Closed Bug 542034 Opened 16 years ago Closed 16 years ago

[Backdoor.Ulrbot] Firefox 3.6 Crash on Startup - Safe Mode doesn't work either

Categories

(Firefox :: General, defect)

3.6 Branch
x86
Windows XP
defect
Not set
critical

Tracking

()

VERIFIED DUPLICATE of bug 434403

People

(Reporter: jryutzy, Unassigned)

Details

(Keywords: crash)

User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; MS-RTC LM 8; MS-RTC EA 2; InfoPath.2; .NET4.0C; .NET4.0E) Build Identifier: 3.6 Win DBG Report: Microsoft (R) Windows Debugger Version 6.11.0001.404 X86 Copyright (c) Microsoft Corporation. All rights reserved. CommandLine: "C:\Program Files\Mozilla Firefox\firefox.exe" Symbol search path is: *** Invalid *** **************************************************************************** * Symbol loading may be unreliable without a symbol search path. * * Use .symfix to have the debugger choose a symbol path. * * After setting your symbol path, use .reload to refresh symbol locations. * **************************************************************************** Executable search path is: ModLoad: 00400000 004e0000 firefox.exe ModLoad: 7c900000 7c9b2000 ntdll.dll ModLoad: 7c800000 7c8f5000 C:\WINDOWS\system32\kernel32.dll ModLoad: 10000000 10b2f000 C:\Program Files\Mozilla Firefox\xul.dll ModLoad: 00280000 002f3000 C:\Program Files\Mozilla Firefox\sqlite3.dll ModLoad: 78130000 781e0000 C:\Program Files\Mozilla Firefox\MOZCRT19.dll ModLoad: 77c10000 77c68000 C:\WINDOWS\system32\msvcrt.dll ModLoad: 00300000 003fa000 C:\Program Files\Mozilla Firefox\js3250.dll ModLoad: 004e0000 00509000 C:\Program Files\Mozilla Firefox\nspr4.dll ModLoad: 77dd0000 77e6b000 C:\WINDOWS\system32\ADVAPI32.dll ModLoad: 77e70000 77f02000 C:\WINDOWS\system32\RPCRT4.dll ModLoad: 77fe0000 77ff1000 C:\WINDOWS\system32\Secur32.dll ModLoad: 71ad0000 71ad9000 C:\WINDOWS\system32\WSOCK32.dll ModLoad: 71ab0000 71ac7000 C:\WINDOWS\system32\WS2_32.dll ModLoad: 71aa0000 71aa8000 C:\WINDOWS\system32\WS2HELP.dll ModLoad: 76b40000 76b6d000 C:\WINDOWS\system32\WINMM.dll ModLoad: 7e410000 7e4a1000 C:\WINDOWS\system32\USER32.dll ModLoad: 77f10000 77f58000 C:\WINDOWS\system32\GDI32.dll ModLoad: 00510000 00528000 C:\Program Files\Mozilla Firefox\smime3.dll ModLoad: 00530000 005cb000 C:\Program Files\Mozilla Firefox\nss3.dll ModLoad: 005d0000 005e4000 C:\Program Files\Mozilla Firefox\nssutil3.dll ModLoad: 005f0000 005f7000 C:\Program Files\Mozilla Firefox\plc4.dll ModLoad: 00600000 00607000 C:\Program Files\Mozilla Firefox\plds4.dll ModLoad: 00610000 00630000 C:\Program Files\Mozilla Firefox\ssl3.dll ModLoad: 7c9c0000 7d1d7000 C:\WINDOWS\system32\SHELL32.dll ModLoad: 77f60000 77fd6000 C:\WINDOWS\system32\SHLWAPI.dll ModLoad: 774e0000 7761d000 C:\WINDOWS\system32\ole32.dll ModLoad: 77c00000 77c08000 C:\WINDOWS\system32\VERSION.dll ModLoad: 73000000 73026000 C:\WINDOWS\system32\WINSPOOL.DRV ModLoad: 763b0000 763f9000 C:\WINDOWS\system32\COMDLG32.dll ModLoad: 773d0000 774d3000 C:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.2600.2982_x-ww_ac3f9c03\COMCTL32.dll ModLoad: 76390000 763ad000 C:\WINDOWS\system32\IMM32.dll ModLoad: 76380000 76385000 C:\WINDOWS\system32\MSIMG32.dll ModLoad: 74d90000 74dfb000 C:\WINDOWS\system32\USP10.dll ModLoad: 77120000 771ab000 C:\WINDOWS\system32\OLEAUT32.dll ModLoad: 00630000 00637000 C:\Program Files\Mozilla Firefox\xpcom.dll (1aa8.16ac): Break instruction exception - code 80000003 (first chance) eax=001a1eb4 ebx=7ffdf000 ecx=00000006 edx=00000040 esi=001a1f48 edi=001a1eb4 eip=7c90120e esp=0013fb20 ebp=0013fc94 iopl=0 nv up ei pl nz na po nc cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202 *** ERROR: Symbol file could not be found. Defaulted to export symbols for ntdll.dll - ntdll!DbgBreakPoint: 7c90120e cc int 3 0:000> .sympath SRV*c:\symbols*http://symbols.mozilla.org/firefox Symbol search path is: SRV*c:\symbols*http://symbols.mozilla.org/firefox Expanded Symbol search path is: srv*c:\symbols*http://symbols.mozilla.org/firefox 0:000> .symfix+ c:\symbols 0:000> .reload /f Reloading current modules ............ Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long. Run !sym noisy before .reload to track down problems loading symbols. ........................ 0:000> .logopen /t c:\firefox-debug.log Opened log file 'c:\firefox-debug_0fac_2010-01-25_14-06-08-003.log' 0:000> .childdbg 1 Processes created by the current process will be debugged 0:000> .tlist 0n0 System Process 0n4 System 0n1360 smss.exe 0n1436 csrss.exe 0n1472 winlogon.exe 0n1516 services.exe 0n1528 lsass.exe 0n1708 ibmpmsvc.exe 0n1736 svchost.exe 0n1800 svchost.exe 0n1204 svchost.exe 0n1312 S24EvMon.exe 0n852 svchost.exe 0n1100 svchost.exe 0n1864 spoolsv.exe 0n1932 scardsvr.exe 0n1340 svchost.exe 0n448 IPSSVC.EXE 0n472 msdtc.exe 0n576 AcPrfMgrSvc.exe 0n644 schedul2.exe 0n784 wrapper.exe 0n800 dtsslsrv.exe 0n828 cvpnd.exe 0n912 DTSRVC.exe 0n940 EvtEng.exe 0n1000 inetinfo.exe 0n1044 iviRegMgr.exe 0n1180 java.exe 0n2364 mdm.exe 0n2420 mfevtps.exe 0n2440 mnmsrvc.exe 0n2476 NetCfgSv.EXE 0n2488 rundll32.exe 0n2504 nvsvc32.exe 0n2516 omtsreco.exe 0n2592 pdisrvc.exe 0n2608 wrapper.exe 0n2652 RegSrvc.exe 0n3072 sqlwriter.exe 0n3192 sgvrfy32.exe 0n3432 java.exe 0n3440 tvt_reg_monitor_svc.exe 0n3588 TPHDEXLG.exe 0n3728 CAPM5RSK.EXE 0n3808 TpKmpSvc.exe 0n4016 rrpservice.exe 0n292 rrservice.exe 0n352 tvtsched.exe 0n616 UpdateMonitor.exe 0n632 CAPM5SWK.EXE 0n876 vmware-ufad.exe 0n1612 vmware-authd.exe 0n1996 logmon.exe 0n2152 vmount2.exe 0n2176 vmnat.exe 0n2868 AcSvc.exe 0n2944 CcmExec.exe 0n3060 mqsvc.exe 0n3940 SUService.exe 0n2988 vmnetdhcp.exe 0n3148 mqtgsvc.exe 0n2132 AgentService.exe 0n2692 APNDNProxy.exe 0n4528 SvcGuiHlpr.exe 0n5016 Core_Service.exe 0n5084 APFirstAidHost.exe 0n5128 APWebGrbHost.exe 0n5156 ssonsvr.exe 0n6064 alg.exe 0n4216 wmiprvse.exe 0n5976 explorer.exe 0n4080 Dot1XCfg.exe 0n4232 TfsComProviderSvr.exe 0n2756 TPOSDSVC.exe 0n2296 EZEJMNAP.EXE 0n1600 TpShocks.exe 0n3264 TpScrLk.exe 0n3676 LPMGR.EXE 0n3008 rundll32.exe 0n3340 TPONSCR.exe 0n3356 TpScrex.exe 0n928 SynTPLpr.exe 0n5596 SynTPEnh.exe 0n5788 tpfnf7sp.exe 0n4744 smax4pnp.exe 0n4784 LPMLCHK.EXE 0n4848 wpCtrl.exe 0n4500 rundll32.exe 0n3248 ACTray.exe 0n1200 shstat.exe 0n5436 Floater.exe 0n5360 ACWLIcon.exe 0n1508 ProcessLasso.exe 0n4364 ProcessGovernor.exe 0n4388 ctfmon.exe 0n4428 DesktopSearchService.exe 0n5208 HookManager.exe 0n5520 wmiprvse.exe 0n1236 vpngui.exe 0n5808 UdaterUI.exe 0n5568 wuauclt.exe 0n3188 Communicatork9.exe 0n3608 dllhost.exe 0n5948 dllhost.exe 0n5892 dllhost.exe 0n3836 wmiprvse.exe 0n4888 DESKTO~1.EXE 0n8084 rsvp.exe 0n7124 Notepad2.exe 0n2168 iexplore.exe 0n8056 iexplore.exe 0n2760 mmc.exe 0n7616 WINWORD.EXE 0n6448 devenv.exe 0n7024 WPFFontCache_v0400.exe 0n2144 QTAgent32.exe 0n3344 regedit.exe 0n5472 Notepad2.exe 0n3480 mstsc.exe 0n8136 OUTLOOK.EXE 0n3944 dllhost.exe 0n6916 dllhost.exe 0n7872 mmc.exe 0n4064 msiexec.exe 0n4012 windbg.exe 0n6824 firefox.exe 0:000> sxn gp 0:000> |* lm start end module name 00280000 002f3000 sqlite3 (private pdb symbols) c:\symbols\sqlite3.pdb\6F74FD39CF1044ABA2C446D0B30A60B51\sqlite3.pdb 00300000 003fa000 js3250 (private pdb symbols) c:\symbols\js3250.pdb\6BF65EDB9FA747E680672D6C2FE8D2202\js3250.pdb 00400000 004e0000 firefox (private pdb symbols) c:\symbols\firefox.pdb\ED3EBF63531640798D9AE98B04A4FD0F2\firefox.pdb 004e0000 00509000 nspr4 (private pdb symbols) c:\symbols\nspr4.pdb\E33668709C08413AA86C08F91C7C4B8F1\nspr4.pdb 00510000 00528000 smime3 (private pdb symbols) c:\symbols\smime3.pdb\68F3D6650D5647E58E78389A97BC6D8D1\smime3.pdb 00530000 005cb000 nss3 (private pdb symbols) c:\symbols\nss3.pdb\AE56D56A749045B398FD0C34A620829E1\nss3.pdb 005d0000 005e4000 nssutil3 (private pdb symbols) c:\symbols\nssutil3.pdb\DB61F2CA17B543F0A8B0AABB61C15B6C1\nssutil3.pdb 005f0000 005f7000 plc4 (private pdb symbols) c:\symbols\plc4.pdb\8294795A98C843D1B1187D0FCFDEA74F1\plc4.pdb 00600000 00607000 plds4 (private pdb symbols) c:\symbols\plds4.pdb\99862C49C35B4D8FB9D03CE9CB7139751\plds4.pdb 00610000 00630000 ssl3 (private pdb symbols) c:\symbols\ssl3.pdb\17E19D09DB45474DAAB33AECC65565431\ssl3.pdb 00630000 00637000 xpcom (private pdb symbols) c:\symbols\xpcom.pdb\4BE824E5CCF9420E99DD5ADA4C3DCAD52\xpcom.pdb 10000000 10b2f000 xul (private pdb symbols) c:\symbols\xul.pdb\4381CFB3FC4A4A8D92FDFE30FCCEA6352\xul.pdb 71aa0000 71aa8000 WS2HELP (pdb symbols) c:\symbols\ws2help.pdb\537CE830EFE94FE3A92C95153BDB71462\ws2help.pdb 71ab0000 71ac7000 WS2_32 (pdb symbols) c:\symbols\ws2_32.pdb\07AC08831007408D919E0CCF1EA499BF2\ws2_32.pdb 71ad0000 71ad9000 WSOCK32 (pdb symbols) c:\symbols\wsock32.pdb\E7B6C17E43604822813D3B65499B6C0F2\wsock32.pdb 73000000 73026000 WINSPOOL (pdb symbols) c:\symbols\winspool.pdb\97A6ECC94EA7450CA7D375BD9DFFCA5E2\winspool.pdb 74d90000 74dfb000 USP10 (pdb symbols) c:\symbols\usp10.pdb\14C8D7F8AB3C48A4B95A73BAC9A6B02C1\usp10.pdb 76380000 76385000 MSIMG32 (pdb symbols) c:\symbols\msimg32.pdb\E28D4258D66B428EB5D74279EB57A08F2\msimg32.pdb 76390000 763ad000 IMM32 (pdb symbols) c:\symbols\imm32.pdb\2C17A49C251B4C8EB9E2AD13D7D9EA162\imm32.pdb 763b0000 763f9000 COMDLG32 (pdb symbols) c:\symbols\comdlg32.pdb\4FCBEAD63D7345998C1F92D8DBB0DC272\comdlg32.pdb 76b40000 76b6d000 WINMM (pdb symbols) c:\symbols\winmm.pdb\4FC9F179964745CAA3C78D6FADFC28322\winmm.pdb 77120000 771ab000 OLEAUT32 (pdb symbols) c:\symbols\oleaut32.pdb\659B514A88A24FB6ADB4F29A9BB066E42\oleaut32.pdb 773d0000 774d3000 COMCTL32 (pdb symbols) c:\symbols\MicrosoftWindowsCommon-Controls-6.0.2600.2982-comctl32.pdb\C0A72EE9578847AAB7770CF02FFED0941\MicrosoftWindowsCommon-Controls-6.0.2600.2982-comctl32.pdb 774e0000 7761d000 ole32 (pdb symbols) c:\symbols\ole32.pdb\683B65B246F4418796D2EE6D4C55EB112\ole32.pdb 77c00000 77c08000 VERSION (pdb symbols) c:\symbols\version.pdb\180A90C40384463E82DDC45B2C8AB76E2\version.pdb 77c10000 77c68000 msvcrt (pdb symbols) c:\symbols\msvcrt.pdb\A678F3C30DED426B839032B996987E381\msvcrt.pdb 77dd0000 77e6b000 ADVAPI32 (pdb symbols) c:\symbols\advapi32.pdb\153E2CE004564DA39D338E2AF40947A82\advapi32.pdb 77e70000 77f02000 RPCRT4 (pdb symbols) c:\symbols\rpcrt4.pdb\712BCFE9A92941E19F433CEF1BA972C82\rpcrt4.pdb 77f10000 77f58000 GDI32 (pdb symbols) c:\symbols\gdi32.pdb\39A70B1CB0294D2CAAE3582449420D622\gdi32.pdb 77f60000 77fd6000 SHLWAPI (pdb symbols) c:\symbols\shlwapi.pdb\858772C19EB14201A80F9B61D5DB69B12\shlwapi.pdb 77fe0000 77ff1000 Secur32 (pdb symbols) c:\symbols\secur32.pdb\3885BDC7EBF54106A5642E3CD45F60FE2\secur32.pdb 78130000 781e0000 MOZCRT19 (private pdb symbols) c:\symbols\MOZCRT19.pdb\0C16779262344F49BC07B2530B994EA71\MOZCRT19.pdb 7c800000 7c8f5000 kernel32 (pdb symbols) c:\symbols\kernel32.pdb\35CC603450F44929AEB29742698380BC2\kernel32.pdb 7c900000 7c9b2000 ntdll (pdb symbols) c:\symbols\ntdll.pdb\562E2BF3593E46DB8A5D3F50A5E025E92\ntdll.pdb 7c9c0000 7d1d7000 SHELL32 (pdb symbols) c:\symbols\shell32.pdb\64CF10584B774D71BBD708BE7D8A05602\shell32.pdb 7e410000 7e4a1000 USER32 (pdb symbols) c:\symbols\user32.pdb\F049F32D0C8948C0B48F7A065FC5C1B12\user32.pdb 0:000> g ModLoad: 5cb70000 5cb96000 C:\WINDOWS\system32\ShimEng.dll ModLoad: 5ad70000 5ada8000 C:\WINDOWS\system32\uxtheme.dll ModLoad: 59a60000 59b01000 C:\WINDOWS\system32\dbghelp.dll ModLoad: 74720000 7476b000 C:\WINDOWS\system32\MSCTF.dll ModLoad: 63000000 63014000 C:\WINDOWS\system32\SynTPFcs.dll ModLoad: 01520000 01683000 C:\WINDOWS\system32\svrltmgr.dll ModLoad: 71b20000 71b32000 C:\WINDOWS\system32\MPR.dll ModLoad: 76bf0000 76bfb000 C:\WINDOWS\system32\PSAPI.DLL ModLoad: 74c80000 74cac000 C:\WINDOWS\system32\OLEACC.DLL ModLoad: 76080000 760e5000 C:\WINDOWS\system32\MSVCP60.dll ModLoad: 77920000 77a13000 C:\WINDOWS\system32\SETUPAPI.dll ModLoad: 77b40000 77b62000 C:\WINDOWS\system32\apphelp.dll ModLoad: 755c0000 755ee000 C:\WINDOWS\system32\msctfime.ime ModLoad: 76fd0000 7704f000 C:\WINDOWS\system32\CLBCATQ.DLL ModLoad: 77050000 77115000 C:\WINDOWS\system32\COMRes.dll ModLoad: 01900000 01908000 C:\Program Files\Mozilla Firefox\components\browserdirprovider.dll ModLoad: 71a50000 71a8f000 C:\WINDOWS\system32\mswsock.dll ModLoad: 662b0000 66308000 C:\WINDOWS\system32\hnetcfg.dll ModLoad: 71a90000 71a98000 C:\WINDOWS\System32\wshtcpip.dll ModLoad: 76d60000 76d79000 C:\WINDOWS\system32\iphlpapi.dll ModLoad: 73ce0000 73d01000 C:\WINDOWS\system32\t2embed.dll ModLoad: 73dc0000 73dc3000 C:\WINDOWS\system32\LZ32.dll ModLoad: 01d60000 01d84000 C:\Program Files\Mozilla Firefox\components\brwsrcmp.dll ModLoad: 76f20000 76f47000 C:\WINDOWS\system32\DNSAPI.dll ModLoad: 76fb0000 76fb8000 C:\WINDOWS\System32\winrnr.dll ModLoad: 76f60000 76f8c000 C:\WINDOWS\system32\WLDAP32.dll ModLoad: 751d0000 751ee000 C:\WINDOWS\system32\wshbth.dll ModLoad: 20000000 202c5000 C:\WINDOWS\system32\xpsp2res.dll ModLoad: 01da0000 01dde000 C:\Program Files\Portrait Displays\Pivot Software\winphook.dll ModLoad: 77690000 776b1000 C:\WINDOWS\system32\NTMARTA.DLL ModLoad: 71bf0000 71c03000 C:\WINDOWS\system32\SAMLIB.dll ModLoad: 73b30000 73b45000 C:\WINDOWS\system32\mscms.dll (1aa8.16ac): Access violation - code c0000005 (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. eax=0a214800 ebx=035477a0 ecx=0019e9d0 edx=00000000 esi=03dffffc edi=0447a744 eip=781477a0 esp=0013f688 ebp=0013f690 iopl=0 nv dn ei pl nz ac po nc cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00010612 MOZCRT19!TrailUpVec+0x6c: 781477a0 f3a5 rep movs dword ptr es:[edi],dword ptr [esi] 0:000> |* ~* kp . 0 Id: 1aa8.16ac Suspend: 1 Teb: 7ffde000 Unfrozen ChildEBP RetAddr 0013f690 100fec74 MOZCRT19!TrailUpVec+0x6c [F:\SP\vctools\crt_bld\SELF_X86\crt\src\intel\memcpy.asm @ 407] 0013f6c8 100f1deb xul!nsAString_internal::Assign(wchar_t * data = 0x00000000 "", unsigned int length = <Memory access error>)+0xb4 [e:\builds\moz2_slave\win32_build\build\xpcom\string\src\nstsubstring.cpp @ 362] 0013f6d8 10368ed7 xul!nsAString_internal::Assign(class nsAString_internal * str = 0x00000000)+0x1b [e:\builds\moz2_slave\win32_build\build\xpcom\string\src\nstsubstring.cpp @ 422] *** WARNING: Unable to verify checksum for C:\WINDOWS\system32\svrltmgr.dll *** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\svrltmgr.dll - 0013f708 016206e6 xul!nsWindow::SetTitle+0x1a2180 WARNING: Stack unwind information not available. Following frames may be wrong. 0013f740 1008b29f svrltmgr!DllCanUnloadNow+0x145ba 0013f914 1003d57a xul!nsDocShell::SetupNewViewer(class nsIContentViewer * aNewViewer = 0x109a90d4)+0x40f [e:\builds\moz2_slave\win32_build\build\docshell\base\nsdocshell.cpp @ 7298] 0013f92c 100927e5 xul!nsDocShell::Embed(class nsIContentViewer * aContentViewer = 0x037858c0, char * aCommand = 0x10965a66 "", class nsISupports * aExtraInfo = 0x00000000)+0x1d [e:\builds\moz2_slave\win32_build\build\docshell\base\nsdocshell.cpp @ 5472] 0013f968 101ab57a xul!nsDocShell::CreateContentViewer(char * aContentType = 0x10a04128 ".u0???", class nsIRequest * request = 0x10a04148, class nsIStreamListener ** aContentHandler = 0x10a04188)+0x1a5 [e:\builds\moz2_slave\win32_build\build\docshell\base\nsdocshell.cpp @ 7084] 0013f998 1005dc5b xul!nsDSURIContentListener::DoContent(char * aContentType = 0x024e19e8 "application/xhtml+xml", int aIsContentPreferred = 0, class nsIRequest * request = 0x038630e0, class nsIStreamListener ** aContentHandler = 0x038fa61c, int * aAbortProcess = 0x038630e0)+0x71 [e:\builds\moz2_slave\win32_build\build\docshell\base\nsdsuricontentlistener.cpp @ 139] 0013f9f0 1007076c xul!nsDocumentOpenInfo::TryContentListener(class nsIURIContentListener * aListener = 0x038fa628, class nsIChannel * aChannel = 0x038630e0)+0xe8 [e:\builds\moz2_slave\win32_build\build\uriloader\base\nsuriloader.cpp @ 738] 0013fbd0 1005450f xul!nsDocumentOpenInfo::DispatchContent(class nsIRequest * request = 0x038630e0, class nsISupports * aCtxt = 0x0013fbf0)+0x1bc [e:\builds\moz2_slave\win32_build\build\uriloader\base\nsuriloader.cpp @ 434] 0013fbf0 10035613 xul!nsDocumentOpenInfo::OnStartRequest(class nsIRequest * request = 0x00000000, class nsISupports * aCtxt = 0x00000000)+0x90 [e:\builds\moz2_slave\win32_build\build\uriloader\base\nsuriloader.cpp @ 280] 0013fc04 101a56ed xul!nsJARChannel::OnStartRequest(class nsIRequest * req = 0x038ff744, class nsISupports * ctx = 0x035908e8)+0x1b [e:\builds\moz2_slave\win32_build\build\modules\libjar\nsjarchannel.cpp @ 867] 0013fc1c 101a07e5 xul!nsInputStreamPump::OnStateStart(void)+0x35 [e:\builds\moz2_slave\win32_build\build\netwerk\base\src\nsinputstreampump.cpp @ 443] 0013fc30 1008f561 xul!nsInputStreamPump::OnInputStreamReady(class nsIAsyncInputStream * stream = 0x035908e8)+0x56 [e:\builds\moz2_slave\win32_build\build\netwerk\base\src\nsinputstreampump.cpp @ 395] 0013fc40 100f9487 xul!nsInputStreamReadyEvent::Run(void)+0x1d [e:\builds\moz2_slave\win32_build\build\xpcom\io\nsstreamutils.cpp @ 192] 0013fc68 100c592a xul!nsThread::ProcessNextEvent(int mayWait = <Memory access error>, int * result = <Memory access error>)+0x247 [e:\builds\moz2_slave\win32_build\build\xpcom\threads\nsthread.cpp @ 533] 0013fc80 1022bd73 xul!nsBaseAppShell::Run(void)+0x4a [e:\builds\moz2_slave\win32_build\build\widget\src\xpwidgets\nsbaseappshell.cpp @ 169] 0013fc8c 1002f83c xul!nsAppStartup::Run(void)+0x1e [e:\builds\moz2_slave\win32_build\build\toolkit\components\startup\src\nsappstartup.cpp @ 183] 0013fc94 0081f090 xul!XRE_main(int argc = 7, char ** argv = 0x00000000, struct nsXREAppData * aAppData = 0x00000000)+0xe1b [e:\builds\moz2_slave\win32_build\build\toolkit\xre\nsapprunner.cpp @ 3507] 1 Id: 1aa8.1c18 Suspend: 1 Teb: 7ffdd000 Unfrozen ChildEBP RetAddr 00f5ff28 7c90df5a ntdll!KiFastSystemCallRet 00f5ff2c 7c8025cb ntdll!ZwWaitForSingleObject+0xc 00f5ff90 7c802532 kernel32!WaitForSingleObjectEx+0xa8 00f5ffa4 1025328b kernel32!WaitForSingleObject+0x12 00f5ffb4 7c80b699 xul!google_breakpad::ExceptionHandler::ExceptionHandlerThreadMain(void * lpParameter = 0x00000000)+0x13 [e:\builds\moz2_slave\win32_build\build\toolkit\crashreporter\google-breakpad\src\client\windows\handler\exception_handler.cc @ 279] 00f5ffec 00000000 kernel32!BaseThreadStart+0x37 2 Id: 1aa8.215c Suspend: 1 Teb: 7ffdb000 Unfrozen ChildEBP RetAddr 018afee8 7c90d21a ntdll!KiFastSystemCallRet 018afeec 7c8023ed ntdll!NtDelayExecution+0xc 018aff44 7c802451 kernel32!SleepEx+0x61 018aff54 015f77ab kernel32!Sleep+0xf WARNING: Stack unwind information not available. Following frames may be wrong. 018aff7c 01630a0c svrltmgr+0xd77ab 018affb4 7c80b699 svrltmgr!DllCanUnloadNow+0x248e0 018affec 00000000 kernel32!BaseThreadStart+0x37 3 Id: 1aa8.fb8 Suspend: 1 Teb: 7ffdc000 Unfrozen ChildEBP RetAddr 017afbe4 7c90d21a ntdll!KiFastSystemCallRet 017afbe8 7c8023ed ntdll!NtDelayExecution+0xc 017afc40 7c802451 kernel32!SleepEx+0x61 017afc50 015dc713 kernel32!Sleep+0xf WARNING: Stack unwind information not available. Following frames may be wrong. 017aff7c 01630a0c svrltmgr+0xbc713 017affb4 7c80b699 svrltmgr!DllCanUnloadNow+0x248e0 017affec 00000000 kernel32!BaseThreadStart+0x37 4 Id: 1aa8.20a8 Suspend: 1 Teb: 7ffda000 Unfrozen ChildEBP RetAddr 01a4ff78 7c90da4a ntdll!KiFastSystemCallRet 01a4ff7c 71a5d320 ntdll!NtRemoveIoCompletion+0xc 01a4ffb4 7c80b699 mswsock!SockAsyncThread+0x5a 01a4ffec 00000000 kernel32!BaseThreadStart+0x37 5 Id: 1aa8.2154 Suspend: 1 Teb: 7ffd9000 Unfrozen ChildEBP RetAddr 01b4cc34 7c90df5a ntdll!KiFastSystemCallRet 01b4cc38 71a5402b ntdll!ZwWaitForSingleObject+0xc 01b4cc74 71a55fa7 mswsock!SockWaitForSingleObject+0x1a0 01b4cd68 71ab2e67 mswsock!WSPSelect+0x25f 01b4cdb8 004fb6dd WS2_32!select+0xb8 01b4fe18 100a1622 nspr4!_PR_MD_PR_POLL(struct PRPollDesc * pds = <Memory access error>, int npds = <Memory access error>, unsigned int timeout = <Memory access error>)+0x38d [e:\builds\moz2_slave\win32_build\build\nsprpub\pr\src\md\windows\w32poll.c @ 279] 01b4fe3c 100a170b xul!nsSocketTransportService::Poll(int wait = 0, unsigned int * interval = 0x00000000)+0x62 [e:\builds\moz2_slave\win32_build\build\netwerk\base\src\nssockettransportservice2.cpp @ 355] 01b4fe64 100a6151 xul!nsSocketTransportService::DoPollIteration(int wait = <Memory access error>)+0xab [e:\builds\moz2_slave\win32_build\build\netwerk\base\src\nssockettransportservice2.cpp @ 661] 01b4fe74 100f95ed xul!nsSocketTransportService::OnProcessNextEvent(class nsIThreadInternal * thread = <Memory access error>, int mayWait = <Memory access error>, unsigned int depth = <Memory access error>)+0x51 [e:\builds\moz2_slave\win32_build\build\netwerk\base\src\nssockettransportservice2.cpp @ 539] 01b4fe9c 100757b4 xul!nsThread::ProcessNextEvent(int mayWait = <Memory access error>, int * result = <Memory access error>)+0x3ad [e:\builds\moz2_slave\win32_build\build\xpcom\threads\nsthread.cpp @ 508] 01b4febc 100580c8 xul!NS_ProcessPendingEvents_P(class nsIThread * thread = 0x0080c008, unsigned int timeout = 0x81eba0)+0x25 [e:\builds\moz2_slave\win32_build\build\obj-firefox\xpcom\build\nsthreadutils.cpp @ 200] 01b4feec 100f9487 xul!nsSocketTransportService::Run(void)+0xa0 [e:\builds\moz2_slave\win32_build\build\netwerk\base\src\nssockettransportservice2.cpp @ 581] 01b4ff14 1005814a xul!nsThread::ProcessNextEvent(int mayWait = <Memory access error>, int * result = <Memory access error>)+0x247 [e:\builds\moz2_slave\win32_build\build\xpcom\threads\nsthread.cpp @ 533] 00000000 00000000 xul!NS_ProcessNextEvent_P(class nsIThread * thread = <Memory access error>, int mayWait = <Memory access error>)+0x1b [e:\builds\moz2_slave\win32_build\build\obj-firefox\xpcom\build\nsthreadutils.cpp @ 250] 6 Id: 1aa8.2160 Suspend: 1 Teb: 7ffd8000 Unfrozen ChildEBP RetAddr 01c4fdec 7c90df4a ntdll!KiFastSystemCallRet 01c4fdf0 7c8094fe ntdll!ZwWaitForMultipleObjects+0xc 01c4fe8c 7c80a085 kernel32!WaitForMultipleObjectsEx+0x12c 01c4fea8 1024b2a6 kernel32!WaitForMultipleObjects+0x18 01c4feec 100f9487 xul!nsNotifyAddrListener::Run(void)+0x68 [e:\builds\moz2_slave\win32_build\build\netwerk\system\win32\nsnotifyaddrlistener.cpp @ 186] 01c4ff14 1005814a xul!nsThread::ProcessNextEvent(int mayWait = <Memory access error>, int * result = <Memory access error>)+0x247 [e:\builds\moz2_slave\win32_build\build\xpcom\threads\nsthread.cpp @ 533] 00000000 00000000 xul!NS_ProcessNextEvent_P(class nsIThread * thread = <Memory access error>, int mayWait = <Memory access error>)+0x1b [e:\builds\moz2_slave\win32_build\build\obj-firefox\xpcom\build\nsthreadutils.cpp @ 250] 7 Id: 1aa8.2170 Suspend: 1 Teb: 7ffd6000 Unfrozen ChildEBP RetAddr 01fffe6c 7c90df5a ntdll!KiFastSystemCallRet 01fffe70 7c8025cb ntdll!ZwWaitForSingleObject+0xc 01fffed4 7c802532 kernel32!WaitForSingleObjectEx+0xa8 01fffee8 004f9cbb kernel32!WaitForSingleObject+0x12 01ffff04 004f5c29 nspr4!_PR_MD_WAIT_CV(struct _MDCVar * cv = 0xffffffff, struct _MDLock * lock = 0x00000000, unsigned int timeout = 0)+0x8b [e:\builds\moz2_slave\win32_build\build\nsprpub\pr\src\md\windows\w95cv.c @ 282] 01ffff1c 004f5d22 nspr4!_PR_WaitCondVar(struct PRThread * thread = 0x10021ddc, struct PRCondVar * cvar = 0x00005eb1, struct PRLock * lock = 0x00000000, unsigned int timeout = 0x38f5ff0)+0x59 [e:\builds\moz2_slave\win32_build\build\nsprpub\pr\src\threads\combined\prucv.c @ 205] 01ffff34 1025449e nspr4!PR_WaitCondVar(struct PRCondVar * cvar = 0x10021ddc, unsigned int timeout = 0x5eb1)+0x22 [e:\builds\moz2_slave\win32_build\build\nsprpub\pr\src\threads\combined\prucv.c @ 547] 01ffff50 004f64fb xul!XPCJSRuntime::WatchdogMain(void * arg = 0x10021ddc)+0x3d [e:\builds\moz2_slave\win32_build\build\js\src\xpconnect\src\xpcjsruntime.cpp @ 806] 01ffff6c 004f863d nspr4!_PR_NativeRunThread(void * arg = 0x78132cb6)+0xdb [e:\builds\moz2_slave\win32_build\build\nsprpub\pr\src\threads\combined\pruthr.c @ 448] 01ffff74 78132c28 nspr4!pr_root(void * arg = 0x78132cb6)+0xd [e:\builds\moz2_slave\win32_build\build\nsprpub\pr\src\md\windows\w95thred.c @ 122] 01ffffac 78132cb6 MOZCRT19!_callthreadstartex(void)+0x48 [e:\builds\moz2_slave\win32_build\build\obj-firefox\memory\jemalloc\crtsrc\threadex.c @ 348] 01ffffb4 7c80b699 MOZCRT19!_threadstartex(void * ptd = 0x00000000)+0x66 [e:\builds\moz2_slave\win32_build\build\obj-firefox\memory\jemalloc\crtsrc\threadex.c @ 326] 01ffffec 00000000 kernel32!BaseThreadStart+0x37 8 Id: 1aa8.2174 Suspend: 1 Teb: 7ffd7000 Unfrozen ChildEBP RetAddr 01d5fe68 7c90df5a ntdll!KiFastSystemCallRet 01d5fe6c 7c8025cb ntdll!ZwWaitForSingleObject+0xc 01d5fed0 7c802532 kernel32!WaitForSingleObjectEx+0xa8 01d5fee4 004f9cbb kernel32!WaitForSingleObject+0x12 01d5ff00 004f5c29 nspr4!_PR_MD_WAIT_CV(struct _MDCVar * cv = 0xffffffff, struct _MDLock * lock = 0x00000000, unsigned int timeout = 0)+0x8b [e:\builds\moz2_slave\win32_build\build\nsprpub\pr\src\md\windows\w95cv.c @ 282] 01d5ff18 004f5d22 nspr4!_PR_WaitCondVar(struct PRThread * thread = 0x8b000028, struct PRCondVar * cvar = 0x8b0c247c, struct PRLock * lock = 0x1c478df0, unsigned int timeout = 0x6c15ff50)+0x59 [e:\builds\moz2_slave\win32_build\build\nsprpub\pr\src\threads\combined\prucv.c @ 205] 01d5ff30 003012c8 nspr4!PR_WaitCondVar(struct PRCondVar * cvar = 0x8b000028, unsigned int timeout = 0x8b0c247c)+0x22 [e:\builds\moz2_slave\win32_build\build\nsprpub\pr\src\threads\combined\prucv.c @ 547] 01d5ff48 0030129a js3250!JSBackgroundThread::work(void)+0x28 [e:\builds\moz2_slave\win32_build\build\js\src\jstask.cpp @ 93] 01d5ff50 004f64fb js3250!start(void * arg = 0x78132cb6)+0xa [e:\builds\moz2_slave\win32_build\build\js\src\jstask.cpp @ 43] 01d5ff6c 004f863d nspr4!_PR_NativeRunThread(void * arg = 0x78132cb6)+0xdb [e:\builds\moz2_slave\win32_build\build\nsprpub\pr\src\threads\combined\pruthr.c @ 448] 01d5ff74 78132c28 nspr4!pr_root(void * arg = 0x78132cb6)+0xd [e:\builds\moz2_slave\win32_build\build\nsprpub\pr\src\md\windows\w95thred.c @ 122] 01d5ffac 78132cb6 MOZCRT19!_callthreadstartex(void)+0x48 [e:\builds\moz2_slave\win32_build\build\obj-firefox\memory\jemalloc\crtsrc\threadex.c @ 348] 01d5ffb4 7c80b699 MOZCRT19!_threadstartex(void * ptd = 0x00000000)+0x66 [e:\builds\moz2_slave\win32_build\build\obj-firefox\memory\jemalloc\crtsrc\threadex.c @ 326] 01d5ffec 00000000 kernel32!BaseThreadStart+0x37 9 Id: 1aa8.217c Suspend: 1 Teb: 7ffd5000 Unfrozen ChildEBP RetAddr 022ffdf8 7c90df5a ntdll!KiFastSystemCallRet 022ffdfc 7c8025cb ntdll!ZwWaitForSingleObject+0xc 022ffe60 7c802532 kernel32!WaitForSingleObjectEx+0xa8 022ffe74 004f9cbb kernel32!WaitForSingleObject+0x12 022ffe90 004f5c29 nspr4!_PR_MD_WAIT_CV(struct _MDCVar * cv = 0xffffffff, struct _MDLock * lock = 0x00000000, unsigned int timeout = 0)+0x8b [e:\builds\moz2_slave\win32_build\build\nsprpub\pr\src\md\windows\w95cv.c @ 282] 022ffea8 004f5d22 nspr4!_PR_WaitCondVar(struct PRThread * thread = 0x100f9487, struct PRCondVar * cvar = 0x0083d6c0, struct PRLock * lock = 0x10a992e8, unsigned int timeout = 0x22fff28)+0x59 [e:\builds\moz2_slave\win32_build\build\nsprpub\pr\src\threads\combined\prucv.c @ 205] 022ffec0 100c860b nspr4!PR_WaitCondVar(struct PRCondVar * cvar = 0x100f9487, unsigned int timeout = 0x83d6c0)+0x22 [e:\builds\moz2_slave\win32_build\build\nsprpub\pr\src\threads\combined\prucv.c @ 547] 022ffeec 100f9487 xul!TimerThread::Run(void)+0x9b [e:\builds\moz2_slave\win32_build\build\xpcom\threads\timerthread.cpp @ 344] 022fff14 1005814a xul!nsThread::ProcessNextEvent(int mayWait = <Memory access error>, int * result = <Memory access error>)+0x247 [e:\builds\moz2_slave\win32_build\build\xpcom\threads\nsthread.cpp @ 533] 00000000 00000000 xul!NS_ProcessNextEvent_P(class nsIThread * thread = <Memory access error>, int mayWait = <Memory access error>)+0x1b [e:\builds\moz2_slave\win32_build\build\obj-firefox\xpcom\build\nsthreadutils.cpp @ 250] 10 Id: 1aa8.1ad8 Suspend: 1 Teb: 7ffd4000 Unfrozen ChildEBP RetAddr 027ffdd4 7c90df5a ntdll!KiFastSystemCallRet 027ffdd8 7c8025cb ntdll!ZwWaitForSingleObject+0xc 027ffe3c 7c802532 kernel32!WaitForSingleObjectEx+0xa8 027ffe50 004f9cbb kernel32!WaitForSingleObject+0x12 027ffe6c 004f5c29 nspr4!_PR_MD_WAIT_CV(struct _MDCVar * cv = 0xffffffff, struct _MDLock * lock = 0x00000000, unsigned int timeout = 0)+0x8b [e:\builds\moz2_slave\win32_build\build\nsprpub\pr\src\md\windows\w95cv.c @ 282] 027ffe84 004f5a13 nspr4!_PR_WaitCondVar(struct PRThread * thread = 0x100f9487, struct PRCondVar * cvar = 0x025d7a84, struct PRLock * lock = 0x10a992e8, unsigned int timeout = 0x27fff28)+0x59 [e:\builds\moz2_slave\win32_build\build\nsprpub\pr\src\threads\combined\prucv.c @ 205] 027ffea0 1008445c nspr4!PR_Wait(struct PRMonitor * mon = 0x100f9487, unsigned int ticks = 0x25d7a84)+0x33 [e:\builds\moz2_slave\win32_build\build\nsprpub\pr\src\threads\prmon.c @ 184] 027ffeec 100f9487 xul!nsThreadPool::Run(void)+0x13c [e:\builds\moz2_slave\win32_build\build\xpcom\threads\nsthreadpool.cpp @ 211] 027fff14 1005814a xul!nsThread::ProcessNextEvent(int mayWait = <Memory access error>, int * result = <Memory access error>)+0x247 [e:\builds\moz2_slave\win32_build\build\xpcom\threads\nsthread.cpp @ 533] 00000000 00000000 xul!NS_ProcessNextEvent_P(class nsIThread * thread = <Memory access error>, int mayWait = <Memory access error>)+0x1b [e:\builds\moz2_slave\win32_build\build\obj-firefox\xpcom\build\nsthreadutils.cpp @ 250] 11 Id: 1aa8.2180 Suspend: 1 Teb: 7ffaf000 Unfrozen ChildEBP RetAddr 02b7fe18 7c90daaa ntdll!KiFastSystemCallRet 02b7fe1c 77e76713 ntdll!NtReplyWaitReceivePortEx+0xc 02b7ff80 77e76c2b RPCRT4!LRPC_ADDRESS::ReceiveLotsaCalls+0xf4 02b7ff88 77e76a4d RPCRT4!RecvLotsaCallsWrapper+0xd 02b7ffa8 77e76c13 RPCRT4!BaseCachedThreadRoutine+0x79 02b7ffb4 7c80b699 RPCRT4!ThreadStartRoutine+0x1a 02b7ffec 00000000 kernel32!BaseThreadStart+0x37 12 Id: 1aa8.2178 Suspend: 1 Teb: 7ffae000 Unfrozen ChildEBP RetAddr 02c7ff1c 7c90d21a ntdll!KiFastSystemCallRet 02c7ff20 7c8023ed ntdll!NtDelayExecution+0xc 02c7ff78 7c802451 kernel32!SleepEx+0x61 02c7ff88 774fe31d kernel32!Sleep+0xf 02c7ff94 774fe3dc ole32!CROIDTable::WorkerThreadLoop+0x14 02c7ffa8 774fe444 ole32!CRpcThread::WorkerLoop+0x1e 02c7ffb4 7c80b699 ole32!CRpcThreadCache::RpcWorkerThreadEntry+0x1b 02c7ffec 00000000 kernel32!BaseThreadStart+0x37 13 Id: 1aa8.42c Suspend: 1 Teb: 7ffad000 Unfrozen ChildEBP RetAddr 032ffe1c 7c90df5a ntdll!KiFastSystemCallRet 032ffe20 7c8025cb ntdll!ZwWaitForSingleObject+0xc 032ffe84 7c802532 kernel32!WaitForSingleObjectEx+0xa8 032ffe98 004f9cbb kernel32!WaitForSingleObject+0x12 032ffeb4 004f5c29 nspr4!_PR_MD_WAIT_CV(struct _MDCVar * cv = 0xffffffff, struct _MDLock * lock = 0x00000000, unsigned int timeout = 0)+0x8b [e:\builds\moz2_slave\win32_build\build\nsprpub\pr\src\md\windows\w95cv.c @ 282] 032ffecc 004f5a13 nspr4!_PR_WaitCondVar(struct PRThread * thread = <Memory access error>, struct PRCondVar * cvar = <Memory access error>, struct PRLock * lock = <Memory access error>, unsigned int timeout = <Memory access error>)+0x59 [e:\builds\moz2_slave\win32_build\build\nsprpub\pr\src\threads\combined\prucv.c @ 205] 032ffee8 100f9663 nspr4!PR_Wait(struct PRMonitor * mon = <Memory access error>, unsigned int ticks = <Memory access error>)+0x33 [e:\builds\moz2_slave\win32_build\build\nsprpub\pr\src\threads\prmon.c @ 184] 032fff14 1005814a xul!nsThread::ProcessNextEvent(int mayWait = <Memory access error>, int * result = <Memory access error>)+0x423 [e:\builds\moz2_slave\win32_build\build\xpcom\threads\nsthread.cpp @ 521] 00000000 00000000 xul!NS_ProcessNextEvent_P(class nsIThread * thread = <Memory access error>, int mayWait = <Memory access error>)+0x1b [e:\builds\moz2_slave\win32_build\build\obj-firefox\xpcom\build\nsthreadutils.cpp @ 250] 0:000> |* !analyze -v -f ******************************************************************************* * * * Exception Analysis * * * ******************************************************************************* *** WARNING: Unable to verify checksum for C:\Program Files\Portrait Displays\Pivot Software\winphook.dll *** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\Program Files\Portrait Displays\Pivot Software\winphook.dll - *** ERROR: Module load completed but symbols could not be loaded for C:\WINDOWS\system32\xpsp2res.dll *** WARNING: Unable to verify checksum for C:\WINDOWS\system32\SynTPFcs.dll *** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\SynTPFcs.dll - ************************************************************************* *** *** *** *** *** Your debugger is not using the correct symbols *** *** *** *** In order for this command to work properly, your symbol path *** *** must point to .pdb files that have full type information. *** *** *** *** Certain .pdb files (such as the public OS symbols) do not *** *** contain the required information. Contact the group that *** *** provided you with these symbols if you need this command to *** *** work. *** *** *** *** Type referenced: kernel32!pNlsUserInfo *** *** *** ************************************************************************* ************************************************************************* *** *** *** *** *** Your debugger is not using the correct symbols *** *** *** *** In order for this command to work properly, your symbol path *** *** must point to .pdb files that have full type information. *** *** *** *** Certain .pdb files (such as the public OS symbols) do not *** *** contain the required information. Contact the group that *** *** provided you with these symbols if you need this command to *** *** work. *** *** *** *** Type referenced: kernel32!pNlsUserInfo *** *** *** ************************************************************************* FAULTING_IP: MOZCRT19!TrailUpVec+6c [F:\SP\vctools\crt_bld\SELF_X86\crt\src\intel\memcpy.asm @ 407] 781477a0 f3a5 rep movs dword ptr es:[edi],dword ptr [esi] EXCEPTION_RECORD: ffffffff -- (.exr 0xffffffffffffffff) ExceptionAddress: 781477a0 (MOZCRT19!TrailUpVec+0x0000006c) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 00000000 Parameter[1]: 03dffffc Attempt to read from address 03dffffc FAULTING_THREAD: 000016ac DEFAULT_BUCKET_ID: STRING_DEREFERENCE PROCESS_NAME: firefox.exe ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s". EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s". EXCEPTION_PARAMETER1: 00000000 EXCEPTION_PARAMETER2: 03dffffc READ_ADDRESS: 03dffffc FOLLOWUP_IP: MOZCRT19!TrailUpVec+6c [F:\SP\vctools\crt_bld\SELF_X86\crt\src\intel\memcpy.asm @ 407] 781477a0 f3a5 rep movs dword ptr es:[edi],dword ptr [esi] NTGLOBALFLAG: 70 APPLICATION_VERIFIER_FLAGS: 0 PRIMARY_PROBLEM_CLASS: STRING_DEREFERENCE BUGCHECK_STR: APPLICATION_FAULT_STRING_DEREFERENCE_INVALID_POINTER_READ LAST_CONTROL_TRANSFER: from 100fec74 to 781477a0 STACK_TEXT: 0013f690 100fec74 03e00008 037858c0 06a8ef40 MOZCRT19!TrailUpVec+0x6c [F:\SP\vctools\crt_bld\SELF_X86\crt\src\intel\memcpy.asm @ 407] 0013f6c8 100f1deb 00000005 021b8920 00000000 xul!nsAString_internal::Assign+0xb4 [e:\builds\moz2_slave\win32_build\build\xpcom\string\src\nstsubstring.cpp @ 362] 0013f6d8 10368ed7 69fe321f 021b8920 00000000 xul!nsAString_internal::Assign+0x1b [e:\builds\moz2_slave\win32_build\build\xpcom\string\src\nstsubstring.cpp @ 422] 0013f708 016206e6 00000000 021b8920 021b87d0 xul!nsWindow::SetTitle+0x1a2180 WARNING: Stack unwind information not available. Following frames may be wrong. 0013f740 1008b29f 037858c0 0300e120 0013f7b4 svrltmgr!DllCanUnloadNow+0x145ba 0013f914 1003d57a 021b87d0 037858c0 038630e0 xul!nsDocShell::SetupNewViewer+0x40f [e:\builds\moz2_slave\win32_build\build\docshell\base\nsdocshell.cpp @ 7298] 0013f92c 100927e5 021b8888 037858c0 10965a66 xul!nsDocShell::Embed+0x1d [e:\builds\moz2_slave\win32_build\build\docshell\base\nsdocshell.cpp @ 5472] 0013f968 101ab57a 021b87d0 024e19e8 038630e0 xul!nsDocShell::CreateContentViewer+0x1a5 [e:\builds\moz2_slave\win32_build\build\docshell\base\nsdocshell.cpp @ 7084] 0013f998 1005dc5b 00391000 024e19e8 00000000 xul!nsDSURIContentListener::DoContent+0x71 [e:\builds\moz2_slave\win32_build\build\docshell\base\nsdsuricontentlistener.cpp @ 139] 0013f9f0 1007076c 038fa628 038630e0 038630e0 xul!nsDocumentOpenInfo::TryContentListener+0xe8 [e:\builds\moz2_slave\win32_build\build\uriloader\base\nsuriloader.cpp @ 738] 0013fbd0 1005450f 038630e0 80000000 038630e0 xul!nsDocumentOpenInfo::DispatchContent+0x1bc [e:\builds\moz2_slave\win32_build\build\uriloader\base\nsuriloader.cpp @ 434] 0013fbf0 10035613 038fa610 00000000 00000000 xul!nsDocumentOpenInfo::OnStartRequest+0x90 [e:\builds\moz2_slave\win32_build\build\uriloader\base\nsuriloader.cpp @ 280] 0013fc04 101a56ed 038630e8 038ff740 00000000 xul!nsJARChannel::OnStartRequest+0x1b [e:\builds\moz2_slave\win32_build\build\modules\libjar\nsjarchannel.cpp @ 867] 0013fc1c 101a07e5 0081e760 0313a490 0081d410 xul!nsInputStreamPump::OnStateStart+0x35 [e:\builds\moz2_slave\win32_build\build\netwerk\base\src\nsinputstreampump.cpp @ 443] 0013fc30 1008f561 038ff744 035908e8 0081e740 xul!nsInputStreamPump::OnInputStreamReady+0x56 [e:\builds\moz2_slave\win32_build\build\netwerk\base\src\nsinputstreampump.cpp @ 395] 0013fc40 100f9487 0313a480 008ce3c0 0013ff34 xul!nsInputStreamReadyEvent::Run+0x1d [e:\builds\moz2_slave\win32_build\build\xpcom\io\nsstreamutils.cpp @ 192] 0013fc68 100c592a 0313a480 00000001 0013fc88 xul!nsThread::ProcessNextEvent+0x247 [e:\builds\moz2_slave\win32_build\build\xpcom\threads\nsthread.cpp @ 533] 0013fc80 1022bd73 00000001 004ebdd0 1002f83c xul!nsBaseAppShell::Run+0x4a [e:\builds\moz2_slave\win32_build\build\widget\src\xpwidgets\nsbaseappshell.cpp @ 169] 0013fc8c 1002f83c 008c9550 0081f090 00000001 xul!nsAppStartup::Run+0x1e [e:\builds\moz2_slave\win32_build\build\toolkit\components\startup\src\nsappstartup.cpp @ 183] 0013fc94 0081f090 00000001 0081f098 00833010 xul!XRE_main+0xe1b [e:\builds\moz2_slave\win32_build\build\toolkit\xre\nsapprunner.cpp @ 3507] 0013fc98 00000000 0081f098 00833010 00000000 0x81f090 SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: MOZCRT19!TrailUpVec+6c FOLLOWUP_NAME: MachineOwner MODULE_NAME: MOZCRT19 IMAGE_NAME: MOZCRT19.dll DEBUG_FLR_IMAGE_TIMESTAMP: 4b50df3e STACK_COMMAND: ~0s ; kb FAILURE_BUCKET_ID: STRING_DEREFERENCE_c0000005_MOZCRT19.dll!TrailUpVec BUCKET_ID: APPLICATION_FAULT_STRING_DEREFERENCE_INVALID_POINTER_READ_MOZCRT19!TrailUpVec+6c WATSON_STAGEONE_URL: http://watson.microsoft.com/StageOne/firefox_exe/1_9_2_3667/4b5102f0/MOZCRT19_dll/8_0_0_0/4b50df3e/c0000005/000177a0.htm?Retriage=1 Followup: MachineOwner --------- 0:000> |* lm start end module name 00280000 002f3000 sqlite3 (private pdb symbols) c:\symbols\sqlite3.pdb\6F74FD39CF1044ABA2C446D0B30A60B51\sqlite3.pdb 00300000 003fa000 js3250 (private pdb symbols) c:\symbols\js3250.pdb\6BF65EDB9FA747E680672D6C2FE8D2202\js3250.pdb 00400000 004e0000 firefox (private pdb symbols) c:\symbols\firefox.pdb\ED3EBF63531640798D9AE98B04A4FD0F2\firefox.pdb 004e0000 00509000 nspr4 (private pdb symbols) c:\symbols\nspr4.pdb\E33668709C08413AA86C08F91C7C4B8F1\nspr4.pdb 00510000 00528000 smime3 (private pdb symbols) c:\symbols\smime3.pdb\68F3D6650D5647E58E78389A97BC6D8D1\smime3.pdb 00530000 005cb000 nss3 (private pdb symbols) c:\symbols\nss3.pdb\AE56D56A749045B398FD0C34A620829E1\nss3.pdb 005d0000 005e4000 nssutil3 (private pdb symbols) c:\symbols\nssutil3.pdb\DB61F2CA17B543F0A8B0AABB61C15B6C1\nssutil3.pdb 005f0000 005f7000 plc4 (private pdb symbols) c:\symbols\plc4.pdb\8294795A98C843D1B1187D0FCFDEA74F1\plc4.pdb 00600000 00607000 plds4 (private pdb symbols) c:\symbols\plds4.pdb\99862C49C35B4D8FB9D03CE9CB7139751\plds4.pdb 00610000 00630000 ssl3 (private pdb symbols) c:\symbols\ssl3.pdb\17E19D09DB45474DAAB33AECC65565431\ssl3.pdb 00630000 00637000 xpcom (private pdb symbols) c:\symbols\xpcom.pdb\4BE824E5CCF9420E99DD5ADA4C3DCAD52\xpcom.pdb 01520000 01683000 svrltmgr C (export symbols) C:\WINDOWS\system32\svrltmgr.dll 01900000 01908000 browserdirprovider (private pdb symbols) c:\symbols\browserdirprovider.pdb\0F7C390038694BE8BD3462D082F0AC242\browserdirprovider.pdb 01d60000 01d84000 brwsrcmp (private pdb symbols) c:\symbols\brwsrcmp.pdb\B808CE621B344B98A4147F2E8A8A5B1D2\brwsrcmp.pdb 01da0000 01dde000 winphook C (export symbols) C:\Program Files\Portrait Displays\Pivot Software\winphook.dll 10000000 10b2f000 xul (private pdb symbols) c:\symbols\xul.pdb\4381CFB3FC4A4A8D92FDFE30FCCEA6352\xul.pdb 20000000 202c5000 xpsp2res (no symbols) 59a60000 59b01000 dbghelp (pdb symbols) c:\symbols\dbghelp.pdb\39559573E21B46F28E286923BE9E6A761\dbghelp.pdb 5ad70000 5ada8000 uxtheme (pdb symbols) c:\symbols\uxtheme.pdb\B982B8FE390B4359AD3CCECC16C0D59F2\uxtheme.pdb 63000000 63014000 SynTPFcs C (export symbols) C:\WINDOWS\system32\SynTPFcs.dll 662b0000 66308000 hnetcfg (pdb symbols) c:\symbols\HNetCfg.pdb\F662D314F374499784BC0592B8DB8BEF1\HNetCfg.pdb 71a50000 71a8f000 mswsock (pdb symbols) c:\symbols\mswsock.pdb\A4498D6206924821886386DFC229EBFD2\mswsock.pdb 71a90000 71a98000 wshtcpip (pdb symbols) c:\symbols\wshtcpip.pdb\DE010D61873545F49D43D91367E871DC2\wshtcpip.pdb 71aa0000 71aa8000 WS2HELP (pdb symbols) c:\symbols\ws2help.pdb\537CE830EFE94FE3A92C95153BDB71462\ws2help.pdb 71ab0000 71ac7000 WS2_32 (pdb symbols) c:\symbols\ws2_32.pdb\07AC08831007408D919E0CCF1EA499BF2\ws2_32.pdb 71ad0000 71ad9000 WSOCK32 (pdb symbols) c:\symbols\wsock32.pdb\E7B6C17E43604822813D3B65499B6C0F2\wsock32.pdb 71b20000 71b32000 MPR (pdb symbols) c:\symbols\mpr.pdb\637FC2DC1D0A490799B088562BF4F29A2\mpr.pdb 71bf0000 71c03000 SAMLIB (pdb symbols) c:\symbols\samlib.pdb\F9B2D6E42DB945738810D62273B3B9532\samlib.pdb 73000000 73026000 WINSPOOL (pdb symbols) c:\symbols\winspool.pdb\97A6ECC94EA7450CA7D375BD9DFFCA5E2\winspool.pdb 73b30000 73b45000 mscms (pdb symbols) c:\symbols\mscms.pdb\F3F067B1758C4D6A87D1B65EA72CD4552\mscms.pdb 73ce0000 73d01000 t2embed (pdb symbols) c:\symbols\t2embed.pdb\9BE96616291243738EC72E445919E3461\t2embed.pdb 73dc0000 73dc3000 LZ32 (pdb symbols) c:\symbols\lz32.pdb\3B7D84BD1\lz32.pdb 74720000 7476b000 MSCTF (pdb symbols) c:\symbols\msctf.pdb\CC9DF849A66C4661BFB9BC1F296CE5ED2\msctf.pdb 74c80000 74cac000 OLEACC (pdb symbols) c:\symbols\oleacc.pdb\3B7DE0CF2\oleacc.pdb 74d90000 74dfb000 USP10 (pdb symbols) c:\symbols\usp10.pdb\14C8D7F8AB3C48A4B95A73BAC9A6B02C1\usp10.pdb 751d0000 751ee000 wshbth (pdb symbols) c:\symbols\wshbth.pdb\3D402521759C46F69DFC411B4851B7D61\wshbth.pdb 755c0000 755ee000 msctfime (pdb symbols) c:\symbols\msctfime.pdb\ECE04C0393764AD0B3E9658C0D8BA88D1\msctfime.pdb 76080000 760e5000 MSVCP60 (pdb symbols) c:\symbols\msvcp60.pdb\05634FA32C174AF59217BF843193D0A42\msvcp60.pdb 76380000 76385000 MSIMG32 (pdb symbols) c:\symbols\msimg32.pdb\E28D4258D66B428EB5D74279EB57A08F2\msimg32.pdb 76390000 763ad000 IMM32 (pdb symbols) c:\symbols\imm32.pdb\2C17A49C251B4C8EB9E2AD13D7D9EA162\imm32.pdb 763b0000 763f9000 COMDLG32 (pdb symbols) c:\symbols\comdlg32.pdb\4FCBEAD63D7345998C1F92D8DBB0DC272\comdlg32.pdb 76b40000 76b6d000 WINMM (pdb symbols) c:\symbols\winmm.pdb\4FC9F179964745CAA3C78D6FADFC28322\winmm.pdb 76bf0000 76bfb000 PSAPI (pdb symbols) c:\symbols\psapi.pdb\A5C3A1F9689F43D8AD228A09293889702\psapi.pdb 76d60000 76d79000 iphlpapi (pdb symbols) c:\symbols\iphlpapi.pdb\75633416EBA947AA8A004B4DFD57AC7B2\iphlpapi.pdb 76f20000 76f47000 DNSAPI (pdb symbols) c:\symbols\dnsapi.pdb\63ED7C27F10F4CB49AA200F064C9E1762\dnsapi.pdb 76f60000 76f8c000 WLDAP32 (pdb symbols) c:\symbols\wldap32.pdb\025E111A192144B0A76E5D156BA8A6A52\wldap32.pdb 76fb0000 76fb8000 winrnr (pdb symbols) c:\symbols\winrnr.pdb\A5953730A3504120BCEB95B11D0D3B972\winrnr.pdb 76fd0000 7704f000 CLBCATQ (pdb symbols) c:\symbols\clbcatq.pdb\58D394694EFA45DE961F5C692B3211BC2\clbcatq.pdb 77050000 77115000 COMRes (pdb symbols) c:\symbols\COMRes.pdb\D81244C41029461FAABC731CFDDF0AE08\COMRes.pdb 77120000 771ab000 OLEAUT32 (pdb symbols) c:\symbols\oleaut32.pdb\659B514A88A24FB6ADB4F29A9BB066E42\oleaut32.pdb 773d0000 774d3000 COMCTL32 (pdb symbols) c:\symbols\MicrosoftWindowsCommon-Controls-6.0.2600.2982-comctl32.pdb\C0A72EE9578847AAB7770CF02FFED0941\MicrosoftWindowsCommon-Controls-6.0.2600.2982-comctl32.pdb 774e0000 7761d000 ole32 (pdb symbols) c:\symbols\ole32.pdb\683B65B246F4418796D2EE6D4C55EB112\ole32.pdb 77690000 776b1000 NTMARTA (pdb symbols) c:\symbols\ntmarta.pdb\A2640002C8D24BB5A3293B95A9708F072\ntmarta.pdb 77920000 77a13000 SETUPAPI (pdb symbols) c:\symbols\setupapi.pdb\B088BF8A977643268B32931FF2715FAB2\setupapi.pdb 77b40000 77b62000 apphelp (pdb symbols) c:\symbols\apphelp.pdb\0370CEDB12904493A902B6993666835C2\apphelp.pdb 77c00000 77c08000 VERSION (pdb symbols) c:\symbols\version.pdb\180A90C40384463E82DDC45B2C8AB76E2\version.pdb 77c10000 77c68000 msvcrt (pdb symbols) c:\symbols\msvcrt.pdb\A678F3C30DED426B839032B996987E381\msvcrt.pdb 77dd0000 77e6b000 ADVAPI32 (pdb symbols) c:\symbols\advapi32.pdb\153E2CE004564DA39D338E2AF40947A82\advapi32.pdb 77e70000 77f02000 RPCRT4 (pdb symbols) c:\symbols\rpcrt4.pdb\712BCFE9A92941E19F433CEF1BA972C82\rpcrt4.pdb 77f10000 77f58000 GDI32 (pdb symbols) c:\symbols\gdi32.pdb\39A70B1CB0294D2CAAE3582449420D622\gdi32.pdb 77f60000 77fd6000 SHLWAPI (pdb symbols) c:\symbols\shlwapi.pdb\858772C19EB14201A80F9B61D5DB69B12\shlwapi.pdb 77fe0000 77ff1000 Secur32 (pdb symbols) c:\symbols\secur32.pdb\3885BDC7EBF54106A5642E3CD45F60FE2\secur32.pdb 78130000 781e0000 MOZCRT19 (private pdb symbols) c:\symbols\MOZCRT19.pdb\0C16779262344F49BC07B2530B994EA71\MOZCRT19.pdb 7c800000 7c8f5000 kernel32 (pdb symbols) c:\symbols\kernel32.pdb\35CC603450F44929AEB29742698380BC2\kernel32.pdb 7c900000 7c9b2000 ntdll (pdb symbols) c:\symbols\ntdll.pdb\562E2BF3593E46DB8A5D3F50A5E025E92\ntdll.pdb 7c9c0000 7d1d7000 SHELL32 (pdb symbols) c:\symbols\shell32.pdb\64CF10584B774D71BBD708BE7D8A05602\shell32.pdb 7e410000 7e4a1000 USER32 (pdb symbols) c:\symbols\user32.pdb\F049F32D0C8948C0B48F7A065FC5C1B12\user32.pdb Unloaded modules: 5cb70000 5cb96000 ShimEng.dll Reproducible: Always Steps to Reproduce: 1.Launch Firefox 2.Crashes with crash report screen. Even in safe mode. 3. Windows XP SP3 McAfee but on access scanning is disabled
Please don't stick the stacktrace in the bug comments. it makes the bug hard to read. use an attachment from now on.
Keywords: crash
Version: unspecified → 3.6 Branch
Channeling timeless, who is currently stuck in a fight with bugzilla: http://www.threatexpert.com/report.aspx?md5=7afe5fab3905b8c7ffbe5ec272db06aa You have a bot problem. Please take your computer to the cleaners. http://support.mozilla.com can probably help. http://www.google.com/search?q=svrltmgr&ie=utf-8&oe=utf-8&aq=t&rls=org.mozilla:en-US:unofficial&client=firefox-a # svrltmgr.dll | ThreatExpert statistics Across all ThreatExpert reports, the file "svrltmgr.dll" has always been ... The file "svrltmgr.dll" is known to be created under the following filename: ... www.threatexpert.com/files/svrltmgr.dll.html - Cached - Similar - # ThreatExpert Report: Backdoor.Win32.Ulrbot, Backdoor.Ulrbot ... 10 Dec 2008 ... 5, %System%\svrltmgr.dll, 1302528 bytes ... (Default) = "%System%\svrltmgr.dll"; ThreadingModel = "Apartment" ... www.threatexpert.com/report.aspx?md5... - Cached - Similar -
Summary: Firefox 3.6 Crash on Startup - Safe Mode doesn't work either → [Backdoor.Ulrbot] Firefox 3.6 Crash on Startup - Safe Mode doesn't work either
Marien, svrltmgr.dll is part of the spectorsoft application which our company uses to monitor employees computer usage: Here is mentions the file specifically as part of spector: http://www.spectorsoft.com/products/Spector360_Windows/help/v62/deployment/Antivirus_Client_Install.htm Thanks to all for their thoughts so far.
UPDATE Marien, Although the svrltmgr.dll is a legitimate dll for the spector software our company uses I thought you were on to something. So, I renamed it to zz_svrltgr.dll_thisbreaksfirefox and firefox then worked!!! Thanks a million Marien. I've fought with this stupid .dll for several months. For some reason firefox 3.1.x worked but 3.5.x and 3.6 didn't work with this crazy dll.
Please note Spector has been known to cause crashes starting with Firefox 3. See bug 434403, especially bug 434403 comment 116 and the nearby comments from Boris Zbarsky. Spector seems to be accessing Firefox internals in a way that is going to break (requiring a Spector update) on most significant Firefox upgrades. This is not something that can be fixed on the Firefox side. In fact with SetupNewViewer and Spector mentioned in both bug reports I'm going to go ahead and mark this a duplicate.
Status: UNCONFIRMED → RESOLVED
Closed: 16 years ago
Resolution: --- → DUPLICATE
Status: RESOLVED → VERIFIED
You need to log in before you can comment on or make changes to this bug.