Jump to content

troubleshooting crash in compiled script?


Recommended Posts

i have authored a little tool using AutoIt 3.3.8.1 - the resulting compiled script (*.exe) is used on various target systems to run some verification tests.

in rare cases the compiled script crashes at some place during execution time.

event log entries: application error 1000. application error 1001.

how to troubleshoot where exactly it is crashing and why it's crashing?

ideally i'd like to see the name and line number of the source file (or include file) it's crashing at.

for example: is there some way to make the compiler also generate some *.pdb symbol files that can be used when analysing the crash dump / memory dump?

Edited by francoiste
Link to comment
Share on other sites

If the script crashes while executing an AutoIt statement you will get a MsgBox describing the error.

If you run your script as a service or started by a service you won't see this MsgBox if flag "Interact with the display" (or some similar text) is activated.

I have a thread open if it is possible to write the error information to a file or the eventlog ... in cases where the MsgBox doesn't help. No reply so far.

My UDFs and Tutorials:

Spoiler

UDFs:
Active Directory (NEW 2022-02-19 - Version 1.6.1.0) - Download - General Help & Support - Example Scripts - Wiki
ExcelChart (2017-07-21 - Version 0.4.0.1) - Download - General Help & Support - Example Scripts
OutlookEX (2021-11-16 - Version 1.7.0.0) - Download - General Help & Support - Example Scripts - Wiki
OutlookEX_GUI (2021-04-13 - Version 1.4.0.0) - Download
Outlook Tools (2019-07-22 - Version 0.6.0.0) - Download - General Help & Support - Wiki
PowerPoint (2021-08-31 - Version 1.5.0.0) - Download - General Help & Support - Example Scripts - Wiki
Task Scheduler (NEW 2022-07-28 - Version 1.6.0.1) - Download - General Help & Support - Wiki

Standard UDFs:
Excel - Example Scripts - Wiki
Word - Wiki

Tutorials:
ADO - Wiki
WebDriver - Wiki

 

Link to comment
Share on other sites

I put in logging on each action, where I can specify the error level I want to include. If something breaks, I amp up the level, so I can see which of my functions is causing the error, and narrow down to within a few lines.

IEbyXPATH-Grab IE DOM objects by XPATH IEscriptRecord-Makings of an IE script recorder ExcelFromXML-Create Excel docs without excel installed GetAllWindowControls-Output all control data on a given window.
Link to comment
Share on other sites

I think the OP want's to get information about bugs like "index out of range" when accessing an array etc.

My UDFs and Tutorials:

Spoiler

UDFs:
Active Directory (NEW 2022-02-19 - Version 1.6.1.0) - Download - General Help & Support - Example Scripts - Wiki
ExcelChart (2017-07-21 - Version 0.4.0.1) - Download - General Help & Support - Example Scripts
OutlookEX (2021-11-16 - Version 1.7.0.0) - Download - General Help & Support - Example Scripts - Wiki
OutlookEX_GUI (2021-04-13 - Version 1.4.0.0) - Download
Outlook Tools (2019-07-22 - Version 0.6.0.0) - Download - General Help & Support - Wiki
PowerPoint (2021-08-31 - Version 1.5.0.0) - Download - General Help & Support - Example Scripts - Wiki
Task Scheduler (NEW 2022-07-28 - Version 1.6.0.1) - Download - General Help & Support - Wiki

Standard UDFs:
Excel - Example Scripts - Wiki
Word - Wiki

Tutorials:
ADO - Wiki
WebDriver - Wiki

 

Link to comment
Share on other sites

to answer above questions:

1) my tool is not running as a system service. it's running in GUI mode and it's started manually from within windows session.

2) i'm not getting any error msgbox by autoit.

instead, the exception makes the windows error reporting dialog show up. exception code 0xc0000005, application error event log IDs 1000 & 1001.

3) writing log messages every other line is not an option.

drwtsn32.exe:

Application exception occurred:
        App: C:USERSAdministratorDesktopMyTool.exe (pid=1964)
        When: 30.07.2012 @ 16:10:48.078
        Exception number: c0000005 (access violation)
*----> System Information <----*
        Computer Name: *****
        User Name: Administrator
        Terminal Session Id: 0
        Number of Processors: 4
        Processor Type: x86 Family 6 Model 23 Stepping 10
        Windows Version: 5.1
        Current Build: 2600
        Service Pack: 3
        Current Type: Multiprocessor Free
        Registered Organization: *****
        Registered Owner: *****
*----> Task List <----*
[...]
*----> Module List <----*
(0000000000140000 - 0000000000149000: C:\Windows\System32\Normaliz.dll
(0000000000400000 - 00000000004c2000: C:USERSAdministratorDesktopMyTool.exe
(0000000002660000 - 0000000002925000: C:\Windows\System32\xpsp2res.dll
(000000003d930000 - 000000003da16000: C:\Windows\System32\WININET.dll
(000000003dfd0000 - 000000003e1bb000: C:\Windows\System32\iertutil.dll
(000000005a730000 - 000000005a75f000: C:\Windows\System32\wbemwbemdisp.dll
(000000005ad70000 - 000000005ada8000: C:\Windows\System32\uxtheme.dll
(000000005b860000 - 000000005b8b5000: C:\Windows\System32\NETAPI32.dll
(00000000629c0000 - 00000000629c9000: C:\Windows\System32\LPK.DLL
(0000000067080000 - 000000006709c000: C:Program FilesFileZilla FTP Clientfzshellext.dll
(0000000071aa0000 - 0000000071aa8000: C:\Windows\System32\WS2HELP.dll
(0000000071ab0000 - 0000000071ac7000: C:\Windows\System32\WS2_32.dll
(0000000071ad0000 - 0000000071ad9000: C:\Windows\System32\WSOCK32.dll
(0000000071b20000 - 0000000071b32000: C:\Windows\System32\MPR.dll
(0000000072410000 - 000000007242a000: C:\Windows\System32\mydocs.dll
(0000000074720000 - 000000007476c000: C:\Windows\System32\MSCTF.dll
(0000000074d90000 - 0000000074dfb000: C:\Windows\System32\USP10.dll
(0000000074ed0000 - 0000000074ede000: C:\Windows\System32\wbemwbemsvc.dll
(0000000074ef0000 - 0000000074ef8000: C:\Windows\System32\wbemwbemprox.dll
(0000000075020000 - 000000007503b000: C:\Windows\System32\wbemwmiutils.dll
(0000000075290000 - 00000000752c7000: C:\Windows\System32\wbemwbemcomn.dll
(00000000754d0000 - 0000000075550000: C:\Windows\System32\CRYPTUI.dll
(00000000755c0000 - 00000000755ee000: C:\Windows\System32\msctfime.ime
(0000000075690000 - 0000000075706000: C:\Windows\System32\wbemfastprox.dll
(0000000076080000 - 00000000760e5000: C:\Windows\System32\MSVCP60.dll
(0000000076390000 - 00000000763ad000: C:\Windows\System32\IMM32.DLL
(00000000763b0000 - 00000000763f9000: C:\Windows\System32\COMDLG32.dll
(00000000767a0000 - 00000000767b3000: C:\Windows\System32\NTDSAPI.dll
(0000000076990000 - 00000000769b5000: C:\Windows\System32\ntshrui.dll
(00000000769c0000 - 0000000076a74000: C:\Windows\System32\USERENV.dll
(0000000076b20000 - 0000000076b31000: C:\Windows\System32\ATL.DLL
(0000000076b40000 - 0000000076b6d000: C:\Windows\System32\WINMM.dll
(0000000076bf0000 - 0000000076bfb000: C:\Windows\System32\PSAPI.DLL
(0000000076c30000 - 0000000076c5e000: C:\Windows\System32\WINTRUST.dll
(0000000076c90000 - 0000000076cb8000: C:\Windows\System32\IMAGEHLP.dll
(0000000076d60000 - 0000000076d79000: C:\Windows\System32\iphlpapi.dll
(0000000076f20000 - 0000000076f47000: C:\Windows\System32\DNSAPI.dll
(0000000076f60000 - 0000000076f8c000: C:\Windows\System32\WLDAP32.dll
(0000000076fc0000 - 0000000076fc6000: C:\Windows\System32\rasadhlp.dll
(0000000076fd0000 - 000000007704f000: C:\Windows\System32\CLBCATQ.DLL
(0000000077050000 - 0000000077115000: C:\Windows\System32\COMRes.dll
(0000000077120000 - 00000000771ab000: C:\Windows\System32\OLEAUT32.dll
(00000000773d0000 - 00000000774d3000: C:WINDOWSWinSxSx86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.2600.6028_x-ww_61e65202COMCTL32.dll
(00000000774e0000 - 000000007761e000: C:\Windows\System32\ole32.dll
(0000000077920000 - 0000000077a13000: C:\Windows\System32\SETUPAPI.dll
(0000000077a80000 - 0000000077b15000: C:\Windows\System32\CRYPT32.dll
(0000000077b20000 - 0000000077b32000: C:\Windows\System32\MSASN1.dll
(0000000077b40000 - 0000000077b62000: C:\Windows\System32\appHelp.dll
(0000000077c00000 - 0000000077c08000: C:\Windows\System32\VERSION.dll
(0000000077c10000 - 0000000077c68000: C:\Windows\System32\msvcrt.dll
(0000000077dd0000 - 0000000077e6b000: C:\Windows\System32\ADVAPI32.dll
(0000000077e70000 - 0000000077f03000: C:\Windows\System32\RPCRT4.dll
(0000000077f10000 - 0000000077f59000: C:\Windows\System32\GDI32.dll
(0000000077f60000 - 0000000077fd6000: C:\Windows\System32\SHLWAPI.dll
(0000000077fe0000 - 0000000077ff1000: C:\Windows\System32\Secur32.dll
(0000000078130000 - 0000000078263000: C:\Windows\System32\urlmon.dll
(000000007c800000 - 000000007c8f6000: C:\Windows\System32\kernel32.dll
(000000007c900000 - 000000007c9b2000: C:\Windows\System32\ntdll.dll
(000000007c9c0000 - 000000007d1d7000: C:\Windows\System32\SHELL32.dll
(000000007d1e0000 - 000000007d49c000: C:\Windows\System32\msi.dll
(000000007e290000 - 000000007e403000: C:\Windows\System32\shdocvw.dll
(000000007e410000 - 000000007e4a1000: C:\Windows\System32\USER32.dll
(000000007e720000 - 000000007e7d0000: C:\Windows\System32\SXS.DLL
*----> State Dump for Thread Id 0x83c <----*
eax=0090e023 ebx=00000101 ecx=00000009 edx=00000000 esi=0090dfff edi=016e239c
eip=00410eb7 esp=008cdf50 ebp=008cdf58 iopl=0        nv up ei pl nz ac pe nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000212
*** ERROR: Module load completed but symbols could not be loaded for C:USERSAdministratorDesktopMyTool.exe
function: MyTool
        00410e9b 5e            pop   esi
        00410e9c 5f            pop   edi
        00410e9d 7505            jnz     MyTool+0x10ea4 (00410ea4)
        00410e9f e94d5b0000    jmp   MyTool+0x169f1 (004169f1)
        00410ea4 f7c703000000    test    edi,0x3
        00410eaa 7514            jnz     MyTool+0x10ec0 (00410ec0)
        00410eac c1e902        shr   ecx,0x2
        00410eaf 83e203        and   edx,0x3
        00410eb2 83f908        cmp   ecx,0x8
        00410eb5 7229            jb   MyTool+0x10ee0 (00410ee0)
FAULT ->00410eb7 f3a5           rep  movsd ds:0090dfff=8d50e815 es:016e239c=0001f46b
        00410eb9 ff2495d00f4100 jmp dword ptr [MyTool+0x10fd0 (00410fd0)+edx*4]
        00410ec0 8bc7            mov     eax,edi
        00410ec2 ba03000000    mov   edx,0x3
        00410ec7 83e904        sub   ecx,0x4
        00410eca 720c            jb   MyTool+0x10ed8 (00410ed8)
        00410ecc 83e003        and   eax,0x3
        00410ecf 03c8            add     ecx,eax
        00410ed1 ff2485e40e4100 jmp dword ptr [MyTool+0x10ee4 (00410ee4)+eax*4]
        00410ed8 ff248de00f4100 jmp dword ptr [MyTool+0x10fe0 (00410fe0)+ecx*4]
        00410edf 90            nop
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\Windows\System32\kernel32.dll -
ChildEBP RetAddr  Args to Child          
008cdf58 0046834f 016e22c0 0090df23 00000100 MyTool+0x10eb7
008cdf90 00468599 008ce020 00000005 0090df23 MyTool+0x6834f
008cdfd0 00468887 00000005 008ce020 008ce020 MyTool+0x68599
008cdff0 00474e5b 019805f8 008ce020 008ce148 MyTool+0x68887
008ce030 00403d76 008ce068 008ce148 004a85f4 MyTool+0x74e5b
008ce04c 00408d3d 00000042 008ce068 008ce148 MyTool+0x3d76
008ce084 0040add1 008ce148 017d90a0 01611d1c MyTool+0x8d3d
008ce120 004090b3 01611d1c 008ce16c 008ce148 MyTool+0xadd1
008ce174 00409470 004a8178 004a82e4 004a8178 MyTool+0x90b3
008ce2dc 0040a0a7 000011ce 004a95f0 004a8178 MyTool+0x9470
008ce3c8 0042b177 004a8178 01611f5c 008ce5c0 MyTool+0xa0a7
008ce470 0048091f 01611f5c 008ce7b4 008ce5c0 MyTool+0x2b177
008ce5e0 00480b21 004a8178 01611f5c 008ce7b4 MyTool+0x8091f
008ce768 0042d14f 004a8178 01611f5c 008ce7b4 MyTool+0x80b21
008ce7bc 00409379 004a8178 01611f5c 008ce934 MyTool+0x2d14f
008ce92c 0040a0a7 000011f2 004a95f0 004a8178 MyTool+0x9379
008cea18 0042b177 004a8178 0161267c 008cec10 MyTool+0xa0a7
008ceac0 0048091f 0161267c 008cee04 008cec10 MyTool+0x2b177
008cec30 00480b21 004a8178 0161267c 008cee04 MyTool+0x8091f
008cedb8 0042d14f 004a8178 0161267c 008cee04 MyTool+0x80b21
008cee0c 00409379 004a8178 0161267c 008cef84 MyTool+0x2d14f
008cef7c 0040a0a7 00001264 004a95f0 004a8178 MyTool+0x9379
008cf068 0042b177 004a8178 0161a2ec 008cf130 MyTool+0xa0a7
008cf110 0040cc96 0161a2ec 008cf1ac 008cf130 MyTool+0x2b177
008cf140 0040ccf3 004a8178 008cf1b7 018a2298 MyTool+0xcc96
008cf1bc 0040b2c4 004a8178 0161a2ec 008cf384 MyTool+0xccf3
008cf20c 00409379 004a8178 0161a2ec 008cf384 MyTool+0xb2c4
008cf37c 0040a0a7 00001a2b 004a8178 016168cc MyTool+0x9379
008cf468 004093dc 004a8178 016168cc 008cf4c8 MyTool+0xa0a7
008cf5dc 0040a0a7 00001689 004a8178 01615e0c MyTool+0x93dc
008cf6c8 004093dc 004a8178 01615e0c 008cf728 MyTool+0xa0a7
008cf83c 0040a0a7 000015dd 004a8178 01615b3c MyTool+0x93dc
008cf928 004093dc 004a8178 01615b3c 008cf988 MyTool+0xa0a7
008cfa9c 0040d675 000015b0 00000001 008cff04 MyTool+0x93dc
008cfef0 0040d767 00370031 00000000 7ffdf000 MyTool+0xd675
008cff30 0041656e 00400000 00000000 0002074e MyTool+0xd767
008cffc0 7c817077 00370031 00330030 7ffdf000 MyTool+0x1656e
008cfff0 00000000 004b8e70 00000000 000000c8 kernel32!RegisterWaitForInputIdle+0x49
*----> Raw Stack Dump <----*
00000000008cdf50  c0 22 6e 01 00 01 00 00 - 90 df 8c 00 4f 83 46 00  ."n.........O.F.
00000000008cdf60  c0 22 6e 01 23 df 90 00 - 00 01 00 00 01 01 00 00  ."n.#...........
00000000008cdf70  23 df 90 00 00 00 00 00 - ff ff ff ff 41 38 44 00  #...........A8D.
00000000008cdf80  20 e0 8c 00 04 00 00 00 - a0 df 8c 00 a0 df 8c 00   ...............
00000000008cdf90  d0 df 8c 00 99 85 46 00 - 20 e0 8c 00 05 00 00 00  ......F. .......
00000000008cdfa0  23 df 90 00 00 01 00 00 - 00 00 00 00 ff ff ff ff  #...............
00000000008cdfb0  00 00 00 00 48 e1 8c 00 - 78 81 4a 00 68 e0 8c 00  ....H...x.J.h...
00000000008cdfc0  00 00 00 00 b0 ff 8c 00 - 20 e9 90 7c e0 01 91 7c  ........ ..|...|
00000000008cdfd0  f0 df 8c 00 87 88 46 00 - 05 00 00 00 20 e0 8c 00  ......F..... ...
00000000008cdfe0  20 e0 8c 00 01 00 00 00 - 00 00 00 00 00 00 00 00   ...............
00000000008cdff0  30 e0 8c 00 5b 4e 47 00 - f8 05 98 01 20 e0 8c 00  0...[NG..... ...
00000000008ce000  48 e1 8c 00 ff ff ff ff - 20 e0 8c 00 00 00 00 00  H....... .......
00000000008ce010  78 81 4a 00 48 e1 8c 00 - 00 00 00 00 ff ff ff ff  x.J.H...........
00000000008ce020  00 00 00 00 fb 3c 40 00 - 01 00 00 00 00 00 00 00  .....<@.........
00000000008ce030  4c e0 8c 00 76 3d 40 00 - 68 e0 8c 00 48 e1 8c 00  L...v=@.h...H...
00000000008ce040  f4 85 4a 00 42 00 00 00 - 78 81 4a 00 84 e0 8c 00  ..J.B...x.J.....
00000000008ce050  3d 8d 40 00 42 00 00 00 - 68 e0 8c 00 48 e1 8c 00  =.@.B...h...H...
00000000008ce060  f0 95 4a 00 a4 e0 8c 00 - 88 80 48 00 90 0d a6 01  ..J.......H.....
00000000008ce070  02 00 00 00 04 00 00 00 - ff ff ff ff 02 00 00 00  ................
00000000008ce080  1f bc 40 00 20 e1 8c 00 - d1 ad 40 00 48 e1 8c 00  ..@. .....@.H...
*----> State Dump for Thread Id 0xcd8 <----*
eax=77df848a ebx=014cfed0 ecx=00000000 edx=00000011 esi=00000000 edi=7ffdf000
eip=7c90e514 esp=014cfea8 ebp=014cff44 iopl=0        nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\Windows\System32\ntdll.dll -
function: ntdll!KiFastSystemCallRet
        7c90e4fa e829000000    call    ntdll!RtlRaiseException (7c90e528)
        7c90e4ff 8b0424        mov   eax,[esp]
        7c90e502 8be5            mov     esp,ebp
        7c90e504 5d            pop   ebp
        7c90e505 c3            ret
        7c90e506 8da42400000000   lea    esp,[esp]
        7c90e50d 8d4900        lea   ecx,[ecx]
        ntdll!KiFastSystemCall:
        7c90e510 8bd4            mov     edx,esp
        7c90e512 0f34            sysenter
        ntdll!KiFastSystemCallRet:
        7c90e514 c3            ret
        7c90e515 8da42400000000   lea    esp,[esp]
        7c90e51c 8d642400        lea     esp,[esp]
        ntdll!KiIntSystemCall:
        7c90e520 8d542408        lea     edx,[esp+0x8]
        7c90e524 cd2e            int     2e
        7c90e526 c3            ret
        7c90e527 90            nop
        ntdll!RtlRaiseException:
        7c90e528 55            push    ebp
        7c90e529 8bec            mov     ebp,esp
*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\Windows\System32\ADVAPI32.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child          
014cff44 77df8631 00000002 014cff6c 00000000 ntdll!KiFastSystemCallRet
014cffb4 7c80b729 00000000 00000000 77df8ae4 ADVAPI32!WmiFreeBuffer+0x24e
014cffec 00000000 77df848a 00000000 00000000 kernel32!GetModuleFileNameA+0x1ba
*----> Raw Stack Dump <----*
00000000014cfea8  4a df 90 7c 90 95 80 7c - 02 00 00 00 d0 fe 4c 01  J..|...|......L.
00000000014cfeb8  01 00 00 00 01 00 00 00 - 04 ff 4c 01 e0 2e fd 00  ..........L.....
00000000014cfec8  60 66 e4 77 00 10 00 00 - 8c 00 00 00 98 00 00 00  `f.w............
00000000014cfed8  c0 fe 4c 01 ff 00 00 00 - dc ff 4c 01 d8 9a 83 7c  ..L.......L....|
00000000014cfee8  50 0b 81 7c 00 10 00 00 - 14 00 00 00 01 00 00 00  P..|............
00000000014cfef8  00 00 00 00 00 00 00 00 - 10 00 00 00 00 a2 2f 4d  ............../M
00000000014cff08  ff ff ff ff 00 10 00 00 - 00 f0 fd 7f 00 d0 fd 7f  ................
00000000014cff18  dc ff 4c 01 04 ff 4c 01 - d0 fe 4c 01 06 00 00 00  ..L...L...L.....
00000000014cff28  02 00 00 00 c4 fe 4c 01 - 06 00 00 00 dc ff 4c 01  ......L.......L.
00000000014cff38  d8 9a 83 7c 80 96 80 7c - 00 00 00 00 b4 ff 4c 01  ...|...|......L.
00000000014cff48  31 86 df 77 02 00 00 00 - 6c ff 4c 01 00 00 00 00  1..w....l.L.....
00000000014cff58  e0 93 04 00 01 00 00 00 - 00 00 00 00 00 00 00 00  ................
00000000014cff68  e4 8a df 77 8c 00 00 00 - 98 00 00 00 00 10 00 00  ...w............
00000000014cff78  e0 2e fd 00 00 00 00 00 - 00 10 00 00 e8 3e fd 00  .............>..
00000000014cff88  00 67 e4 77 28 00 00 00 - e0 66 e4 77 00 10 00 00  .g.w(....f.w....
00000000014cff98  00 00 00 00 00 67 e4 77 - e0 2e fd 00 e0 66 e4 77  .....g.w.....f.w
00000000014cffa8  e5 03 00 00 00 10 00 00 - e8 3e fd 00 ec ff 4c 01  .........>....L.
00000000014cffb8  29 b7 80 7c 00 00 00 00 - 00 00 00 00 e4 8a df 77  )..|...........w
00000000014cffc8  00 00 00 00 00 d0 fd 7f - 00 96 6e 8a c0 ff 4c 01  ..........n...L.
00000000014cffd8  20 86 c9 89 ff ff ff ff - d8 9a 83 7c 30 b7 80 7c   ..........|0..|
*----> State Dump for Thread Id 0xee4 <----*
eax=0000047a ebx=00000000 ecx=00000410 edx=00120ac8 esi=008e0cd8 edi=008e0d7c
eip=7c90e514 esp=02d2fe18 ebp=02d2ff80 iopl=0        nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246
function: ntdll!KiFastSystemCallRet
        7c90e4fa e829000000    call    ntdll!RtlRaiseException (7c90e528)
        7c90e4ff 8b0424        mov   eax,[esp]
        7c90e502 8be5            mov     esp,ebp
        7c90e504 5d            pop   ebp
        7c90e505 c3            ret
        7c90e506 8da42400000000   lea    esp,[esp]
        7c90e50d 8d4900        lea   ecx,[ecx]
        ntdll!KiFastSystemCall:
        7c90e510 8bd4            mov     edx,esp
        7c90e512 0f34            sysenter
        ntdll!KiFastSystemCallRet:
        7c90e514 c3            ret
        7c90e515 8da42400000000   lea    esp,[esp]
        7c90e51c 8d642400        lea     esp,[esp]
        ntdll!KiIntSystemCall:
        7c90e520 8d542408        lea     edx,[esp+0x8]
        7c90e524 cd2e            int     2e
        7c90e526 c3            ret
        7c90e527 90            nop
        ntdll!RtlRaiseException:
        7c90e528 55            push    ebp
        7c90e529 8bec            mov     ebp,esp
*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\Windows\System32\RPCRT4.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child          
02d2ff80 77e76caf 02d2ffa8 77e76ad1 008e0cd8 ntdll!KiFastSystemCallRet
02d2ff88 77e76ad1 008e0cd8 008ddb90 008cdfa4 RPCRT4!I_RpcBCacheFree+0x61c
02d2ffa8 77e76c97 008db9a0 02d2ffec 7c80b729 RPCRT4!I_RpcBCacheFree+0x43e
02d2ffb4 7c80b729 008f6008 008ddb90 008cdfa4 RPCRT4!I_RpcBCacheFree+0x604
02d2ffec 00000000 77e76c7d 008f6008 00000000 kernel32!GetModuleFileNameA+0x1ba
*----> Raw Stack Dump <----*
0000000002d2fe18  aa da 90 7c e3 65 e7 77 - 3c 02 00 00 74 ff d2 02  ...|.e.w<...t...
0000000002d2fe28  00 00 00 00 f8 d0 8f 00 - 50 ff d2 02 ff ff ff 03  ........P.......
0000000002d2fe38  ff ff ff 03 e4 6d 78 81 - 00 00 00 00 fc 3c 88 c0  .....mx......<..
0000000002d2fe48  c0 e7 57 89 40 85 34 b8 - 00 00 00 00 8e b5 4f 80  ..W.@.4.......O.
0000000002d2fe58  94 fb e9 a5 d0 fe 3f c0 - 00 90 fd 7f 00 00 00 00  ......?.........
0000000002d2fe68  c8 fe 3f 02 70 fb e9 a5 - df 38 52 80 00 90 fd 7f  ..?.p....8R.....
0000000002d2fe78  01 00 00 00 00 00 00 00 - c8 fe 3f c0 00 00 00 00  ..........?.....
0000000002d2fe88  00 00 00 00 f8 1f 60 c0 - 30 fc e9 a5 3e 40 52 80  ......`.0...>@R.
0000000002d2fe98  94 fb e9 a5 00 00 00 00 - 43 7d 6e 80 28 fc e9 a5  ........C}n.(...
0000000002d2fea8  27 74 6e 80 00 0d db ba - 00 00 00 00 00 00 00 00  'tn.............
0000000002d2feb8  c8 fe 3f c0 80 90 54 89 - 00 00 00 00 38 82 71 8a  ..?...T.....8.q.
0000000002d2fec8  00 00 04 00 4f 1f 00 00 - 94 e6 57 89 ff ff f4 01  ....O.....W.....
0000000002d2fed8  c8 e5 57 89 00 00 00 00 - 00 00 00 00 00 00 00 00  ..W.............
0000000002d2fee8  00 00 00 00 1f 00 00 00 - ff ff ff ff 40 85 33 b8  ............@.3.
0000000002d2fef8  00 00 00 00 10 74 6e 80 - bc b1 32 89 28 fc e9 a5  .....tn...2.(...
0000000002d2ff08  00 00 00 00 27 74 6e 80 - 08 00 00 00 46 02 00 00  ....'tn.....F...
0000000002d2ff18  86 38 50 80 90 b0 32 89 - 20 b0 32 89 94 b0 4f 80  .8P...2. .2...O.
0000000002d2ff28  8c b1 32 89 80 ff d2 02 - 85 d1 e7 77 48 ff d2 02  ..2........wH...
0000000002d2ff38  95 d1 e7 77 e0 10 90 7c - b0 7e 8f 00 08 60 8f 00  ...w...|.~...`..
0000000002d2ff48  00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff  ../M.....]......
*----> State Dump for Thread Id 0x8e4 <----*
eax=774fe4ef ebx=00007530 ecx=7ffdf000 edx=00000000 esi=00000000 edi=0312ff50
eip=7c90e514 esp=0312ff20 ebp=0312ff78 iopl=0        nv up ei pl nz na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000206
function: ntdll!KiFastSystemCallRet
        7c90e4fa e829000000    call    ntdll!RtlRaiseException (7c90e528)
        7c90e4ff 8b0424        mov   eax,[esp]
        7c90e502 8be5            mov     esp,ebp
        7c90e504 5d            pop   ebp
        7c90e505 c3            ret
        7c90e506 8da42400000000   lea    esp,[esp]
        7c90e50d 8d4900        lea   ecx,[ecx]
        ntdll!KiFastSystemCall:
        7c90e510 8bd4            mov     edx,esp
        7c90e512 0f34            sysenter
        ntdll!KiFastSystemCallRet:
        7c90e514 c3            ret
        7c90e515 8da42400000000   lea    esp,[esp]
        7c90e51c 8d642400        lea     esp,[esp]
        ntdll!KiIntSystemCall:
        7c90e520 8d542408        lea     edx,[esp+0x8]
        7c90e524 cd2e            int     2e
        7c90e526 c3            ret
        7c90e527 90            nop
        ntdll!RtlRaiseException:
        7c90e528 55            push    ebp
        7c90e529 8bec            mov     ebp,esp
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\Windows\System32\ole32.dll -
ChildEBP RetAddr  Args to Child          
0312ff78 7c802455 0000ea60 00000000 0312ffb4 ntdll!KiFastSystemCallRet
0312ff88 774fe3e3 0000ea60 008fa240 774fe4a2 kernel32!Sleep+0xf
0312ffb4 7c80b729 008fa240 7c910435 7c91043e ole32!StringFromGUID2+0x51d
0312ffec 00000000 774fe4ef 008fa240 00000000 kernel32!GetModuleFileNameA+0x1ba
*----> Raw Stack Dump <----*
000000000312ff20  1a d2 90 7c f1 23 80 7c - 00 00 00 00 50 ff 12 03  ...|.#.|....P...
000000000312ff30  50 25 80 7c f8 7d 60 77 - 30 75 00 00 14 00 00 00  P%.|.}`w0u......
000000000312ff40  01 00 00 00 00 00 00 00 - 00 00 00 00 10 00 00 00  ................
000000000312ff50  00 ba 3c dc ff ff ff ff - 10 d1 4e 77 50 ff 12 03  ..<.......NwP...
000000000312ff60  30 ff 12 03 68 44 8d 00 - dc ff 12 03 d8 9a 83 7c  0...hD.........|
000000000312ff70  60 24 80 7c 00 00 00 00 - 88 ff 12 03 55 24 80 7c  `$.|........U$.|
000000000312ff80  60 ea 00 00 00 00 00 00 - b4 ff 12 03 e3 e3 4f 77  `.............Ow
000000000312ff90  60 ea 00 00 40 a2 8f 00 - a2 e4 4f 77 00 00 00 00  `...@.....Ow....
000000000312ffa0  35 04 91 7c 40 a2 8f 00 - 00 00 4e 77 0a e5 4f 77  5..|@.....Nw..Ow
000000000312ffb0  3e 04 91 7c ec ff 12 03 - 29 b7 80 7c 40 a2 8f 00  >..|....)..|@...
000000000312ffc0  35 04 91 7c 3e 04 91 7c - 40 a2 8f 00 00 b0 fd 7f  5..|>..|@.......
000000000312ffd0  00 d6 6e 8a c0 ff 12 03 - f8 b2 29 89 ff ff ff ff  ..n.......).....
000000000312ffe0  d8 9a 83 7c 30 b7 80 7c - 00 00 00 00 00 00 00 00  ...|0..|........
000000000312fff0  00 00 00 00 ef e4 4f 77 - 40 a2 8f 00 00 00 00 00  ......Ow@.......
0000000003130000  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000003130010  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000003130020  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000003130030  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000003130040  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000003130050  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
*----> State Dump for Thread Id 0xce0 <----*
eax=77e76c7d ebx=00000000 ecx=00000000 edx=00000001 esi=008e0cd8 edi=008e0d7c
eip=7c90e514 esp=0352fe18 ebp=0352ff80 iopl=0        nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246
function: ntdll!KiFastSystemCallRet
        7c90e4fa e829000000    call    ntdll!RtlRaiseException (7c90e528)
        7c90e4ff 8b0424        mov   eax,[esp]
        7c90e502 8be5            mov     esp,ebp
        7c90e504 5d            pop   ebp
        7c90e505 c3            ret
        7c90e506 8da42400000000   lea    esp,[esp]
        7c90e50d 8d4900        lea   ecx,[ecx]
        ntdll!KiFastSystemCall:
        7c90e510 8bd4            mov     edx,esp
        7c90e512 0f34            sysenter
        ntdll!KiFastSystemCallRet:
        7c90e514 c3            ret
        7c90e515 8da42400000000   lea    esp,[esp]
        7c90e51c 8d642400        lea     esp,[esp]
        ntdll!KiIntSystemCall:
        7c90e520 8d542408        lea     edx,[esp+0x8]
        7c90e524 cd2e            int     2e
        7c90e526 c3            ret
        7c90e527 90            nop
        ntdll!RtlRaiseException:
        7c90e528 55            push    ebp
        7c90e529 8bec            mov     ebp,esp
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child          
0352ff80 77e76caf 0352ffa8 77e76ad1 008e0cd8 ntdll!KiFastSystemCallRet
0352ff88 77e76ad1 008e0cd8 00000000 0000000d RPCRT4!I_RpcBCacheFree+0x61c
0352ffa8 77e76c97 008db9a0 0352ffec 7c80b729 RPCRT4!I_RpcBCacheFree+0x43e
0352ffb4 7c80b729 008fa998 00000000 0000000d RPCRT4!I_RpcBCacheFree+0x604
0352ffec 00000000 77e76c7d 008fa998 00000000 kernel32!GetModuleFileNameA+0x1ba
*----> Raw Stack Dump <----*
000000000352fe18  aa da 90 7c e3 65 e7 77 - 3c 02 00 00 74 ff 52 03  ...|.e.w<...t.R.
000000000352fe28  00 00 00 00 f8 9c 8f 00 - 48 ff 52 03 00 00 00 00  ........H.R.....
000000000352fe38  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000352fe48  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000352fe58  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000352fe68  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000352fe78  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000352fe88  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000352fe98  00 00 00 00 00 00 00 00 - 43 7d 6e 80 28 7c 00 a6  ........C}n.(|..
000000000352fea8  27 74 6e 80 00 0d db ba - 00 00 00 00 00 00 00 00  'tn.............
000000000352feb8  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000352fec8  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000352fed8  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000352fee8  00 00 00 00 1f 00 00 00 - ff ff ff ff 40 f5 df ff  ............@...
000000000352fef8  00 00 00 00 10 74 6e 80 - 44 49 2e 89 28 7c 00 a6  .....tn.DI..(|..
000000000352ff08  00 00 00 00 27 74 6e 80 - 08 00 00 00 46 02 00 00  ....'tn.....F...
000000000352ff18  86 38 50 80 18 48 2e 89 - a8 47 2e 89 94 b0 4f 80  .8P..H...G....O.
000000000352ff28  14 49 2e 89 80 ff 52 03 - 85 d1 e7 77 48 ff 52 03  .I....R....wH.R.
000000000352ff38  95 d1 e7 77 e0 10 90 7c - d8 a4 8f 00 98 a9 8f 00  ...w...|........
000000000352ff48  00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff  ../M.....]......
Edited by francoiste
Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...