Jump to content

core dumped. Can you please help analyse the cause?


Recommended Posts

Hi all,

My server application dumped core. I have pasted drwatson.log. at the end of this mail.

As i am not able analyse further, Can you please shed some light on this?

I assume the problem may be with the following lines of code:

twait.tv_sec = 0;

twait.tv_usec = THIRTY_MILLISECONDS;

pollfds2_count = select (0, readfds, writefds,

exceptfds, &twait);

In one forum people said there will be problem in windows2003 server in which select will imediately return even timeval is non-zero(Like in our code THIRTY_MILLISECONDS. Is it true? They also recomended to use sleep() or usleep(). Can you please give your views?

drwatson.log:

----------------

Application exception occurred:

App: R:\usr\sbin\lde\lde.exe (pid=1728)

When: 1/17/2009 @ 07:05:04.482

Exception number: c0000024

()

*----> System Information <----*

Computer Name: ETWK-PVLDEV02

User Name: SYSTEM

Terminal Session Id: 0

Number of Processors: 2

Processor Type: x86 Family 6 Model 23 Stepping 8

Windows Version: 5.2

Current Build: 3790

Service Pack: 2

Current Type: Multiprocessor Free

Registered Organization:

Registered Owner: Raytheon IDS

*----> Task List <----*

0 System Process

4 System

440 smss.exe

488 csrss.exe

512 winlogon.exe

560 services.exe

572 lsass.exe

728 vmacthlp.exe

768 svchost.exe

832 svchost.exe

900 svchost.exe

916 svchost.exe

956 svchost.exe

1012 ccSetMgr.exe

1044 ccEvtMgr.exe

1152 SPBBCSvc.exe

1316 spoolsv.exe

1344 msdtc.exe

1452 MHAdminServerMgr.exe

1472 MHMapDriveServerMgr.exe

1512 MHServerMgr.exe

1544 bbnt.exe

1564 DefWatch.exe

1616 EPAService.exe

1648 EPMService.exe

1692 epm.exe

1708 javaw.exe

1728 lde.exe

1736 svchost.exe

1768 gservice.exe

1808 nsrexecd.exe

1840 nsrpm.exe

1868 svchost.exe

1880 SavRoam.exe

1976 snmp.exe

1988 Rtvscan.exe

2064 VMwareService.exe

2376 dllhost.exe

2568 wmiprvse.exe

2772 svchost.exe

3392 wmiprvse.exe

3852 logon.scr

1660 drwtsn32.exe

*----> Module List <----*

0000000000320000 - 00000000003ae000: C:\WINDOWS\system32\liblm3.2.dll

00000000003b0000 - 00000000003be000: C:\WINDOWS\system32\libccm.dll

0000000000400000 - 0000000000579000: R:\usr\sbin\lde\lde.exe

0000000010000000 - 0000000010026000: C:\WINDOWS\system32\LIBSSL3.dll

000000005f270000 - 000000005f2ca000: C:\WINDOWS\system32\hnetcfg.dll

000000006ff00000 - 000000006ff07000: C:\WINDOWS\system32\MHServLib.dll

0000000071ae0000 - 0000000071ae8000: C:\WINDOWS\System32\wshtcpip.dll

0000000071b20000 - 0000000071b61000: C:\WINDOWS\System32\mswsock.dll

0000000071bb0000 - 0000000071bb9000: C:\WINDOWS\system32\WSOCK32.dll

0000000071bf0000 - 0000000071bf8000: C:\WINDOWS\system32\WS2HELP.dll

0000000071c00000 - 0000000071c17000: C:\WINDOWS\system32\WS2_32.dll

0000000071c40000 - 0000000071c97000: C:\WINDOWS\system32\NETAPI32.dll

0000000076ed0000 - 0000000076efa000: C:\WINDOWS\system32\DNSAPI.dll

0000000076f10000 - 0000000076f3e000: C:\WINDOWS\system32\WLDAP32.dll

0000000076f50000 - 0000000076f63000: C:\WINDOWS\system32\Secur32.dll

0000000076f70000 - 0000000076f77000: C:\WINDOWS\System32\winrnr.dll

0000000076f80000 - 0000000076f85000: C:\WINDOWS\system32\rasadhlp.dll

0000000077380000 - 0000000077411000: C:\WINDOWS\system32\USER32.dll

0000000077b90000 - 0000000077b98000: C:\WINDOWS\system32\VERSION.dll

0000000077ba0000 - 0000000077bfa000: C:\WINDOWS\system32\MSVCRT.dll

0000000077c00000 - 0000000077c49000: C:\WINDOWS\system32\GDI32.dll

0000000077c50000 - 0000000077cef000: C:\WINDOWS\system32\RPCRT4.dll

0000000077e40000 - 0000000077f42000: C:\WINDOWS\system32\kernel32.dll

0000000077f50000 - 0000000077feb000: C:\WINDOWS\system32\ADVAPI32.dll

000000007c800000 - 000000007c8c0000: C:\WINDOWS\system32\ntdll.dll

*----> State Dump for Thread Id 0x6c4 <----*

eax=4971c96d ebx=001455e0 ecx=00000000 edx=0056e258 esi=7fffffff edi=ffffffff

eip=7c8285ec esp=0012fb74 ebp=0012fbb0 iopl=0 nv up ei ng nz ac po cy

cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000297

*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\ntdll.dll -

function: ntdll!KiFastSystemCallRet

7c8285ce e82c000000 call ntdll!RtlRaiseException (7c8285ff)

7c8285d3 8b0424 mov eax,[esp]

7c8285d6 8be5 mov esp,ebp

7c8285d8 5d pop ebp

7c8285d9 c3 ret

7c8285da 8da42400000000 lea esp,[esp]

7c8285e1 8da42400000000 lea esp,[esp]

ntdll!KiFastSystemCall:

7c8285e8 8bd4 mov edx,esp

7c8285ea 0f34 sysenter

ntdll!KiFastSystemCallRet:

7c8285ec c3 ret

7c8285ed 8da42400000000 lea esp,[esp]

7c8285f4 8d642400 lea esp,[esp]

ntdll!KiIntSystemCall:

7c8285f8 8d542408 lea edx,[esp+0x8]

7c8285fc cd2e int 2e

7c8285fe c3 ret

ntdll!RtlRaiseException:

7c8285ff 55 push ebp

7c828600 8bec mov ebp,esp

7c828602 8da42430fdffff lea esp,[esp-0x2d0]

*----> Stack Back Trace <----*

*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\System32\mswsock.dll -

*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\WS2_32.dll -

*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\kernel32.dll -

ChildEBP RetAddr Args to Child

WARNING: Stack unwind information not available. Following frames may be wrong.

0012fbb0 71b21a03 00000730 00000a68 01000000 ntdll!KiFastSystemCallRet

0012fca0 71c0283c 00000000 009756e0 009758f0 mswsock+0x1a03

0012fcf0 00402e69 00000000 009756e0 009758f0 WS2_32!select+0xa1

0012ff38 00401605 00000000 00000000 0012ffc0 lde!executeDaemon+0x1409 (FPO: [EBP 0x00000001] [0,136,4])

0012ff4c 004bca7d 00000003 00000000 003c2978 lde!main+0x605 (FPO: [EBP 0x0012ffc0] [3,0,4])

0012ffc0 77e6f23b 00000000 00000000 7ffd5000 lde!mainCRTStartup+0xe3

0012fff0 00000000 004bc99a 00000000 78746341 kernel32!ProcessIdToSessionId+0x209

*----> Raw Stack Dump <----*

000000000012fb74 0b 7d 82 7c f5 1a b2 71 - 30 07 00 00 01 00 00 00 .}.|...q0.......

000000000012fb84 9c fb 12 00 00 00 00 00 - 50 fc 12 00 40 fc 12 00 ........P...@...

000000000012fb94 05 7b f4 d4 9b 78 c9 01 - ff ff ff ff ff ff ff ff .{...x..........

000000000012fba4 e0 55 14 00 5d 9e b3 71 - d6 da c0 71 a0 fc 12 00 .U..]..q...q....

000000000012fbb4 03 1a b2 71 30 07 00 00 - 68 0a 00 00 00 00 00 01 ...q0...h.......

000000000012fbc4 04 00 00 00 00 5b 97 00 - a8 65 7e 00 f0 58 97 00 .....[...e~..X..

000000000012fbd4 e0 55 14 00 00 00 00 00 - 00 00 00 00 00 00 00 00 .U..............

000000000012fbe4 c8 fb 12 00 00 00 00 00 - 00 00 00 00 03 00 00 00 ................

000000000012fbf4 34 00 00 00 d4 fc 12 00 - 00 00 00 00 ff ff ff ff 4...............

000000000012fc04 da 24 b2 71 e0 55 14 00 - ec 0a 00 00 00 00 00 00 .$.q.U..........

000000000012fc14 03 00 00 00 f0 58 97 00 - 74 fc 12 00 00 5b 97 00 .....X..t....[..

000000000012fc24 e0 56 97 00 00 00 00 00 - 40 fc 12 00 c0 7d 97 00 .V......@....}..

000000000012fc34 00 00 00 00 b8 5c 7e 00 - 03 00 00 00 00 e6 8e e7 .....\~.........

000000000012fc44 fd ff ff ff 03 00 00 00 - 00 fc 12 00 68 0a 00 00 ............h...

000000000012fc54 99 00 00 00 78 fc 12 00 - 8c 0a 00 00 99 00 00 00 ....x...........

000000000012fc64 00 20 00 00 98 0a 00 00 - 99 00 00 00 3e 0a 4b 00 . ..........>.K.

000000000012fc74 ec 0a 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

000000000012fc84 a6 f8 00 00 c8 fb 12 00 - 10 15 bf 71 e0 fc 12 00 ...........q....

000000000012fc94 4f 65 b4 71 30 19 b2 71 - ff ff ff ff f0 fc 12 00 Oe.q0..q........

000000000012fca4 3c 28 c0 71 00 00 00 00 - e0 56 97 00 f0 58 97 00 <(.q.....V...X..

*----> State Dump for Thread Id 0x7d8 <----*

eax=71c5104d ebx=00000000 ecx=00000000 edx=00000000 esi=00000000 edi=7c826fbf

eip=7c8285ec esp=00a7ff8c ebp=00a7ffb8 iopl=0 nv up ei pl zr na po nc

cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet

7c8285ce e82c000000 call ntdll!RtlRaiseException (7c8285ff)

7c8285d3 8b0424 mov eax,[esp]

7c8285d6 8be5 mov esp,ebp

7c8285d8 5d pop ebp

7c8285d9 c3 ret

7c8285da 8da42400000000 lea esp,[esp]

7c8285e1 8da42400000000 lea esp,[esp]

ntdll!KiFastSystemCall:

7c8285e8 8bd4 mov edx,esp

7c8285ea 0f34 sysenter

ntdll!KiFastSystemCallRet:

7c8285ec c3 ret

7c8285ed 8da42400000000 lea esp,[esp]

7c8285f4 8d642400 lea esp,[esp]

ntdll!KiIntSystemCall:

7c8285f8 8d542408 lea edx,[esp+0x8]

7c8285fc cd2e int 2e

7c8285fe c3 ret

ntdll!RtlRaiseException:

7c8285ff 55 push ebp

7c828600 8bec mov ebp,esp

7c828602 8da42430fdffff lea esp,[esp-0x2d0]

*----> Stack Back Trace <----*

ChildEBP RetAddr Args to Child

WARNING: Stack unwind information not available. Following frames may be wrong.

00a7ffb8 77e64829 00000000 00000000 00000000 ntdll!KiFastSystemCallRet

00a7ffec 00000000 71c5104d 00000000 00000000 kernel32!GetModuleHandleA+0xdf

*----> Raw Stack Dump <----*

0000000000a7ff8c fb 7c 82 7c c0 10 c5 71 - 02 00 00 00 b0 ff a7 00 .|.|...q........

0000000000a7ff9c 01 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 ................

0000000000a7ffac 00 00 00 00 3c 01 00 00 - 38 01 00 00 ec ff a7 00 ....<...8.......

0000000000a7ffbc 29 48 e6 77 00 00 00 00 - 00 00 00 00 00 00 00 00 )H.w............

0000000000a7ffcc 00 00 00 00 00 00 00 00 - c4 ff a7 00 5d 06 85 80 ............]...

0000000000a7ffdc ff ff ff ff 60 1a e6 77 - 30 48 e6 77 00 00 00 00 ....`..w0H.w....

0000000000a7ffec 00 00 00 00 00 00 00 00 - 4d 10 c5 71 00 00 00 00 ........M..q....

0000000000a7fffc 00 00 00 00 00 00 b1 00 - 50 00 3c 00 00 00 00 00 ........P.<.....

0000000000a8000c 00 00 00 00 00 10 08 00 - 00 10 08 00 00 10 00 00 ................

0000000000a8001c 00 0b 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 ................

0000000000a8002c 00 00 00 00 00 00 00 00 - 00 00 08 00 74 ff 07 00 ............t...

0000000000a8003c 00 00 00 00 88 00 00 00 - 88 00 00 00 00 00 00 00 ................

0000000000a8004c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0000000000a8005c f6 01 d6 01 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0000000000a8006c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0000000000a8007c 44 0d 00 00 44 0d 00 00 - 44 0d 00 00 18 63 7f 8a D...D...D....c..

0000000000a8008c 18 63 7f 8a 18 63 7f 8a - 3f 3d 66 49 3f 3d 66 49 .c...c..?=fI?=fI

0000000000a8009c 3f 3d 66 49 04 00 00 00 - fc 1f 00 00 53 54 44 45 ?=fI........STDE

0000000000a800ac 78 ff 07 00 3f 3d 66 49 - 00 00 00 00 01 00 00 00 x...?=fI........

0000000000a800bc 00 40 00 00 a0 03 00 00 - f0 02 00 00 00 00 00 00 .@..............

*----> State Dump for Thread Id 0x9e4 <----*

eax=00000000 ebx=00000001 ecx=00000000 edx=00000000 esi=00000a74 edi=00000000

eip=7c8285ec esp=016bfecc ebp=016bff3c iopl=0 nv up ei ng nz ac po cy

cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000297

function: ntdll!KiFastSystemCallRet

7c8285ce e82c000000 call ntdll!RtlRaiseException (7c8285ff)

7c8285d3 8b0424 mov eax,[esp]

7c8285d6 8be5 mov esp,ebp

7c8285d8 5d pop ebp

7c8285d9 c3 ret

7c8285da 8da42400000000 lea esp,[esp]

7c8285e1 8da42400000000 lea esp,[esp]

ntdll!KiFastSystemCall:

7c8285e8 8bd4 mov edx,esp

7c8285ea 0f34 sysenter

ntdll!KiFastSystemCallRet:

7c8285ec c3 ret

7c8285ed 8da42400000000 lea esp,[esp]

7c8285f4 8d642400 lea esp,[esp]

ntdll!KiIntSystemCall:

7c8285f8 8d542408 lea edx,[esp+0x8]

7c8285fc cd2e int 2e

7c8285fe c3 ret

ntdll!RtlRaiseException:

7c8285ff 55 push ebp

7c828600 8bec mov ebp,esp

7c828602 8da42430fdffff lea esp,[esp-0x2d0]

*----> Stack Back Trace <----*

*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\MSVCRT.dll -

ChildEBP RetAddr Args to Child

WARNING: Stack unwind information not available. Following frames may be wrong.

016bff3c 77e61c8d 00000a74 0000ea60 00000000 ntdll!KiFastSystemCallRet

016bff50 004b2d13 00000a74 0000ea60 004b2ceb kernel32!WaitForSingleObject+0x12

016bff5c 004b2ceb 00000a74 0000ea60 00404421 lde!tsEventWaitMs+0x23 (FPO: [2,0,0])

016bff68 00404421 00000a74 0000003c 00000000 lde!tsEventWait+0x1b (FPO: [2,0,0])

016bff84 77bcb530 0012fd38 00000000 00000000 lde!call_maintenance+0x71 (FPO: [EBP 0x016bffb8] [1,0,4])

016bffb8 77e64829 008eba68 00000000 00000000 MSVCRT!endthreadex+0xa3

016bffec 00000000 77bcb4bc 008eba68 00000000 kernel32!GetModuleHandleA+0xdf

*----> Raw Stack Dump <----*

00000000016bfecc 0b 7d 82 7c 1e 1d e6 77 - 74 0a 00 00 00 00 00 00 .}.|...wt.......

00000000016bfedc 10 ff 6b 01 a4 be bd 77 - 63 c9 71 49 01 00 00 00 ..k....wc.qI....

00000000016bfeec 24 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 $...............

00000000016bfefc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

00000000016bff0c 00 00 00 00 00 ba 3c dc - ff ff ff ff 00 50 fd 7f ......<......P..

00000000016bff1c 10 ff 6b 01 02 01 00 00 - e0 fe 6b 01 e8 2b 07 89 ..k.......k..+..

00000000016bff2c a8 ff 6b 01 60 1a e6 77 - 48 1d e6 77 00 00 00 00 ..k.`..wH..w....

00000000016bff3c 50 ff 6b 01 8d 1c e6 77 - 74 0a 00 00 60 ea 00 00 P.k....wt...`...

00000000016bff4c 00 00 00 00 9c 0a 00 00 - 13 2d 4b 00 74 0a 00 00 .........-K.t...

00000000016bff5c 60 ea 00 00 eb 2c 4b 00 - 74 0a 00 00 60 ea 00 00 `....,K.t...`...

00000000016bff6c 21 44 40 00 74 0a 00 00 - 3c 00 00 00 00 00 00 00 [email protected]...<.......

00000000016bff7c 98 6d 97 00 b8 ff 6b 01 - 68 ba 8e 00 30 b5 bc 77 .m....k.h...0..w

00000000016bff8c 38 fd 12 00 00 00 00 00 - 00 00 00 00 68 ba 8e 00 8...........h...

00000000016bff9c 01 00 00 00 90 ff 6b 01 - 5e 00 85 80 dc ff 6b 01 ......k.^.....k.

00000000016bffac 74 6c bc 77 48 41 ba 77 - 00 00 00 00 ec ff 6b 01 tl.wHA.w......k.

00000000016bffbc 29 48 e6 77 68 ba 8e 00 - 00 00 00 00 00 00 00 00 )H.wh...........

00000000016bffcc 68 ba 8e 00 00 00 00 00 - c4 ff 6b 01 5d 06 85 80 h.........k.]...

00000000016bffdc ff ff ff ff 60 1a e6 77 - 30 48 e6 77 00 00 00 00 ....`..w0H.w....

00000000016bffec 00 00 00 00 00 00 00 00 - bc b4 bc 77 68 ba 8e 00 ...........wh...

00000000016bfffc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

*----> State Dump for Thread Id 0xe08 <----*

eax=c0000024 ebx=ffffff6f ecx=017bff3c edx=7c8285ec esi=003c40ac edi=003c40a8

eip=7c84af4d esp=017bff4c ebp=017bff4c iopl=0 nv up ei ng nz na po nc

cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000286

function: ntdll!RtlIpv4StringToAddressExW

7c84af33 c3 ret

7c84af34 23ff and edi,edi

7c84af36 ff6a00 jmp fword ptr [edx]

7c84af39 6a00 push 0x0

7c84af3b 56 push esi

7c84af3c 50 push eax

7c84af3d e85dcefdff call ntdll!ZwReleaseKeyedEvent (7c827d9f)

7c84af42 e9c123ffff jmp ntdll!RtlpUnWaitCriticalSection+0x22 (7c83d308)

7c84af47 50 push eax

7c84af48 e825d7fdff call ntdll!RtlRaiseStatus (7c828672)

FAULT ->7c84af4d cc int 3

7c84af4e 3bca cmp ecx,edx

7c84af50 740f jz ntdll!RtlIpv4StringToAddressExW+0x95e3 (7c84af61)

7c84af52 8b0d2084887c mov ecx,[ntdll!NlsMbOemCodePageTag+0xcf8 (7c888420)]

7c84af58 3b4824 cmp ecx,[eax+0x24]

7c84af5b 0f85f523ffff jne ntdll!RtlpUnWaitCriticalSection+0x70 (7c83d356)

7c84af61 5f pop edi

7c84af62 c74604feffffff mov dword ptr [esi+0x4],0xfffffffe

7c84af69 c7460801000000 mov dword ptr [esi+0x8],0x1

7c84af70 89560c mov [esi+0xc],edx

7c84af73 895610 mov [esi+0x10],edx

*----> Stack Back Trace <----*

ChildEBP RetAddr Args to Child

WARNING: Stack unwind information not available. Following frames may be wrong.

017bff4c 7c83d2dc 003c40a8 00977100 00000008 ntdll!RtlIpv4StringToAddressExW+0x95cf

017bff64 004b2c44 003c40a8 00432cc1 003c40a8 ntdll!RtlLockHeap+0x2b7

017bff6c 00432cc1 003c40a8 00000000 00977230 lde!tsCriticalSectionLeave+0x14 (FPO: [1,0,0])

017bff84 77bcb530 00977100 00000000 00000000 lde!start_pool_thread+0x1a1 (FPO: [EBP 0x017bff88] [1,0,4])

017bffb8 77e64829 008eba68 00000000 00000000 MSVCRT!endthreadex+0xa3

017bffec 00000000 77bcb4bc 008eba68 00000000 kernel32!GetModuleHandleA+0xdf

*----> Raw Stack Dump <----*

00000000017bff4c 64 ff 7b 01 dc d2 83 7c - a8 40 3c 00 00 71 97 00 d.{....|.@<..q..

00000000017bff5c 08 00 00 00 92 01 00 00 - 01 00 00 00 44 2c 4b 00 ............D,K.

00000000017bff6c a8 40 3c 00 c1 2c 43 00 - a8 40 3c 00 00 00 00 00 .@<..,C..@<.....

00000000017bff7c 30 72 97 00 b8 ff 7b 01 - 68 ba 8e 00 30 b5 bc 77 0r....{.h...0..w

00000000017bff8c 00 71 97 00 00 00 00 00 - 00 00 00 00 68 ba 8e 00 .q..........h...

00000000017bff9c 24 00 00 c0 90 ff 7b 01 - 3c fb 7b 01 dc ff 7b 01 $.....{.<.{...{.

00000000017bffac 74 6c bc 77 48 41 ba 77 - 00 00 00 00 ec ff 7b 01 tl.wHA.w......{.

00000000017bffbc 29 48 e6 77 68 ba 8e 00 - 00 00 00 00 00 00 00 00 )H.wh...........

00000000017bffcc 68 ba 8e 00 24 00 00 c0 - c4 ff 7b 01 3c fb 7b 01 h...$.....{.<.{.

00000000017bffdc ff ff ff ff 60 1a e6 77 - 30 48 e6 77 00 00 00 00 ....`..w0H.w....

00000000017bffec 00 00 00 00 00 00 00 00 - bc b4 bc 77 68 ba 8e 00 ...........wh...

00000000017bfffc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

00000000017c000c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

00000000017c001c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

00000000017c002c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

00000000017c003c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

00000000017c004c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

00000000017c005c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

00000000017c006c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

00000000017c007c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

Thanks,

Naga

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

 Share

×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue. Privacy Policy