ID:102248
 
Resolved
The server could crash during player logins under rare circumstances.
BYOND Version:475
Operating System:Windows XP Home
Web Browser:Firefox 3.5.13
Applies to:Dream Daemon
Status: Resolved (477)

This issue has been resolved.
BYOND Version: 475.1080

Application exception occurred:
App: C:\Program Files\BYOND\bin\dreamdaemon.exe (pid=980)
When: 7/3/2010 @ 14:34:54.875
Exception number: c0000005 (access violation)

*----> System Information <----*
Computer Name:
User Name:
Terminal Session Id: 0
Number of Processors: 1
Processor Type: x86 Family 15 Model 2 Stepping 4
Windows Version: 5.1
Current Build: 2600
Service Pack: 2
Current Type: Uniprocessor Free
Registered Organization: Home
Registered Owner:

*----> Task List <----*
0 System Process
4 System
480 smss.exe
544 csrss.exe
568 winlogon.exe
612 services.exe
624 lsass.exe
792 svchost.exe
868 svchost.exe
944 svchost.exe
984 svchost.exe
1124 svchost.exe
1228 svchost.exe
1384 spoolsv.exe
1720 devldr32.exe
1736 Explorer.EXE
1996 itype.exe
2012 jusched.exe
2024 HPWuSchd2.exe
124 AdobeARM.exe
152 ctfmon.exe
176 dpupdchk.exe
168 hpqtra08.exe
468 jqs.exe
528 nvsvc32.exe
1272 svchost.exe
1524 ZuneBusEnum.exe
2400 alg.exe
2564 hpqSTE08.exe
2636 hpqimzone.exe
2744 hprblog.exe
3312 jucheck.exe
980 dreamdaemon.exe
1300 byond.exe
3672 firefox.exe
1640 wmplayer.exe
1444 HPWUCli.exe
724 HPZipm12.exe
1044 drwtsn32.exe

*----> Module List <----*
(0000000000320000 - 0000000000366000: C:\Program Files\BYOND\bin\byondext.dll
(0000000000370000 - 0000000000381000: C:\WINDOWS\system32\MSVCIRT.dll
(0000000000400000 - 0000000000435000: C:\Program Files\BYOND\bin\dreamdaemon.exe
(0000000000440000 - 0000000000606000: C:\Program Files\BYOND\bin\byondcore.dll
(0000000001490000 - 0000000001499000: C:\WINDOWS\system32\Normaliz.dll
(0000000010000000 - 000000001016a000: C:\Program Files\BYOND\bin\byondwin.dll
(000000005ad70000 - 000000005ada8000: C:\WINDOWS\system32\uxtheme.dll
(000000005b0a0000 - 000000005b0a7000: C:\WINDOWS\system32\umdmxfrm.dll
(000000005b860000 - 000000005b8b4000: C:\WINDOWS\system32\NETAPI32.dll
(000000005cd70000 - 000000005cd77000: C:\WINDOWS\system32\serwvdrv.dll
(000000005d090000 - 000000005d127000: C:\WINDOWS\system32\COMCTL32.dll
(00000000662b0000 - 0000000066308000: C:\WINDOWS\system32\hnetcfg.dll
(0000000071a50000 - 0000000071a8f000: C:\WINDOWS\System32\mswsock.dll
(0000000071a90000 - 0000000071a98000: C:\WINDOWS\System32\wshtcpip.dll
(0000000071aa0000 - 0000000071aa8000: C:\WINDOWS\system32\WS2HELP.dll
(0000000071ab0000 - 0000000071ac7000: C:\WINDOWS\system32\WS2_32.dll
(0000000071ad0000 - 0000000071ad9000: C:\WINDOWS\system32\WSOCK32.dll
(00000000732e0000 - 00000000732e5000: C:\WINDOWS\system32\RICHED32.DLL
(0000000073dd0000 - 0000000073ece000: C:\WINDOWS\system32\MFC42.DLL
(0000000074720000 - 000000007476b000: C:\WINDOWS\system32\MSCTF.dll
(0000000074e30000 - 0000000074e9c000: C:\WINDOWS\system32\RICHED20.dll
(00000000754d0000 - 0000000075550000: C:\WINDOWS\system32\CRYPTUI.dll
(00000000755c0000 - 00000000755ee000: C:\WINDOWS\system32\msctfime.ime
(0000000075f80000 - 000000007607d000: C:\WINDOWS\system32\browseui.dll
(0000000076380000 - 0000000076385000: C:\WINDOWS\system32\MSIMG32.dll
(0000000076390000 - 00000000763ad000: C:\WINDOWS\system32\IMM32.DLL
(00000000763b0000 - 00000000763f9000: C:\WINDOWS\system32\comdlg32.dll
(0000000076600000 - 000000007661d000: C:\WINDOWS\System32\CSCDLL.dll
(0000000076990000 - 00000000769b5000: C:\WINDOWS\system32\ntshrui.dll
(00000000769c0000 - 0000000076a73000: C:\WINDOWS\system32\USERENV.dll
(0000000076b20000 - 0000000076b31000: C:\WINDOWS\system32\ATL.DLL
(0000000076b40000 - 0000000076b6d000: C:\WINDOWS\system32\WINMM.dll
(0000000076c30000 - 0000000076c5e000: C:\WINDOWS\system32\WINTRUST.dll
(0000000076c90000 - 0000000076cb8000: C:\WINDOWS\system32\IMAGEHLP.dll
(0000000076f20000 - 0000000076f47000: C:\WINDOWS\system32\DNSAPI.dll
(0000000076f60000 - 0000000076f8c000: C:\WINDOWS\system32\WLDAP32.dll
(0000000076fb0000 - 0000000076fb8000: C:\WINDOWS\System32\winrnr.dll
(0000000076fc0000 - 0000000076fc6000: C:\WINDOWS\system32\rasadhlp.dll
(0000000076fd0000 - 000000007704f000: C:\WINDOWS\system32\CLBCATQ.DLL
(0000000077050000 - 0000000077115000: C:\WINDOWS\system32\COMRes.dll
(0000000077120000 - 00000000771ac000: C:\WINDOWS\system32\OLEAUT32.dll
(00000000773d0000 - 00000000774d2000: C:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595 b64144ccf1df_6.0.2600.2180_x-ww_a84f1ff9\comctl32.dll
(00000000774e0000 - 000000007761c000: C:\WINDOWS\system32\ole32.dll
(0000000077760000 - 00000000778d0000: C:\WINDOWS\system32\shdocvw.dll
(0000000077920000 - 0000000077a13000: C:\WINDOWS\system32\SETUPAPI.dll
(0000000077a20000 - 0000000077a74000: C:\WINDOWS\System32\cscui.dll
(0000000077a80000 - 0000000077b14000: C:\WINDOWS\system32\CRYPT32.dll
(0000000077b20000 - 0000000077b32000: C:\WINDOWS\system32\MSASN1.dll
(0000000077b40000 - 0000000077b62000: C:\WINDOWS\system32\appHelp.dll
(0000000077c00000 - 0000000077c08000: C:\WINDOWS\system32\VERSION.dll
(0000000077c10000 - 0000000077c68000: C:\WINDOWS\system32\MSVCRT.dll
(0000000077d40000 - 0000000077dd0000: C:\WINDOWS\system32\USER32.dll
(0000000077dd0000 - 0000000077e6b000: C:\WINDOWS\system32\ADVAPI32.dll
(0000000077e70000 - 0000000077f01000: C:\WINDOWS\system32\RPCRT4.dll
(0000000077f10000 - 0000000077f56000: C:\WINDOWS\system32\GDI32.dll
(0000000077f60000 - 0000000077fd6000: C:\WINDOWS\system32\SHLWAPI.dll
(0000000078000000 - 0000000078045000: C:\WINDOWS\system32\iertutil.dll
(0000000078050000 - 0000000078120000: C:\WINDOWS\system32\WININET.dll
(000000007c800000 - 000000007c8f4000: C:\WINDOWS\system32\kernel32.dll
(000000007c900000 - 000000007c9b0000: C:\WINDOWS\system32\ntdll.dll
(000000007c9c0000 - 000000007d1d4000: C:\WINDOWS\system32\SHELL32.dll

*----> State Dump for Thread Id 0x430 <----*

eax=0012e884 ebx=00000000 ecx=00000029 edx=00000000 esi=00000000 edi=023f7020
eip=0051bb36 esp=0012e86c ebp=00000017 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

*** WARNING: Unable to verify checksum for C:\Program Files\BYOND\bin\byondcore.dll
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\Program Files\BYOND\bin\byondcore.dll -
function: byondcore!DungServer__TrustLibs
0051bb1f 0000 add [eax],al
0051bb21 0000 add [eax],al
0051bb23 00e8 add al,ch
0051bb25 b712 mov bh,0x12
0051bb27 0300 add eax,[eax]
0051bb29 50 push eax
0051bb2a e8d1aa0100 call byondcore!DMTextPrinter__SetTitleStart+0xa950 (00536600)
0051bb2f 8bf0 mov esi,eax
0051bb31 8d442414 lea eax,[esp+0x14]
0051bb35 50 push eax
FAULT ->0051bb36 8b5624 mov edx,[esi+0x24] ds:0023:00000024=????????
0051bb39 89542418 mov [esp+0x18],edx
0051bb3d e8ce8dfbff call byondcore!DungServer__GetHostingFlags+0x3250 (004d4910)
0051bb42 83c414 add esp,0x14
0051bb45 84c0 test al,al
0051bb47 753b jnz byondcore!DungServer__TrustLibs+0x8764 (0051bb84)
0051bb49 8d4c2404 lea ecx,[esp+0x4]
0051bb4d 51 push ecx
0051bb4e e8ad8cfbff call byondcore!DungServer__GetHostingFlags+0x3140 (004d4800)
0051bb53 83c404 add esp,0x4
0051bb56 8d54240c lea edx,[esp+0xc]

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
00000017 00000000 00000000 00000000 00000000 byondcore!DungServer__TrustLibs+0x8716

*----> Raw Stack Dump <----*
000000000012e86c 84 e8 12 00 ff ff 00 00 - 00 00 00 00 00 00 00 00 ................
000000000012e87c 03 00 00 00 03 00 00 00 - 00 00 00 00 18 00 00 00 ................
000000000012e88c 00 00 00 00 00 04 00 00 - 00 00 00 00 a4 e8 12 00 ................
000000000012e89c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000012e8ac e0 12 52 00 04 00 00 00 - 03 00 00 00 07 00 00 00 ..R.............
000000000012e8bc 04 00 00 00 05 34 57 00 - 00 00 00 00 5e a0 4d 00 .....4W.....^.M.
000000000012e8cc 03 00 00 00 21 00 00 00 - 02 00 00 00 e8 e8 12 00 ....!...........
000000000012e8dc 00 00 00 00 c8 05 91 7c - 20 07 c9 00 b4 e9 12 00 .......| .......
000000000012e8ec 51 05 91 7c 08 08 3b 00 - 6d 05 91 7c 36 00 00 00 Q..|..;.m..|6...
000000000012e8fc 28 07 c9 00 28 07 c9 00 - d0 c0 63 02 d0 c0 63 02 (...(.....c...c.
000000000012e90c 04 00 00 00 78 01 3b 00 - ef d8 90 7c 08 59 a5 71 ....x.;....|.Y.q
000000000012e91c 40 04 00 00 c0 00 00 00 - 00 00 00 00 00 00 00 00 @...............
000000000012e92c 68 e9 12 00 1f 20 01 00 - 50 e9 12 00 10 00 00 00 h.... ..P.......
000000000012e93c 00 00 00 00 7c 59 a5 71 - 00 00 00 00 60 1f 19 00 ....|Y.q....`...
000000000012e94c 28 07 c9 00 d8 e9 12 00 - 40 00 00 00 00 00 00 00 (.......@.......
000000000012e95c 00 00 00 00 30 00 00 00 - 78 ee 12 00 00 00 00 00 ....0...x.......
000000000012e96c 3f 6a 53 00 01 00 00 00 - e0 c4 00 00 b3 76 53 00 ?jS..........vS.
000000000012e97c 01 00 00 00 04 c4 00 00 - 36 a4 53 00 01 c4 00 00 ........6.S.....
000000000012e98c 86 c7 00 00 01 c4 00 00 - 86 c7 00 00 06 00 00 00 ................
000000000012e99c 00 00 00 00 eb 80 52 00 - 60 d4 6b 02 01 c4 00 00 ......R.`.k.....

*----> State Dump for Thread Id 0x39c <----*

eax=00000000 ebx=71ac408c ecx=00000000 edx=00000498 esi=0000009c edi=00000000
eip=7c90eb94 esp=00e4ff20 ebp=00e4ff84 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\ntdll.dll -
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\kernel32.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\WS2_32.dll -
ChildEBP RetAddr Args to Child
00e4ff84 7c802542 0000009c ffffffff 00000000 ntdll!KiFastSystemCallRet
00e4ff98 71abd174 0000009c ffffffff 0012e6d4 kernel32!WaitForSingleObject+0x12
00e4ffb4 7c80b50b 0000009c 0012e6d4 7c90ee18 WS2_32!getnameinfo+0xb03
00e4ffec 00000000 71abd149 0015c2e0 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000000e4ff20 c0 e9 90 7c db 25 80 7c - 9c 00 00 00 00 00 00 00 ...|.%.|........
0000000000e4ff30 00 00 00 00 e0 c2 15 00 - 80 26 19 00 8c 40 ac 71 [email protected]
0000000000e4ff40 14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000e4ff50 10 00 00 00 48 00 00 00 - 7c ff e4 00 00 80 fd 7f ....H...|.......
0000000000e4ff60 00 e0 fd 7f 00 00 00 00 - 1e 4f 00 00 34 ff e4 00 .........O..4...
0000000000e4ff70 18 ee 90 7c dc ff e4 00 - f3 99 83 7c 08 26 80 7c ...|.......|.&.|
0000000000e4ff80 00 00 00 00 98 ff e4 00 - 42 25 80 7c 9c 00 00 00 ........B%.|....
0000000000e4ff90 ff ff ff ff 00 00 00 00 - b4 ff e4 00 74 d1 ab 71 ............t..q
0000000000e4ffa0 9c 00 00 00 ff ff ff ff - d4 e6 12 00 18 ee 90 7c ...............|
0000000000e4ffb0 e0 c2 15 00 ec ff e4 00 - 0b b5 80 7c 9c 00 00 00 ...........|....
0000000000e4ffc0 d4 e6 12 00 18 ee 90 7c - e0 c2 15 00 00 e0 fd 7f .......|........
0000000000e4ffd0 00 06 7c 86 c0 ff e4 00 - 68 e8 58 86 ff ff ff ff ..|.....h.X.....
0000000000e4ffe0 f3 99 83 7c 18 b5 80 7c - 00 00 00 00 00 00 00 00 ...|...|........
0000000000e4fff0 00 00 00 00 49 d1 ab 71 - e0 c2 15 00 00 00 00 00 ....I..q........
0000000000e50000 08 00 00 00 c0 60 00 00 - 00 00 00 00 ff ff ff ff .....`..........
0000000000e50010 00 40 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 .@..............
0000000000e50020 00 00 00 00 00 00 00 00 - 60 05 00 00 50 20 00 00 ........`...P ..
0000000000e50030 d0 f1 c7 28 25 de d2 11 - af dd 00 10 5a 27 99 b5 ...(%.......Z'..
0000000000e50040 0a 00 00 00 01 00 00 00 - 00 00 00 00 bc 0f 00 00 ................
0000000000e50050 58 0e 00 00 0d 00 00 00 - a2 94 89 27 00 00 00 00 X..........'....

*----> State Dump for Thread Id 0xd5c <----*

eax=00000001 ebx=c0000000 ecx=00177358 edx=00000006 esi=00000102 edi=71a87558
eip=7c90eb94 esp=00feff7c ebp=00feffb4 iopl=0 nv up ei pl nz na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000206

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
00feffb4 7c80b50b 71a67aa3 0012ea7c 7c90ee18 ntdll!KiFastSystemCallRet
00feffec 00000000 71a5d5af 00161dd0 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000000feff7c 1b e3 90 7c 09 d6 a5 71 - e4 00 00 00 bc ff fe 00 ...|...q........
0000000000feff8c b0 ff fe 00 a4 ff fe 00 - 50 d6 a5 71 7c ea 12 00 ........P..q|...
0000000000feff9c 18 ee 90 7c d0 1d 16 00 - 00 00 00 00 1c 00 00 00 ...|............
0000000000feffac 00 00 a5 71 30 8e 1a 00 - ec ff fe 00 0b b5 80 7c ...q0..........|
0000000000feffbc a3 7a a6 71 7c ea 12 00 - 18 ee 90 7c d0 1d 16 00 .z.q|......|....
0000000000feffcc 00 d0 fd 7f 00 06 7c 86 - c0 ff fe 00 68 e8 58 86 ......|.....h.X.
0000000000feffdc ff ff ff ff f3 99 83 7c - 18 b5 80 7c 00 00 00 00 .......|...|....
0000000000feffec 00 00 00 00 00 00 00 00 - af d5 a5 71 d0 1d 16 00 ...........q....
0000000000fefffc 00 00 00 00 08 00 00 00 - 00 20 00 00 00 00 00 00 ......... ......
0000000000ff000c ff ff ff ff 40 1f 00 00 - 01 00 00 00 00 00 00 00 ....@...........
0000000000ff001c 00 00 00 00 00 00 00 00 - 00 00 00 00 58 00 00 00 ............X...
0000000000ff002c 58 00 00 00 a0 e1 db 57 - 25 de d2 11 af dd 00 10 X......W%.......
0000000000ff003c 5a 27 99 b5 03 00 00 00 - 01 00 00 00 00 00 00 00 Z'..............
0000000000ff004c 30 04 00 00 d4 03 00 00 - 24 00 00 00 db 2c 75 14 0.......$....,u.
0000000000ff005c 00 00 00 00 00 00 00 00 - 48 00 00 00 00 00 00 00 ........H.......
0000000000ff006c 00 00 00 00 08 00 00 00 - 01 00 04 00 07 00 00 00 ................
0000000000ff007c 00 00 00 00 00 00 00 00 - 00 00 00 00 08 00 00 00 ................
0000000000ff008c ff ff ff ff 40 1f 00 00 - 01 00 00 00 00 00 00 00 ....@...........
0000000000ff009c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000ff00ac 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

*----> State Dump for Thread Id 0x704 <----*

eax=7c92798d ebx=00000000 ecx=00000000 edx=7ffdfc00 esi=00000000 edi=00000000
eip=7c90eb94 esp=0128ff9c ebp=0128ffb4 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
0128ffb4 7c80b50b 00000000 00000000 00000000 ntdll!KiFastSystemCallRet
0128ffec 00000000 7c92798d 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
000000000128ff9c 5c d8 90 7c d4 79 92 7c - 01 00 00 00 ac ff 28 01 \..|.y.|......(.
000000000128ffac 00 00 00 00 00 00 00 80 - ec ff 28 01 0b b5 80 7c ..........(....|
000000000128ffbc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000128ffcc 00 c0 fd 7f 00 06 7c 86 - c0 ff 28 01 f0 03 f4 85 ......|...(.....
000000000128ffdc ff ff ff ff f3 99 83 7c - 18 b5 80 7c 00 00 00 00 .......|...|....
000000000128ffec 00 00 00 00 00 00 00 00 - 8d 79 92 7c 00 00 00 00 .........y.|....
000000000128fffc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000129000c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000129001c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000129002c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000129003c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000129004c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000129005c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000129006c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000129007c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000129008c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000129009c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000012900ac 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000012900bc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000012900cc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................