Jump to content

AdwCleaner 7.1 new version CRASH /bug report


Makinero

Recommended Posts

AdwCleaner 7.1 new version CRASH /bug report

Windows 7x64

 

 

AdwCleaner 7.1 new version
crashes every time it scans

Nazwa aplikacji powodującej błąd: adwcleaner_7.1.0.0.exe, wersja: 7.1.0.0, sygnatura czasowa: 0x5acf354e
Nazwa modułu powodującego błąd: msvcrt.dll, wersja: 7.0.7601.17744, sygnatura czasowa: 0x4eeaf722
Kod wyjątku: 0xc0000005
Przesunięcie błędu: 0x00009b60
Identyfikator procesu powodującego błąd: 0x16e4
Godzina uruchomienia aplikacji powodującej błąd: 0x01d3d95dd74b366d
Ścieżka aplikacji powodującej błąd: C:\Users\MOJA\Downloads\adwcleaner_7.1.0.0.exe
Ścieżka modułu powodującego błąd: C:\Windows\syswow64\msvcrt.dll
Identyfikator raportu: 1924734c-4551-11e8-beaf-0862662a261f

Screen_Shot_04-21-18_at_12.45_PM.jpg

FAULTING_IP: 
msvcrt!memcpy+5a
76979b60 f3a5            rep movs dword ptr es:[edi],dword ptr [esi]

EXCEPTION_RECORD:  ffffffff -- (.exr 0xffffffffffffffff)
ExceptionAddress: 76979b60 (msvcrt!memcpy+0x0000005a)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 00000000
   Parameter[1]: 023dc000
Attempt to read from address 023dc000

PROCESS_NAME:  adwcleaner_7.1.0.0.exe

ADDITIONAL_DEBUG_TEXT:  
Use '!findthebuild' command to search for the target build information.
If the build information is available, run '!findthebuild -s ; .reload' to set symbol path and load symbols.

FAULTING_MODULE: 75370000 kernel32

DEBUG_FLR_IMAGE_TIMESTAMP:  4eeaf722

MODULE_NAME: msvcrt

ERROR_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo

EXCEPTION_PARAMETER1:  00000000

EXCEPTION_PARAMETER2:  023dc000

READ_ADDRESS:  023dc000 

FOLLOWUP_IP: 
msvcrt!memcpy+5a
76979b60 f3a5            rep movs dword ptr es:[edi],dword ptr [esi]

EXCEPTION_DOESNOT_MATCH_CODE:  This indicates a hardware error.
Instruction at 76979b60 does not read/write to 023dc000

MOD_LIST: <ANALYSIS/>

LAST_CONTROL_TRANSFER:  from 754a73f6 to 76979b60

FAULTING_THREAD:  00001d4c

BUGCHECK_STR:  APPLICATION_FAULT_STRING_DEREFERENCE_CODE_ADDRESS_MISMATCH_INVALID_POINTER_READ_WRONG_SYMBOLS

PRIMARY_PROBLEM_CLASS:  STRING_DEREFERENCE

DEFAULT_BUCKET_ID:  STRING_DEREFERENCE

STACK_TEXT:  
1933f3f0 754a73f6 1a510038 020a99bc 0120ccf0 msvcrt!memcpy+0x5a
1933f410 775b4e62 1933f42c 1a51002c 1933f8f8 oleaut32!BSTR_UserMarshal+0x50
1933f44c 775b4df7 1933f8f8 6bc7337a 1a510028 rpcrt4!NdrpUserMarshalMarshall+0x4b
1933f47c 77596ff0 1933f4ec 1933f8f8 6bc7337a rpcrt4!NdrUserMarshalMarshall+0xd8
1933f4a8 7763013d bc36eefa 1933f8f4 08000265 rpcrt4!NdrpClientMarshal+0xf6
1933f8bc 7727d8e2 6bc717d8 6bc73090 1933f8f4 rpcrt4!NdrClientCall2+0x19a
1933f8dc 77179785 0000001c 00000014 1933f914 ole32!ObjectStublessClient+0xa2 [d:\w7rtm\com\rpc\ndrole\i386\stblsclt.cxx @ 474]
1933f8ec 01229e3a 18fd04ec 020a99bc 020b1110 ole32!ObjectStubless+0xf [d:\w7rtm\com\rpc\ndrole\i386\stubless.asm @ 154]
WARNING: Stack unwind information not available. Following frames may be wrong.
1933f914 0123d287 00000000 1933f944 bf8724b2 adwcleaner_7_1_0_0+0x79e3a
1933f968 0122610d bf87247a 1528b130 00000001 adwcleaner_7_1_0_0+0x8d287
1933f9e0 01210cc0 bf872756 1528b130 1528b130 adwcleaner_7_1_0_0+0x7610d
1933facc 01211539 1933faf8 bf872682 1528b130 adwcleaner_7_1_0_0+0x60cc0
1933fb18 011f4d06 16524678 00000000 1933fc08 adwcleaner_7_1_0_0+0x61539
1933fb28 01267db7 1528b130 00000000 00000005 adwcleaner_7_1_0_0+0x44d06
1933fc1c 01a79cb9 1656b200 bf8721ce 00000000 adwcleaner_7_1_0_0+0xb7db7
00000000 00000000 00000000 00000000 00000000 adwcleaner_7_1_0_0+0x8c9cb9


STACK_COMMAND:  .cxr 0000000000000000 ; kb ; ~11s; .ecxr ; kb

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  msvcrt!memcpy+5a

FOLLOWUP_NAME:  MachineOwner

IMAGE_NAME:  msvcrt.dll

BUCKET_ID:  WRONG_SYMBOLS

FAILURE_BUCKET_ID:  STRING_DEREFERENCE_c0000005_msvcrt.dll!memcpy

Followup: MachineOwner
---------

0:011> lmvm msvcrt
start    end        module name
76970000 76a1c000   msvcrt     (pdb symbols)          c:\symbols\msvcrt.pdb\F1D253F9555C46DF8076400A52B3A9292\msvcrt.pdb
    Loaded symbol image file: msvcrt.dll
    Mapped memory image file: c:\symbols\msvcrt.dll\4EEAF722ac000\msvcrt.dll
    Image path: C:\Windows\SysWOW64\msvcrt.dll
    Image name: msvcrt.dll
    Timestamp:        Fri Dec 16 08:45:38 2011 (4EEAF722)
    CheckSum:         000A8F06
    ImageSize:        000AC000
    File version:     7.0.7601.17744
    Product version:  6.1.8638.17744
    File flags:       0 (Mask 3F)
    File OS:          40004 NT Win32
    File type:        1.0 App
    File date:        00000000.00000000
    Translations:     0409.04b0
    CompanyName:      Microsoft Corporation
    ProductName:      Microsoft® Windows® Operating System
    InternalName:     msvcrt.dll
    OriginalFilename: msvcrt.dll
    ProductVersion:   7.0.7601.17744
    FileVersion:      7.0.7601.17744 (win7sp1_gdr.111215-1535)
    FileDescription:  Windows NT CRT DLL
    LegalCopyright:   © Microsoft Corporation. All rights reserved.
0:011> lmvm kernel32
start    end        module name
75370000 75480000   kernel32   (export symbols)       kernel32.dll
    Loaded symbol image file: kernel32.dll
    Mapped memory image file: C:\Windows\SysWOW64\kernel32.dll
    Image path: C:\Windows\SysWOW64\kernel32.dll
    Image name: kernel32.dll
    Timestamp:        Sat Mar 31 03:12:18 2018 (5ABEE072)
    CheckSum:         0011DEA5
    ImageSize:        00110000
    File version:     6.1.7601.24094
    Product version:  6.1.7601.24094
    File flags:       0 (Mask 3F)
    File OS:          40004 NT Win32
    File type:        2.0 Dll
    File date:        00000000.00000000
    Translations:     0409.04b0
    CompanyName:      Microsoft Corporation
    ProductName:      Microsoft® Windows® Operating System
    InternalName:     kernel32
    OriginalFilename: kernel32
    ProductVersion:   6.1.7601.24094
    FileVersion:      6.1.7601.24094 (win7sp1_ldr_escrow.180330-1600)
    FileDescription:  Windows NT BASE API Client DLL
    LegalCopyright:   © Microsoft Corporation. All rights reserved.
 

 

 

Link to post
Share on other sites

  • Staff

***This is an automated reply***

Hi,

Thanks for posting in the AdwCleaner Help forum.

Someone will reply shortly, but in the meantime here are a few resources which may help resolve your issue:

Thanks in advance for your patience.

-The Malwarebytes Forum Team

Link to post
Share on other sites

I know how to do it. Without errors Memtest 0% error . So what does this have to do with the mistake. Nothing, so please do not suggest bad solutions, because there were already many such and lost a lot of time. Such solutions to the left and the right will never solve the actual error. I tested on various devices and this is a bug that occurs on many computers and my friend PC.
Please fix this bug.
The old version works well, the new version has an internal bug.

 

 

AdwCleaner 7.1 and 7.1.1 

Loading module msvcrt.dll and CRASH

 

 

Edited by Makinero
Link to post
Share on other sites

Now, I know the solution to the problem:
but I want it to be found by specialists and developers.
I gave a dump and so everything is writing like a bull.

Bad soultion : D !!!I want good solution :D 

Quote

 

Can you do a test with Memtest first?

Here are explanations you can follow: https://www.cnet.com/how-to/how-to-test-your-ram-in-windows/

 

 

Link to post
Share on other sites

@Elisabeth

part from the first post  abov

.....................................

0:011> lmvm msvcrt
start    end        module name
76970000 76a1c000   msvcrt     (pdb symbols)          c:\symbols\msvcrt.pdb\F1D253F9555C46DF8076400A52B3A9292\msvcrt.pdb
    Loaded symbol image file: msvcrt.dll
    Mapped memory image file: c:\symbols\msvcrt.dll\4EEAF722ac000\msvcrt.dll
    Image path: C:\Windows\SysWOW64\msvcrt.dll
    Image name: msvcrt.dll
    Timestamp:        Fri Dec 16 08:45:38 2011 (4EEAF722)

........................................

this is a 64 bit. dll  !! -  the ADW Cleaner is a 32 bit Application

Wo

Link to post
Share on other sites

@wodatpc that's not a full dump file, just the base analysis. Can you please upload the .dmp file that the analysis was pulled from? Thanks

Also, the msvcrt.dll called out in your analysis is a 32-bit DLL. The 32-bit DLL's live in \SysWow64 and 32-bit applications are redirected there by default when trying to access anything in the system32 directory.

Edited by dcollins
Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.