Hattrick Crash
 

News:

29 December 2022 - PtokaX 0.5.3.0 (20th anniversary edition) released...
11 April 2017 - PtokaX 0.5.2.2 released...
8 April 2015 Anti child and anti pedo pr0n scripts are not allowed anymore on this board!
28 September 2015 - PtokaX 0.5.2.1 for Windows 10 IoT released...
3 September 2015 - PtokaX 0.5.2.1 released...
16 August 2015 - PtokaX 0.5.2.0 released...
1 August 2015 - Crowdfunding for ADC protocol support in PtokaX ended. Clearly nobody want ADC support...
30 June 2015 - PtokaX 0.5.1.0 released...
30 April 2015 Crowdfunding for ADC protocol support in PtokaX
26 April 2015 New support hub!
20 February 2015 - PtokaX 0.5.0.3 released...
13 April 2014 - PtokaX 0.5.0.2 released...
23 March 2014 - PtokaX testing version 0.5.0.1 build 454 is available.
04 March 2014 - PtokaX.org sites were temporary down because of DDOS attacks and issues with hosting service provider.

Main Menu

Hattrick Crash

Started by GeceBekcisi, 03 May, 2005, 14:59:06

Previous topic - Next topic

0 Members and 1 Guest are viewing this topic.

GeceBekcisi

---------------------------03.05.2005 14:46:29---------------------------
Exception 'EAccessViolation' in module PtokaX.exe at 000A648D
Access violation at address 004A748D in module 'PtokaX.exe'. Read of address 7A7A5A5A

Call stack:
:004A748D [PtokaX.exe]
:0048A2CF [PtokaX.exe]
:0048A2C1 [PtokaX.exe]
:0048AFC3 [PtokaX.exe]
:004AA004 [PtokaX.exe]
:00450B2E [PtokaX.exe]
:005341F7 [PtokaX.exe]
:0053618E [PtokaX.exe]
:00534176 [PtokaX.exe]
:005341F8 [PtokaX.exe]
:00534048 [PtokaX.exe]
:0053439D [PtokaX.exe]
:00534630 [PtokaX.exe]
:005B18B9 [PtokaX.exe]
:0053407C [PtokaX.exe]
:005B177D [PtokaX.exe]
:0048E106 [PtokaX.exe]
:0048A471 [PtokaX.exe]
:0048A53A [PtokaX.exe]
:0048A99F [PtokaX.exe]
:0048AC44 [PtokaX.exe]
:004AA021 [PtokaX.exe]
:0048A2CF [PtokaX.exe]
:0048A2C1 [PtokaX.exe]
:0048AFC3 [PtokaX.exe]
:004AA004 [PtokaX.exe]
:004AA084 [PtokaX.exe]
:004AA004 [PtokaX.exe]
:0046CDDA [PtokaX.exe]
:0046F345 [PtokaX.exe]
:0045A212 [PtokaX.exe]
:005A6B2F [PtokaX.exe]
:005A2C31 [PtokaX.exe]
:005A2CC9 [PtokaX.exe]
:005F89DD [PtokaX.exe]
:0046FAF4 [PtokaX.exe]
:773AD01A [USER32.dll]
:00408361 [PtokaX.exe]
:00406C6A [PtokaX.exe]
:773ACD1E [USER32.dll]
:4B8D54B5 [MSCTF.dll]
:0057997E [PtokaX.exe]
:00579864 [PtokaX.exe]
:0051BB72 [PtokaX.exe]
:7739C3B7 [USER32.dll]
:7739C484 [USER32.dll]
:7739C43A [USER32.dll]
:7739C73C [USER32.dll]
:0051F257 [PtokaX.exe]
:0051F3EB [PtokaX.exe]
:7738E406 [USER32.dll]
:00576598 [PtokaX.exe]
:005765CF [PtokaX.exe]
:005767EF [PtokaX.exe]
:00576832 [PtokaX.exe]
:00401B44 [PtokaX.exe]
:005BF47B [PtokaX.exe]
:00400000 [PtokaX.exe]
:77E523CD [kernel32.dll]

Main Thread ID = 00000F5C, Current Thread ID = 00000F5C
Registers:
EAX = 7A7A5A5A  CS = 001B  EIP = 004A748D  Flags = 00010246
EBX = 01715E5C  SS = 0023  ESP = 0012F95C    EBP = 0012FB24
ECX = 7A7A7A20  DS = 0023  ESI = 0057996C    FS  = 003B
EDX = 018A04F0  ES = 0023  EDI = 0012FE30    GS  = 0000
Code at CS:EIP
8B 10 89 55 F0 83 45 F4 04 8B 4D 08 F6 41 30 0C 
Stack:
02A5849C FFFFFFFF 0012F9F0 0012F9A0 0048A2CF 
00000000 00000000 77E523CD 00535805 026FED00 
005FE80B 00DE24A4 00000000 00000000 0155786C 
77E523CD FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF 

Additional info:
Application Title : PtokaX DC Hub 0.3.3.0 build 17.03 [debug]
iJoins: 301270, iParts: 300978, iLogged: 289
NicklistLen : 3686
OplistLen   : 174
MyInfosLen  : 0
MyInfosTagLen  : 26050
QueueA Size : 15
QueueA Len : 0
QueueB Size   : 15
QueueB Len   : 0
PQueue Size  : 588
PQueue Len  : 0
HQueueA Size  : 113
HQueueA Len  : 0
HQueueB Size  : 113
HQueueB Len  : 0
OPQueueA Size  : 89
OPQueueA Len  : 0
OPQueueB Size  : 89
OPQueueB Len  : 0
InfoQueue Size  : 425
InfoQueue Len  : 0
OQ-QueueA Size  : 289
OQ-QueueA Len  : 0
OQ-QueueB Size  : 397
OQ-QueueB Len  : 0

---------------------------03.05.2005 14:50:51---------------------------
Exception 'EAccessViolation' in module PtokaX.exe at 0008B41E
Access violation at address 0048C41E in module 'PtokaX.exe'. Read of address 73736552

Call stack:
:0048C41E [PtokaX.exe]
:0048C705 [PtokaX.exe]
:0048C873 [PtokaX.exe]
:004A9984 [PtokaX.exe]
:004A99E1 [PtokaX.exe]
:0046DC14 [PtokaX.exe]
:0046CE93 [PtokaX.exe]
:0046F3A9 [PtokaX.exe]
:004502EA [PtokaX.exe]
:7739C4C8 [USER32.dll]
:7739C498 [USER32.dll]
:7739C43A [USER32.dll]
:7739C4C8 [USER32.dll]
:00450B2E [PtokaX.exe]
:00450CE2 [PtokaX.exe]
:0041D7D9 [PtokaX.exe]
:00583EEE [PtokaX.exe]
:005B080D [PtokaX.exe]
:005B07F7 [PtokaX.exe]
:005842D9 [PtokaX.exe]
:0058434E [PtokaX.exe]
:00582B9C [PtokaX.exe]
:00583D53 [PtokaX.exe]
:0058426B [PtokaX.exe]
:00535AB4 [PtokaX.exe]
:00586CF8 [PtokaX.exe]
:0048AC56 [PtokaX.exe]
:00570392 [PtokaX.exe]
:005127ED [PtokaX.exe]
:005670BD [PtokaX.exe]
:00586973 [PtokaX.exe]
:00535AB4 [PtokaX.exe]
:00583D53 [PtokaX.exe]
:0051BB72 [PtokaX.exe]
:00583B23 [PtokaX.exe]
:00586B8D [PtokaX.exe]
:00586C7B [PtokaX.exe]
:00586973 [PtokaX.exe]
:0051BB72 [PtokaX.exe]
:7739C3B7 [USER32.dll]
:7739C484 [USER32.dll]
:7739C43A [USER32.dll]
:7739C73C [USER32.dll]
:0051F257 [PtokaX.exe]
:0051F3EB [PtokaX.exe]
:7738E406 [USER32.dll]
:00576598 [PtokaX.exe]
:005765CF [PtokaX.exe]
:005767EF [PtokaX.exe]
:00576832 [PtokaX.exe]
:00401B44 [PtokaX.exe]
:005BF47B [PtokaX.exe]
:00400000 [PtokaX.exe]
:77E523CD [kernel32.dll]

Main Thread ID = 00000F5C, Current Thread ID = 00000F5C
Registers:
EAX = 7373654D  CS = 001B  EIP = 0048C41E  Flags = 00010246
EBX = 00DEF4BC  SS = 0023  ESP = 0012F9B4    EBP = 0012F9BC
ECX = 00000000  DS = 0023  ESI = 005B0808    FS  = 003B
EDX = 7373654D  ES = 0023  EDI = 0000000B    GS  = 0000
Code at CS:EIP
8A 4A 05 3B 4D 10 7E 0F 8B 45 FC 80 60 05 FE 8B 
Stack:
00000065 7373654D 0012F9D0 0048C705 019C2CB8 
00000000 00000000 77E523CD 00535805 019E6454 
005FE80B 00DE24A4 00000000 00000000 0155786C 
77E523CD FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF 

Additional info:
Application Title : PtokaX DC Hub 0.3.3.0 build 17.03 [debug]
iJoins: 301318, iParts: 300978, iLogged: 289
NicklistLen : 3616
OplistLen   : 161
MyInfosLen  : 0
MyInfosTagLen  : 25687
QueueA Size : 15
QueueA Len : 0
QueueB Size   : 15
QueueB Len   : 0
PQueue Size  : 588
PQueue Len  : 0
HQueueA Size  : 113
HQueueA Len  : 0
HQueueB Size  : 113
HQueueB Len  : 0
OPQueueA Size  : 89
OPQueueA Len  : 0
OPQueueB Size  : 89
OPQueueB Len  : 0
InfoQueue Size  : 425
InfoQueue Len  : 0
OQ-QueueA Size  : 289
OQ-QueueA Len  : 0
OQ-QueueB Size  : 397
OQ-QueueB Len  : 0

---------------------------03.05.2005 14:50:57---------------------------
Exception 'EAccessViolation' in module PtokaX.exe at 0008B41E
Access violation at address 0048C41E in module 'PtokaX.exe'. Read of address 73736552

Call stack:
:0048C41E [PtokaX.exe]
:0048C705 [PtokaX.exe]
:0048C873 [PtokaX.exe]
:004A9984 [PtokaX.exe]
:004A99E1 [PtokaX.exe]
:0046DC60 [PtokaX.exe]
:0046CE93 [PtokaX.exe]
:0046F3A9 [PtokaX.exe]
:004502EA [PtokaX.exe]
:7739C4C8 [USER32.dll]
:7739C498 [USER32.dll]
:7739C43A [USER32.dll]
:7739C4C8 [USER32.dll]
:00450B2E [PtokaX.exe]
:00450CE2 [PtokaX.exe]
:0041D7D9 [PtokaX.exe]
:00583EEE [PtokaX.exe]
:005B080D [PtokaX.exe]
:005B07F7 [PtokaX.exe]
:005842D9 [PtokaX.exe]
:0058434E [PtokaX.exe]
:00582B9C [PtokaX.exe]
:00583D53 [PtokaX.exe]
:7C822124 [ntdll.dll]
:77E6BAA8 [kernel32.dll]
:77E6BACD [kernel32.dll]
:00586CF8 [PtokaX.exe]
:00586C2A [PtokaX.exe]
:0048AC56 [PtokaX.exe]
:00570392 [PtokaX.exe]
:005127ED [PtokaX.exe]
:005670BD [PtokaX.exe]
:00586973 [PtokaX.exe]
:00535AB4 [PtokaX.exe]
:00583D53 [PtokaX.exe]
:0051BB72 [PtokaX.exe]
:00583B23 [PtokaX.exe]
:00586B8D [PtokaX.exe]
:00586C7B [PtokaX.exe]
:00586973 [PtokaX.exe]
:0051BB72 [PtokaX.exe]
:7739C3B7 [USER32.dll]
:7739C484 [USER32.dll]
:7739C43A [USER32.dll]
:7739C73C [USER32.dll]
:0051F257 [PtokaX.exe]
:0051F3EB [PtokaX.exe]
:7738E406 [USER32.dll]
:00576598 [PtokaX.exe]
:005765CF [PtokaX.exe]
:005767EF [PtokaX.exe]
:00576832 [PtokaX.exe]
:00401B44 [PtokaX.exe]
:005BF47B [PtokaX.exe]
:00400000 [PtokaX.exe]
:77E523CD [kernel32.dll]

Main Thread ID = 00000F5C, Current Thread ID = 00000F5C
Registers:
EAX = 7373654D  CS = 001B  EIP = 0048C41E  Flags = 00010246
EBX = 00DEF4BC  SS = 0023  ESP = 0012F9B4    EBP = 0012F9BC
ECX = 00000000  DS = 0023  ESI = 005B0808    FS  = 003B
EDX = 7373654D  ES = 0023  EDI = 00000007    GS  = 0000
Code at CS:EIP
8A 4A 05 3B 4D 10 7E 0F 8B 45 FC 80 60 05 FE 8B 
Stack:
00000068 7373654D 0012F9D0 0048C705 019C2CB8 
00000000 00000000 77E523CD 00535805 018EE7B4 
005FE80B 00DE24A4 00000000 00000000 0155786C 
77E523CD FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF 

Additional info:
Application Title : PtokaX DC Hub 0.3.3.0 build 17.03 [debug]
iJoins: 301318, iParts: 300978, iLogged: 289
NicklistLen : 3519
OplistLen   : 161
MyInfosLen  : 0
MyInfosTagLen  : 24904
QueueA Size : 15
QueueA Len : 0
QueueB Size   : 15
QueueB Len   : 0
PQueue Size  : 588
PQueue Len  : 0
HQueueA Size  : 113
HQueueA Len  : 0
HQueueB Size  : 113
HQueueB Len  : 0
OPQueueA Size  : 89
OPQueueA Len  : 0
OPQueueB Size  : 89
OPQueueB Len  : 0
InfoQueue Size  : 425
InfoQueue Len  : 0
OQ-QueueA Size  : 289
OQ-QueueA Len  : 0
OQ-QueueB Size  : 397
OQ-QueueB Len  : 0

 
Do you need an advanced user handling script? Download UserBekcisi today (Latest Edit)
Features: User + ISP + GeoIP database, user info + share checking and many more...

SMF spam blocked by CleanTalk