."
    2727fcdc 10 fd 27 27 0d 96 ab 00 - 70 12 78 00 28 fd 27 27 ..''....p.x.(.''
    2727fcec 60 ea 00 00 00 00 00 00 - f4 fc 27 27 00 00 00 00 `.........''....
    2727fcfc 28 fd 27 27 c8 52 b7 22 - 00 00 00 00 70 3c b3 22 (.''.R."....p<."
    2727fd0c 20 fd 27 27 50 fd 27 27 - 9f 2d ab 00 00 00 00 00 .''P.''.-......
    2727fd1c 51 76 ab 00 60 ea 00 00 - 00 00 00 00 98 d3 32 05 Qv..`.........2.
    2727fd2c 03 00 00 00 98 d3 32 05 - 2c fd 27 27 92 ea d8 22 ......2.,.''..."
    2727fd3c 74 fd 27 27 28 ed d8 22 - 00 00 00 00 20 ea d8 22 t.''(..".... .."
    2727fd4c 74 fd 27 27 84 fd 27 27 - 7d 01 ab 00 00 00 00 00 t.''..''}.......
    2727fd5c 00 00 00 00 00 00 00 00 - 00 00 00 00 98 d3 32 05 ..............2.
    State Dump for Thread Id 0x1b8
    eax=00000004 ebx=00000000 ecx=2323ba90 edx=00000000 esi=00000924 edi=276cfc38
    eip=77f682db esp=276cfc1c ebp=276cfc40 iopl=0 nv up ei pl nz na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000206
    function: NtWaitForSingleObject
    77f682d0 b8c5000000 mov eax,0xc5
    77f682d5 8d542404 lea edx,[esp+0x4] ss:285ce623=????????
    77f682d9 cd2e int 2e
    77f682db c20c00 ret 0xc
    77f682de 8bc0 mov eax,eax
    ----> Stack Back Trace <----
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    276cfc40 77f04f37 00000924 00007530 00000000 6d38d2fe ntdll!NtWaitForSingleObject
    276cfc88 6d39ead0 00007530 00000000 00000001 007dc330 kernel32!WaitForSingleObject
    State Dump for Thread Id 0x18a
    eax=00000004 ebx=00000000 ecx=02bbf9a0 edx=00000000 esi=000009b0 edi=00000000
    eip=77f682db esp=2770fbe0 ebp=2770fc04 iopl=0 nv up ei pl zr na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
    function: NtWaitForSingleObject
    77f682d0 b8c5000000 mov eax,0xc5
    77f682d5 8d542404 lea edx,[esp+0x4] ss:2860e5e7=????????
    77f682d9 cd2e int 2e
    77f682db c20c00 ret 0xc
    77f682de 8bc0 mov eax,eax
    ----> Stack Back Trace <----
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    2770fc04 77f04f37 000009b0 ffffffff 00000000 6d38d2fe ntdll!NtWaitForSingleObject
    2770fc4c 6d39ead0 00000000 00000000 00000001 007dda00 kernel32!WaitForSingleObject
    ----> Raw Stack Dump <----
    2770fbe0 a0 cc f1 77 b0 09 00 00 - 00 00 00 00 00 00 00 00 ...w............
    2770fbf0 00 da 7d 00 ec b3 75 00 - 80 c1 7d 00 b0 09 00 00 ..}...u...}.....
    2770fc00 2a 14 39 6d 4c fc 70 27 - 37 4f f0 77 b0 09 00 00 *.9mL.p'7O.w....
    2770fc10 ff ff ff ff 00 00 00 00 - fe d2 38 6d b0 09 00 00 ..........8m....
    2770fc20 ff ff ff ff 00 00 00 00 - e8 ef bb 02 00 da 7d 00 ..............}.
    2770fc30 00 00 00 00 00 da 7d 00 - b0 09 00 00 00 00 00 00 ......}.........
    2770fc40 ec b3 75 00 02 00 00 00 - 00 00 00 00 70 fc 70 27 ..u.........p.p'
    2770fc50 d0 ea 39 6d 00 00 00 00 - 00 00 00 00 01 00 00 00 ..9m............
    2770fc60 00 da 7d 00 e8 ef bb 02 - 00 da 7d 00 70 3c b3 22 ..}.......}.p<."
    2770fc70 90 fc 70 27 aa e7 36 6d - 20 dc 7d 00 00 00 00 00 ..p'..6m .}.....
    2770fc80

    I am seeing exactly the same error. I started seeing it after we started making extensive use of introspection in our code. It happens repeatably when we are load testing our software.

  • What does this error mean? Error: Access violation at address 0053DD46

    I am trying to run diff reports using batch scripts, and its very puzzling that some of the diff report scripts within the batch script are running and some are not, there is no consistency to what is getting errored out.
    I then tried running them manually in foreground on the client and I get the same issue. Has anyone encountered this issue? What do I make of it?,
    4/24/2013 1:29:30 PM - *** MDMConnect starting ***
    4/24/2013 1:29:30 PM - Logged in successfully.
    4/24/2013 1:29:30 PM - Started export job for PLN_FLD_ACCT_DIFF
    4/24/2013 1:29:34 PM - ERemotableException with message: "Server was unable to process request. ---> Error during Export. Export was unable to run. Error: Access violation at address 0053DD46 in module 'mdm_ntier_engine.exe'. Read of address 00000024" while running Export
    4/24/2013 1:29:34 PM - => ERROR: Data Relationship Management Server returned error: "Server was unable to process request. ---> Error during Export. Export was unable to run. Error: Access violation at address 0053DD46 in module 'mdm_ntier_engine.exe'. Read of address 00000024."
    4/24/2013 1:29:34 PM - *** MDMConnect stopping ***
    Thank you
    Tanuja Donavalli

    This is issue is coherent in DRM version 11.1.1.2
    Whenever a property is deleted, the references to that property would still exists/stored in tables. The next version of DRM is made to address this issue, where in it takes care of removing all references whenever we delete the property.
    Cause: Properties was deleted from DRM client but the value was still stored in the compare table for Difference export and causing export to fail.
    Solution: Need to recreate the deleted properties and remove the properties in the exports and delete the properties.
    Going Forward: Instead of deleting the properties we need to remove the property from the export and hide the property.
    Hope this helps.

Maybe you are looking for