Excel 2000 crashes while updating Pivot tables


F

fallassignment

I have a user on Windows NT using Excel 2000 that keeps having
problems with Excel crashing with a Dr. Watson Error while updating
the range of cells that her pivot tables grab data from. She is
selecting valid data, but when she clicks on finish, things
intermittently go haywire - crashing and loosing all work back to the
point of the last save. I have all updates installed for Windows NT
and Office 2000, as well as having previously reinstalled Office 2000
from scratch. Can anyone interpret this Dr. Watson log? Thanks in
advance.

Microsoft (R) Windows NT (TM) Version 4.00 DrWtsn32
Copyright (C) 1985-1996 Microsoft Corp. All rights reserved.



Application exception occurred:
App: (pid=210)
When: 6/11/2004 @ 16:16:28.299
Exception number: c0000005 (access violation)

*----> System Information <----*
Computer Name: 11876T
User Name: 11955
Number of Processors: 1
Processor Type: x86 Family 6 Model 8 Stepping 1
Windows Version: 4.0
Current Build: 1381
Service Pack: 6
Current Type: Uniprocessor Free
Registered Organization: Weather Shield Mfg., Inc.
Registered Owner: Autorized User

*----> Task List <----*
0 Idle.exe
2 System.exe
20 smss.exe
24 csrss.exe
34 winlogon.exe
40 services.exe
43 lsass.exe
68 spoolss.exe
87 Mcshield.exe
95 VsTskMgr.exe
109 RpcSs.exe
120 hpzstatn.exe
123 FrameworkServic.exe
130 pstores.exe
143 MSTask.exe
156 NAPRDMGR.exe
148 nddeagnt.exe
202 Explorer.exe
196 point32.exe
200 UpdaterUI.exe
139 loadwc.exe
212 SHSTAT.exe
217 ddhelp.exe
208 pcsws.exe
229 pcscm.exe
250 OUTLOOK.exe
261 MAPISP32.exe
210 EXCEL.exe
205 IMSVTCP.exe
322 AGENTSVR.exe
115 HPFSTSC0.exe
294 HPFPEGN0.exe
314 drwtsn32.exe
0 _Total.exe

(30000000 - 306d9000)
(77f60000 - 77fbf000) dll\ntdll.dbg
(77dc0000 - 77dff000) dll\advapi32.dbg
(77f00000 - 77f5f000) dll\kernel32.dbg
(77e70000 - 77ec2000) dll\user32.dbg
(78140000 - 78175000) dll\gdi32.dbg
(77e10000 - 77e67000) dll\rpcrt4.dbg
(308c0000 - 30e1d000)
(77b20000 - 77bd1000) dll\ole32.dbg
(61210000 - 6121f000)
(770f0000 - 772ed000)
(77c40000 - 77d7b000) dll\shell32.dbg
(71710000 - 71794000) dll\comctl32.dbg
(10000000 - 1000c000)
(671a0000 - 671a0000)
(67670000 - 67670000)
(673a0000 - 673a0000)
(78000000 - 78044000)
(780a0000 - 780b2000)
(674a0000 - 674a0000)
(67610000 - 67628000)
(719b0000 - 719b8000)
(67600000 - 67606000)
(668d0000 - 668d0000)
(676d0000 - 676d0000)
(674e0000 - 674e9000)
(67490000 - 67490000)
(676b0000 - 676b0000)
(67480000 - 67480000)
(67170000 - 67170000)
(66b20000 - 66b20000)
(67580000 - 67580000)
(67680000 - 67680000)
(676c0000 - 676c6000)
(674b0000 - 674b0000)
(675b0000 - 675b0000)
(776d0000 - 776d8000) dll\wsock32.dbg
(776b0000 - 776c4000) dll\ws2_32.dbg
(776a0000 - 776a7000) dll\ws2help.dbg
(780c0000 - 78121000)
(67180000 - 67180000)
(676a0000 - 676a7000)
(67060000 - 67060000)
(67310000 - 67310000)
(67190000 - 67190000)
(673d0000 - 673e1000)
(67050000 - 67050000)
(5f400000 - 5f4f2000)
(674f0000 - 674f0000)
(77d80000 - 77db2000) dll\comdlg32.dbg
(66b90000 - 66bb7000)
(65340000 - 653db000) D:\OA\rwin32\oleaut32.dll
(3ffe0000 - 3ffe0000)
(63670000 - 63670000)
(63460000 - 63460000)
(62a70000 - 62a70000)
(62a80000 - 62a80000)
(65000000 - 65264000) Vbe6.dbg
(65300000 - 65327000) vbe6intl.dbg
(01e60000 - 01e60000)
(61220000 - 61232000)
(779b0000 - 779b9000) dll\linkinfo.dbg
(77720000 - 77731000) dll\mpr.dbg
(77a40000 - 77a4d000) dll\ntshrui.dbg
(4ca00000 - 4ca41000) dll\netapi32.dbg
(77840000 - 77849000) dll\NetRap.dbg
(777e0000 - 777ed000) dll\samlib.dbg
(77950000 - 77979000) dll\wldap32.dbg
(77bf0000 - 77bf7000) dll\rpcltc1.dbg
(71300000 - 71306000) dll\msidle.dbg
(48000000 - 4806c000)
(777f0000 - 777fc000) dll\ntlanman.dbg
(77890000 - 778a5000) dll\netui0.dbg
(77850000 - 7788a000) dll\netui1.dbg
(77c00000 - 77c18000) drv\winspool.dbg
(044d0000 - 04619000)
(70a70000 - 70ad5000)
(77fd0000 - 77ffa000) dll\winmm.dbg
(61dd0000 - 61df1000) dll\mapistub.dbg
(62100000 - 621c3000) MSMAPI32.dbg
(3ff30000 - 3ff48000) dll\gapi32.dbg
(77a90000 - 77a9b000) dll\version.dbg
(779c0000 - 779c8000) dll\lz32.dbg
(626f0000 - 62715000) EMSABP32.dbg
(625d0000 - 625ef000) EMSUI32.dbg
(62030000 - 620ee000) OUTEX.dbg
(74fc0000 - 74fcf000) dll\rpcltccm.dbg
(77670000 - 77687000) dll\mswsock.dbg
(74ff0000 - 74ffe000) dll\rnr20.dbg
(77660000 - 7766f000) dll\msafd.dbg
(77690000 - 77699000) dll\wshtcpip.dbg
(76e70000 - 76e82000) dll\secur128.dbg
(07310000 - 07321000) dll\msapsspc.dbg
(779d0000 - 779d0000)
(77400000 - 7741e000) dll\sch128c.dbg
(5e380000 - 5e3a5000) dll\msoss.dbg
(5cf00000 - 5cf75000) dll\crypt32.dbg
(07340000 - 07350000) dll\msasn1.dbg
(07350000 - 07360000)
(716d0000 - 716ef000) dll\msnsspc.dbg
(3a020000 - 3a03f000)
(629a0000 - 62a32000) MSPST32.dbg
(62730000 - 627c0000) EMSMDB32.dbg
(67f90000 - 67f9e000)
(32a00000 - 32a22000)
(28750000 - 2875e000)

State Dump for Thread Id 0x10b

eax=00000005 ebx=00000000 ecx=00000000 edx=80000000 esi=00750008
edi=0012ddb0
eip=3057f69d esp=0012bd64 ebp=0012c07c iopl=0 nv up ei pl zr
na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000
efl=00000246


function: LPenHelper


Application exception occurred:
App: (pid=256)
When: 6/14/2004 @ 9:26:32.108
Exception number: c0000005 (access violation)

*----> System Information <----*
Computer Name: 11876T
User Name: 11955
Number of Processors: 1
Processor Type: x86 Family 6 Model 8 Stepping 1
Windows Version: 4.0
Current Build: 1381
Service Pack: 6
Current Type: Uniprocessor Free
Registered Organization: Weather Shield Mfg., Inc.
Registered Owner: Autorized User

*----> Task List <----*
0 Idle.exe
2 System.exe
20 smss.exe
24 csrss.exe
34 winlogon.exe
40 services.exe
43 lsass.exe
67 spoolss.exe
87 Mcshield.exe
93 VsTskMgr.exe
112 RpcSs.exe
125 hpzstatn.exe
113 FrameworkServic.exe
148 pstores.exe
151 MSTask.exe
164 NAPRDMGR.exe
79 nddeagnt.exe
162 Explorer.exe
199 point32.exe
207 UpdaterUI.exe
209 loadwc.exe
220 SHSTAT.exe
218 ddhelp.exe
229 pcsws.exe
224 pcscm.exe
269 OUTLOOK.exe
168 MAPISP32.exe
255 IMSVTCP.exe
322 AGENTSVR.exe
256 EXCEL.exe
276 drwtsn32.exe
321 winhlp32.exe
0 _Total.exe

(30000000 - 306d9000)
(77f60000 - 77fbf000) dll\ntdll.dbg
(77dc0000 - 77dff000) dll\advapi32.dbg
(77f00000 - 77f5f000) dll\kernel32.dbg
(77e70000 - 77ec2000) dll\user32.dbg
(78140000 - 78175000) dll\gdi32.dbg
(77e10000 - 77e67000) dll\rpcrt4.dbg
(308c0000 - 30e1d000)
(77b20000 - 77bd1000) dll\ole32.dbg
(61210000 - 6121f000)
(770f0000 - 772ed000)
(77c40000 - 77d7b000) dll\shell32.dbg
(71710000 - 71794000) dll\comctl32.dbg
(10000000 - 1000c000)
(671a0000 - 671a0000)
(67670000 - 67670000)
(673a0000 - 673a0000)
(78000000 - 78044000)
(780a0000 - 780b2000)
(674a0000 - 674a0000)
(67610000 - 67628000)
(719b0000 - 719b8000)
(67600000 - 67606000)
(668d0000 - 668d0000)
(676d0000 - 676d0000)
(674e0000 - 674e9000)
(67490000 - 67490000)
(676b0000 - 676b0000)
(67480000 - 67480000)
(67170000 - 67170000)
(66b20000 - 66b20000)
(67580000 - 67580000)
(67680000 - 67680000)
(676c0000 - 676c6000)
(674b0000 - 674b0000)
(675b0000 - 675b0000)
(776d0000 - 776d8000) dll\wsock32.dbg
(776b0000 - 776c4000) dll\ws2_32.dbg
(776a0000 - 776a7000) dll\ws2help.dbg
(780c0000 - 78121000)
(67180000 - 67180000)
(676a0000 - 676a7000)
(67060000 - 67060000)
(67310000 - 67310000)
(67190000 - 67190000)
(673d0000 - 673e1000)
(67050000 - 67050000)
(5f400000 - 5f4f2000)
(674f0000 - 674f0000)
(77d80000 - 77db2000) dll\comdlg32.dbg
(66b90000 - 66bb7000)
(65340000 - 653db000) D:\OA\rwin32\oleaut32.dll
(3ffe0000 - 3ffe0000)
(63670000 - 63670000)
(63460000 - 63460000)
(62a70000 - 62a70000)
(62a80000 - 62a80000)
(65000000 - 65264000) Vbe6.dbg
(65300000 - 65327000) vbe6intl.dbg
(02270000 - 02270000)
(71300000 - 71306000) dll\msidle.dbg
(61220000 - 61232000)
(779b0000 - 779b9000) dll\linkinfo.dbg
(77720000 - 77731000) dll\mpr.dbg
(77a40000 - 77a4d000) dll\ntshrui.dbg
(4ca00000 - 4ca41000) dll\netapi32.dbg
(77840000 - 77849000) dll\NetRap.dbg
(777e0000 - 777ed000) dll\samlib.dbg
(77950000 - 77979000) dll\wldap32.dbg
(77bf0000 - 77bf7000) dll\rpcltc1.dbg
(67f90000 - 67f9e000)
(32a00000 - 32a22000)
(28750000 - 2875e000)
(777f0000 - 777fc000) dll\ntlanman.dbg
(77890000 - 778a5000) dll\netui0.dbg
(77850000 - 7788a000) dll\netui1.dbg
(48000000 - 4806c000)
(77fd0000 - 77ffa000) dll\winmm.dbg
(77c00000 - 77c18000) drv\winspool.dbg
(04c80000 - 04dc9000)
(70a70000 - 70ad5000)

State Dump for Thread Id 0x77

eax=00000005 ebx=00000000 ecx=00000000 edx=80000000 esi=00750008
edi=0012ddb0
eip=3057f69d esp=0012bd64 ebp=0012c07c iopl=0 nv up ei pl zr
na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000
efl=00000246


function: LPenHelper
3057f677 74e2 jz LPenHelper+0x17b141
(3057f65b)
3057f679 8d85f4fcffff lea eax,[ebp+0xfffffcf4]
ss:0012bd70=4066bffc
3057f67f 50 push eax
3057f680 57 push edi
3057f681 e89589b9ff call Ordinal44+0x11801b
(3011801b)
3057f686 d12508f16830 shl dword ptr [3068f108],1
ds:3068f108=00000001
3057f68c eb89 jmp LPenHelper+0x17b0fd
(3057f617)
3057f68e ff750c push dword ptr [ebp+0xc]
ss:0113aa82=????????
3057f691 ff1544150030
ds:30001544=308ca275
call dword ptr [Ordinal44+0x1544
(30001544)]
3057f697 8b0d34356a30 mov ecx,[306a3534]
ds:306a3534=00000000
FAULT ->3057f69d 66894110 mov [ecx+0x10],ax
ds:0100ea07=????
3057f6a1 a134356a30 mov eax,[306a3534]
ds:306a3534=00000000
3057f6a6 0fb74810 movzx ecx,word ptr [eax+0x10]
ds:0100ea0c=????
3057f6aa d1e1 shl ecx,1
3057f6ac 51 push ecx
3057f6ad 83c012 add eax,0x12
3057f6b0 ff750c push dword ptr [ebp+0xc]
ss:0113aa82=????????
3057f6b3 50 push eax
3057f6b4 e83f0ba9ff call Ordinal44+0x101f8 (300101f8)
3057f6b9 83c40c add esp,0xc
3057f6bc ff7518 push dword ptr [ebp+0x18]
ss:0113aa82=????????
3057f6bf e8727cb9ff call Ordinal44+0x117336
(30117336)

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0012c07c 30a6bf23 00000002 00750008 07670c68 00000010 !LPenHelper
0012c09c 30a696e9 07670260 00000002 00750008 07670c68 !GetSelectedLbx
0012c4f8 30a67484 07670260 00000009 07670c68 00000010 !TmtGetTmc
0012c510 30a697d3 07670260 0000000c 07670c68 00000010 !WindowOfDlgCur
0012c968 30a67484 07670260 00000008 07670c68 00000010 !TmtGetTmc
0012c980 30a63d8f 07670260 00000010 07670c68 00000010 !WindowOfDlgCur
0012c99c 30a6b59e 07670260 00000200 0000001d 30a63acd !FKillDlgFocus
0012c9c8 30a634bd 07670560 07670560 00000004 0012cb94 !ClbeGetLbx
0012c9e0 30a68a21 00000000 00008001 00000000 00000000
!IEntryFindListBox
0012c9f8 30a63592 07670560 00008001 00000000 00000000 !SetTmcText
0012ca18 30a63451 00c001eb 00000004 00000000 0012cb94
!IEntryFindListBox
0012ca34 30a68a21 07670560 00000004 00000000 0012cb94
!IEntryFindListBox
0012ca4c 30a6b1fc 07670560 00000004 00000000 0012cb94 !SetTmcText
0012caac 30a67bb7 00000004 00000000 0012cb94 00487be0 !GetLbxLbg
0012cb80 77e72cf4 019a0230 00000202 00000000 00c001eb !TmcGetFocus
0012cb9c 77e82834 ffff02d2 019a0230 00000202 00000000
user32!ScreenToClient
0012cbbc 30171b1c ffff02d2 019a0230 00000202 00000000
user32!CallWindowProcW
0012cbd8 77e71416 019a0230 00000202 00000000 00c001eb !Ordinal44
0012ccf4 00c001eb 0debd432 0000023c 00000191 076708f0
user32!TranslateMessageEx

*----> Raw Stack Dump <----*
0012bd64 00 00 00 00 08 00 75 00 - 00 00 00 00 fc bf 66 40
[email protected]
0012bd74 00 00 00 00 00 00 00 80 - 00 00 00 00 fc bf 66 40
[email protected]
0012bd84 00 00 00 00 00 00 00 80 - 00 00 00 00 00 f0 7e 40
[email protected]
0012bd94 00 00 00 00 00 00 00 80 - 00 00 00 00 00 f0 7e 40
[email protected]
0012bda4 00 00 00 00 00 90 78 40 - 00 00 00 00 fc bf 68 40
[email protected]@
0012bdb4 00 00 00 00 00 00 00 80 - 00 00 00 00 fc bf 66 40
[email protected]
0012bdc4 00 00 00 00 00 00 00 80 - 00 00 00 00 00 f0 7e 40
[email protected]
0012bdd4 00 00 00 00 00 90 78 40 - 00 00 00 00 00 f0 7f 40
[email protected]@
0012bde4 00 00 00 00 00 90 78 40 - 00 00 00 00 00 00 30 40
[email protected]@
0012bdf4 00 00 00 00 00 90 78 40 - 00 00 00 00 fc bf 68 40
[email protected]@
0012be04 00 00 00 00 00 00 00 80 - 00 00 00 00 fc bf 66 40
[email protected]
0012be14 00 00 00 00 00 90 78 40 - 00 00 00 00 00 f0 7f 40
[email protected]@
0012be24 00 00 00 00 00 90 78 40 - 00 00 00 00 00 00 30 40
[email protected]@
0012be34 00 00 00 00 00 00 00 80 - 00 00 00 00 00 f0 7e 40
[email protected]
0012be44 dc bf 12 00 1a 71 a4 30 - 6c bf 12 00 dc bf 12 00
......q.0l.......
0012be54 f8 72 a4 30 02 00 00 00 - ac c9 12 00 00 00 00 00
..r.0............
0012be64 00 00 00 01 00 00 00 00 - 00 88 d7 3f 00 00 00 00
............?....
0012be74 00 00 00 00 00 00 00 00 - 00 90 78 40 00 00 00 00
[email protected]
0012be84 fc bf 68 40 38 00 68 07 - 02 00 00 00 c4 be 12 00
(e-mail address removed).........
0012be94 1f bd 92 30 00 00 00 00 - 04 00 00 00 01 00 00 00
....0............

State Dump for Thread Id 0x143

eax=653529c0 ebx=01b9ff24 ecx=0012cdd4 edx=00000000 esi=7ffdf000
edi=00000001
eip=77f6838b esp=01b9ff00 ebp=01b9ff54 iopl=0 nv up ei pl nz
ac pe cy
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000
efl=00000213


function: NtWaitForMultipleObjects
77f68380 b8c4000000 mov eax,0xc4
77f68385 8d542404 lea edx,[esp+0x4]
ss:02bae907=????????
77f68389 cd2e int 2e
77f6838b c21400 ret 0x14
77f6838e 8bc0 mov eax,eax

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
01b9ff54 77f1cf41 00000002 01b9ff98 00000000 ffffffff
ntdll!NtWaitForMultipleObjects
01b9ff70 65352a46 00000002 01b9ff98 00000000 ffffffff
kernel32!WaitForMultipleObjects

State Dump for Thread Id 0x127

eax=00000001 ebx=00000000 ecx=0013ba84 edx=00000000 esi=0015c2d8
edi=001449a0
eip=77f68067 esp=01cafdf0 ebp=01caff90 iopl=0 nv up ei pl nz
na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000
efl=00000202


function: ZwReplyWaitReceivePort
77f6805c b890000000 mov eax,0x90
77f68061 8d542404 lea edx,[esp+0x4]
ss:02cbe7f7=????????
77f68065 cd2e int 2e
77f68067 c21000 ret 0x10
77f6806a 8bc0 mov eax,eax

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
01caff90 77e17f38 77e17b56 001449a0 01caffec 00000100
ntdll!ZwReplyWaitReceivePort
00003a98 00000000 00000000 00000000 00000000 00000000
rpcrt4!I_RpcAllocate

*----> Raw Stack Dump <----*
01cafdf0 96 7f e1 77 58 01 00 00 - 6c ff ca 01 00 00 00 00
....wX...l.......
01cafe00 a8 16 14 00 90 4a 14 00 - 3c 02 14 00 44 02 14 00
......J..<...D...
01cafe10 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
01cafe20 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
01cafe30 1f 00 00 00 78 fe ca 01 - dd 1a 00 10 10 82 00 10
.....x...........
01cafe40 00 00 00 00 00 00 00 00 - 02 00 00 00 00 00 00 00
.................
01cafe50 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
01cafe60 00 00 00 00 00 00 00 00 - 01 00 00 00 02 00 00 00
.................
01cafe70 00 00 00 00 01 00 00 00 - 98 fe ca 01 d6 3b 3b 65
..............;;e
01cafe80 00 00 34 65 02 00 00 00 - 00 00 00 00 d8 df 13 00
...4e............
01cafe90 00 f0 fd 7f 50 e0 13 00 - 00 f0 fd 7f 67 3e f6 77
.....P.......g>.w
01cafea0 00 00 fe 3f 02 00 00 00 - 00 00 00 00 1c ff ca 01
....?............
01cafeb0 00 00 00 00 92 12 f6 77 - 60 65 fa 77 98 12 f6 77
........w`e.w...w
01cafec0 30 ff ca 01 c0 d7 e5 77 - a8 b3 13 00 00 00 00 00
0......w........
01cafed0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
01cafee0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
01cafef0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
01caff00 00 00 00 00 c0 fe ca 01 - 00 00 00 00 ff ff ff ff
.................
01caff10 94 2f f9 77 e8 e0 f9 77 - ff ff ff ff 00 00 00 00
../.w...w........
01caff20 47 65 f7 77 4f 65 f7 77 - 30 ff ca 01 01 00 00 00
Ge.wOe.w0.......

State Dump for Thread Id 0x124

eax=00000331 ebx=00000d00 ecx=00000051 edx=00000000 esi=00000000
edi=035bff9c
eip=77eae1e3 esp=035bff38 ebp=035bff5c iopl=0 nv up ei pl zr
na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000
efl=00000246


function: GetMenuItemRect
77eae1c8 b884110000 mov eax,0x1184
77eae1cd 8d542404 lea edx,[esp+0x4]
ss:045ce93f=????????
77eae1d1 cd2e int 2e
77eae1d3 c21000 ret 0x10
77eae1d6 8bc0 mov eax,eax
77eae1d8 b885110000 mov eax,0x1185
77eae1dd 8d542404 lea edx,[esp+0x4]
ss:045ce93f=????????
77eae1e1 cd2e int 2e
77eae1e3 c21400 ret 0x14
77eae1e6 8bc0 mov eax,eax

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
035bff5c 30a0d917 035bff9c 00000000 00000000 00000000
user32!GetMenuItemRect
035bffb8 77f04ef0 00000000 77f8f4d7 30a0dfdf 00000000
!MsoFCustomAWDatabases
035bffec 00000000 30a0d86a 00000000 00000000 000000b0
kernel32!lstrcmpiW
00000000 00000000 00000000 00000000 00000000 00000000 !<nosymbols>

*----> Raw Stack Dump <----*
035bff38 ba 2b e7 77 9c ff 5b 03 - 00 00 00 00 00 00 00 00
..+.w..[.........
035bff48 00 00 00 00 58 ff 5b 03 - f8 1d e7 77 00 00 00 00
.....X.[....w....
035bff58 09 04 09 04 b8 ff 5b 03 - 17 d9 a0 30 9c ff 5b 03
.......[....0..[.
035bff68 00 00 00 00 00 00 00 00 - 00 00 00 00 d7 f4 f8 77
................w
035bff78 df df a0 30 00 00 00 00 - e2 01 2b 00 a6 c0 00 00
....0......+.....
035bff88 01 00 00 00 00 01 00 00 - 75 12 e3 0d f6 01 00 00
.........u.......
035bff98 e7 01 00 00 00 00 00 00 - 00 0d 00 00 08 00 00 00
.................
035bffa8 00 00 00 00 b7 b7 eb 0d - 58 01 00 00 37 01 00 00
.........X...7...
035bffb8 ec ff 5b 03 f0 4e f0 77 - 00 00 00 00 d7 f4 f8 77
...[..N.w.......w
035bffc8 df df a0 30 00 00 00 00 - df df a0 30 c4 ff 5b 03
....0.......0..[.
035bffd8 00 00 13 00 ff ff ff ff - 6c b9 f3 77 50 d2 f3 77
.........l..wP..w
035bffe8 00 00 00 00 00 00 00 00 - 00 00 00 00 6a d8 a0 30
.............j..0
035bfff8 00 00 00 00 00 00 00 00 - b0 00 00 00 00 01 00 00
.................
035c0008 ff ee ff ee 02 10 00 00 - 00 00 00 00 00 fe 00 00
.................
035c0018 00 00 10 00 00 20 00 00 - 00 02 00 00 00 20 00 00 .....
........ ..
035c0028 af 01 00 00 ff ef fd 7f - 0d 00 48 05 00 00 00 00
...........H.....
035c0038 00 00 00 00 00 00 00 00 - 00 00 00 00 d8 04 5c 03
...............\.
035c0048 0f 00 00 00 f8 ff ff ff - 50 00 5c 03 50 00 5c 03
.........P.\.P.\.
035c0058 80 05 5c 03 00 00 00 00 - 00 00 00 00 00 00 00 00
...\.............
035c0068 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................

State Dump for Thread Id 0x126

eax=77e17bf2 ebx=00000000 ecx=00000000 edx=00000000 esi=0014023c
edi=001449a0
eip=77f68067 esp=0551fdf0 ebp=0551ff90 iopl=0 nv up ei pl nz
na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000
efl=00000206


function: ZwReplyWaitReceivePort
77f6805c b890000000 mov eax,0x90
77f68061 8d542404 lea edx,[esp+0x4]
ss:0652e7f7=4f004400
77f68065 cd2e int 2e
77f68067 c21000 ret 0x10
77f6806a 8bc0 mov eax,eax

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0551ff90 77e17f38 77e17b56 001449a0 0551ffec 00000000
ntdll!ZwReplyWaitReceivePort
00003a98 00000000 00000000 00000000 00000000 00000000
rpcrt4!I_RpcAllocate



Application exception occurred:
App: (pid=359)
When: 6/16/2004 @ 15:3:21.708
Exception number: c0000005 (access violation)

*----> System Information <----*
Computer Name: 11876T
User Name: 11955
Number of Processors: 1
Processor Type: x86 Family 6 Model 8 Stepping 1
Windows Version: 4.0
Current Build: 1381
Service Pack: 6
Current Type: Uniprocessor Free
Registered Organization: Weather Shield Mfg., Inc.
Registered Owner: Autorized User

*----> Task List <----*
0 Idle.exe
2 System.exe
20 smss.exe
24 csrss.exe
34 winlogon.exe
40 services.exe
43 lsass.exe
70 spoolss.exe
85 Mcshield.exe
99 VsTskMgr.exe
90 RpcSs.exe
120 nddeagnt.exe
106 hpzstatn.exe
127 FrameworkServic.exe
137 pstores.exe
141 MSTask.exe
163 Explorer.exe
170 NAPRDMGR.exe
194 point32.exe
200 UpdaterUI.exe
202 loadwc.exe
223 SHSTAT.exe
237 pcsws.exe
217 ddhelp.exe
195 pcscm.exe
230 OUTLOOK.exe
251 MAPISP32.exe
39 AGENTSVR.exe
345 WINLOG~1.exe
317 pcsws.exe
359 EXCEL.exe
381 HPFSTSC0.exe
369 HPFPEGN0.exe
257 drwtsn32.exe
0 _Total.exe

(30000000 - 306d9000)
(77f60000 - 77fbf000) dll\ntdll.dbg
(77dc0000 - 77dff000) dll\advapi32.dbg
(77f00000 - 77f5f000) dll\kernel32.dbg
(77e70000 - 77ec2000) dll\user32.dbg
(78140000 - 78175000) dll\gdi32.dbg
(77e10000 - 77e67000) dll\rpcrt4.dbg
(308c0000 - 30e1d000)
(77b20000 - 77bd1000) dll\ole32.dbg
(61210000 - 6121f000)
(770f0000 - 772ed000)
(77c40000 - 77d7b000) dll\shell32.dbg
(71710000 - 71794000) dll\comctl32.dbg
(10000000 - 1000c000)
(671a0000 - 671a0000)
(67670000 - 67670000)
(673a0000 - 673a0000)
(78000000 - 78044000)
(780a0000 - 780b2000)
(674a0000 - 674a0000)
(67610000 - 67628000)
(719b0000 - 719b8000)
(67600000 - 67606000)
(668d0000 - 668d0000)
(676d0000 - 676d0000)
(674e0000 - 674e9000)
(67490000 - 67490000)
(676b0000 - 676b0000)
(67480000 - 67480000)
(67170000 - 67170000)
(66b20000 - 66b20000)
(67580000 - 67580000)
(67680000 - 67680000)
(676c0000 - 676c6000)
(674b0000 - 674b0000)
(675b0000 - 675b0000)
(776d0000 - 776d8000) dll\wsock32.dbg
(776b0000 - 776c4000) dll\ws2_32.dbg
(776a0000 - 776a7000) dll\ws2help.dbg
(780c0000 - 78121000)
(67180000 - 67180000)
(676a0000 - 676a7000)
(67060000 - 67060000)
(67310000 - 67310000)
(67190000 - 67190000)
(673d0000 - 673e1000)
(67050000 - 67050000)
(5f400000 - 5f4f2000)
(674f0000 - 674f0000)
(77d80000 - 77db2000) dll\comdlg32.dbg
(66b90000 - 66bb7000)
(65340000 - 653db000) D:\OA\rwin32\oleaut32.dll
(3ffe0000 - 3ffe0000)
(63670000 - 63670000)
(63460000 - 63460000)
(62a70000 - 62a70000)
(62a80000 - 62a80000)
(65000000 - 65264000) Vbe6.dbg
(65300000 - 65327000) vbe6intl.dbg
(02270000 - 02270000)
(71300000 - 71306000) dll\msidle.dbg
(61220000 - 61232000)
(779b0000 - 779b9000) dll\linkinfo.dbg
(77720000 - 77731000) dll\mpr.dbg
(77a40000 - 77a4d000) dll\ntshrui.dbg
(4ca00000 - 4ca41000) dll\netapi32.dbg
(77840000 - 77849000) dll\NetRap.dbg
(777e0000 - 777ed000) dll\samlib.dbg
(77950000 - 77979000) dll\wldap32.dbg
(77bf0000 - 77bf7000) dll\rpcltc1.dbg
(67f90000 - 67f9e000)
(32a00000 - 32a22000)
(28750000 - 2875e000)
(777f0000 - 777fc000) dll\ntlanman.dbg
(77890000 - 778a5000) dll\netui0.dbg
(77850000 - 7788a000) dll\netui1.dbg
(48000000 - 4806c000)
(04290000 - 043d9000)
(70a70000 - 70ad5000)
(77fd0000 - 77ffa000) dll\winmm.dbg
(77c00000 - 77c18000) drv\winspool.dbg
(763a0000 - 763ac000) dll\mf3216.dbg

State Dump for Thread Id 0x9f

eax=04f24164 ebx=88000000 ecx=00000010 edx=04fa8398 esi=03e7e38c
edi=04eb821c
eip=300cd0ec esp=0012eb58 ebp=0012ec28 iopl=0 nv up ei ng nz
ac po cy
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000
efl=00000297


function: Ordinal44
300cd0c0 85f6 test esi,esi
300cd0c2 0f840c4d1900 je Ordinal44+0x261dd4
(30261dd4)
300cd0c8 817c240c00008088
ss:0113d55f=????????
cmp dword ptr
[esp+0xc],0x88800000
300cd0d0 0f840d4d1900 je Ordinal44+0x261de3
(30261de3)
300cd0d6 8b06 mov eax,[esi]
ds:03e7e38c=00000002
300cd0d8 48 dec eax
300cd0d9 83f805 cmp eax,0x5
300cd0dc 0f87c34d1900 jnbe Ordinal44+0x261ea5
(30261ea5)
300cd0e2 ff248590d20c30
ds:04f24164=????????
jmp dword ptr [Ordinal44+0xcd290
(300cd290)+eax*4]
300cd0e9 8b4604 mov eax,[esi+0x4]
ds:04e8cd92=????????
FAULT ->300cd0ec 80480302 or byte ptr [eax+0x3],0x2
ds:05f32b6a=??
300cd0f0 8b4604 mov eax,[esi+0x4]
ds:04e8cd92=????????
300cd0f3 66816002fffb and word ptr [eax+0x2],0xfbff
ds:05f32b6b=????
300cd0f9 8b7608 mov esi,[esi+0x8]
ds:04e8cd92=????????
300cd0fc 808ef600000040 or byte ptr [esi+0xf6],0x40
ds:03e7e482=e7
300cd103 5e pop esi
300cd104 c21000 ret 0x10
300cd107 56 push esi
300cd108 ff742408 push dword ptr [esp+0x8]
ss:0113d55f=????????
300cd10c e81a79f6ff call Ordinal44+0x34a2b (30034a2b)
300cd111 a1b80b6a30 mov eax,[306a0bb8]
ds:306a0bb8=05400b48
300cd116 8bb0ac030000 mov esi,[eax+0x3ac]
ds:04f24510=????????

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0012ec28 301783ec 00000002 0000033c 00000000 00000002 !Ordinal44
0012ed80 30177610 00000218 0000000d 00000100 00000100 !Ordinal44
0012ee0c 3017739b 04fa2960 00000000 00000218 ec00000d !Ordinal44
0012ee2c 305747b1 04fa2960 00000218 ec20000d 00000100 !Ordinal44
0012eee8 30574ac3 01a7e720 04fa230c 00000000 00000000 !LPenHelper
0012ef30 30583610 00000000 04fa230c 00000001 00000139 !LPenHelper
0012f518 30036897 00000000 00000000 00000001 00edbdc4 !LPenHelper
0012f6b8 301742a6 00000139 00000000 00000000 00000001 !Ordinal44
0012f70c 30961ffc 3068b2e4 00000000 00000139 0012f788 !Ordinal44
0012f778 3096154a 00000000 00000000 00000001 00edbdc0
!MsoFPitbsFromHwnd
0012f7d8 309608c0 00edbdc0 00000001 00edbdc0 000000c8 !UnlockCab
0012f84c 30902409 00edbdc0 0000000a 00000088 01110061 !UnlockCab
0012f934 308f4246 0000000a 04330544 00000202 00000000
!MsoFGetEnvelopeClsid
0012f9ac 77e71416 04330544 00000202 00000000 01110061
!MsoRegEnumKeyExW
0012fa80 01110061 0b7e1a99 000000c8 00000246 308f5189
user32!TranslateMessageEx

*----> Raw Stack Dump <----*
0012eb58 14 82 eb 04 ff 95 17 30 - 8c e3 e7 03 00 00 00 88
........0........
0012eb68 98 83 fa 04 00 00 00 00 - 00 00 00 00 0d 00 00 00
.................
0012eb78 02 00 00 00 54 ee 12 00 - 28 ec 12 00 41 44 53 30
.....T...(...ADS0
0012eb88 54 ed 12 00 08 ec 12 00 - 6c eb 12 00 db 26 68 30
T.......l....&h0
0012eb98 00 00 00 00 00 00 00 00 - 10 00 00 00 90 eb 12 00
.................
0012eba8 30 31 eb 04 10 83 eb 04 - 02 00 00 00 3c 03 00 00
01..........<...
0012ebb8 88 7b 01 03 84 7b 01 03 - 02 00 00 00 33 00 00 00
..{...{......3...
0012ebc8 98 83 fa 04 00 02 3c 03 - 0c fe b1 02 00 00 00 00
.......<.........
0012ebd8 00 00 00 00 00 00 00 00 - 30 6f d6 30 00 00 00 00
.........0o.0....
0012ebe8 98 83 fa 04 98 83 fa 04 - 10 00 00 00 14 00 00 00
.................
0012ebf8 00 00 00 00 00 00 00 00 - 00 00 00 00 02 04 00 00
.................
0012ec08 12 00 00 00 01 00 20 00 - 03 00 00 00 01 00 00 00 ......
..........
0012ec18 1c 82 eb 04 06 00 00 00 - a4 96 01 03 a4 96 01 03
.................
0012ec28 80 ed 12 00 ec 83 17 30 - 02 00 00 00 3c 03 00 00
........0....<...
0012ec38 00 00 00 00 02 00 00 00 - 01 00 00 00 00 00 00 00
.................
0012ec48 00 01 00 00 80 ed 12 00 - 00 00 00 00 01 00 00 00
.................
0012ec58 00 00 00 00 34 ec 12 00 - e1 77 17 30 00 00 00 00
.....4....w.0....
0012ec68 64 00 00 00 01 00 00 00 - 4e 00 00 10 69 3d 14 78
d.......N...i=.x
0012ec78 00 00 00 00 00 00 80 00 - 00 00 00 00 0a 00 00 00
.................
0012ec88 00 00 00 00 e0 ed 12 00 - 20 e7 a7 01 0c 00 00 00 ........
........

State Dump for Thread Id 0x19e

eax=653529c0 ebx=01b9ff24 ecx=0012cdd4 edx=00000000 esi=7ffdf000
edi=00000001
eip=77f6838b esp=01b9ff00 ebp=01b9ff54 iopl=0 nv up ei pl nz
ac pe cy
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000
efl=00000213


function: NtWaitForMultipleObjects
77f68380 b8c4000000 mov eax,0xc4
77f68385 8d542404 lea edx,[esp+0x4]
ss:02bae907=????????
77f68389 cd2e int 2e
77f6838b c21400 ret 0x14
77f6838e 8bc0 mov eax,eax

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
01b9ff54 77f1cf41 00000002 01b9ff98 00000000 ffffffff
ntdll!NtWaitForMultipleObjects
01b9ff70 65352a46 00000002 01b9ff98 00000000 ffffffff
kernel32!WaitForMultipleObjects

State Dump for Thread Id 0x10c

eax=00000d70 ebx=00000000 ecx=001403d0 edx=00000000 esi=0015c5d0
edi=001449a0
eip=77f68067 esp=01cafdf0 ebp=01caff90 iopl=0 nv up ei pl nz
na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000
efl=00000206


function: ZwReplyWaitReceivePort
77f6805c b890000000 mov eax,0x90
77f68061 8d542404 lea edx,[esp+0x4]
ss:02cbe7f7=????????
77f68065 cd2e int 2e
77f68067 c21000 ret 0x10
77f6806a 8bc0 mov eax,eax

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
01caff90 77e17f38 77e17b56 001449a0 01caffec 00000100
ntdll!ZwReplyWaitReceivePort
00003a98 00000000 00000000 00000000 00000000 00000000
rpcrt4!I_RpcAllocate

*----> Raw Stack Dump <----*
01cafdf0 96 7f e1 77 58 01 00 00 - 6c ff ca 01 00 00 00 00
....wX...l.......
01cafe00 c0 22 14 00 90 4a 14 00 - 3c 02 14 00 44 02 14 00
.."...J..<...D...
01cafe10 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
01cafe20 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
01cafe30 1f 00 00 00 78 fe ca 01 - dd 1a 00 10 10 82 00 10
.....x...........
01cafe40 00 00 00 00 00 00 00 00 - 02 00 00 00 00 00 00 00
.................
01cafe50 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
01cafe60 00 00 00 00 00 00 00 00 - 01 00 00 00 02 00 00 00
.................
01cafe70 00 00 00 00 01 00 00 00 - 98 fe ca 01 d6 3b 3b 65
..............;;e
01cafe80 00 00 34 65 02 00 00 00 - 00 00 00 00 d8 df 13 00
...4e............
01cafe90 00 f0 fd 7f 50 e0 13 00 - 00 f0 fd 7f 67 3e f6 77
.....P.......g>.w
01cafea0 00 00 fe 3f 02 00 00 00 - 00 00 00 00 1c ff ca 01
....?............
01cafeb0 00 00 00 00 92 12 f6 77 - 60 65 fa 77 98 12 f6 77
........w`e.w...w
01cafec0 30 ff ca 01 c0 d7 e5 77 - a8 b3 13 00 00 00 00 00
0......w........
01cafed0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
01cafee0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
01cafef0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
01caff00 00 00 00 00 c0 fe ca 01 - 00 00 00 00 ff ff ff ff
.................
01caff10 94 2f f9 77 e8 e0 f9 77 - ff ff ff ff 00 00 00 00
../.w...w........
01caff20 47 65 f7 77 4f 65 f7 77 - 30 ff ca 01 01 00 00 00
Ge.wOe.w0.......

State Dump for Thread Id 0x176

eax=00000000 ebx=00000d00 ecx=00000004 edx=00000000 esi=00000000
edi=035bff9c
eip=77eae1e3 esp=035bff38 ebp=035bff5c iopl=0 nv up ei pl zr
na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000
efl=00000246


function: GetMenuItemRect
77eae1c8 b884110000 mov eax,0x1184
77eae1cd 8d542404 lea edx,[esp+0x4]
ss:045ce93f=????????
77eae1d1 cd2e int 2e
77eae1d3 c21000 ret 0x10
77eae1d6 8bc0 mov eax,eax
77eae1d8 b885110000 mov eax,0x1185
77eae1dd 8d542404 lea edx,[esp+0x4]
ss:045ce93f=????????
77eae1e1 cd2e int 2e
77eae1e3 c21400 ret 0x14
77eae1e6 8bc0 mov eax,eax

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
035bff5c 30a0d917 035bff9c 00000000 00000000 00000000
user32!GetMenuItemRect
035bffb8 77f04ef0 00000000 77f8f4d7 30a0dfdf 00000000
!MsoFCustomAWDatabases
035bffec 00000000 30a0d86a 00000000 00000000 000000b0
kernel32!lstrcmpiW
00000000 00000000 00000000 00000000 00000000 00000000 !<nosymbols>

*----> Raw Stack Dump <----*
035bff38 ba 2b e7 77 9c ff 5b 03 - 00 00 00 00 00 00 00 00
..+.w..[.........
035bff48 00 00 00 00 58 ff 5b 03 - f8 1d e7 77 00 00 00 00
.....X.[....w....
035bff58 09 04 09 04 b8 ff 5b 03 - 17 d9 a0 30 9c ff 5b 03
.......[....0..[.
035bff68 00 00 00 00 00 00 00 00 - 00 00 00 00 d7 f4 f8 77
................w
035bff78 df df a0 30 00 00 00 00 - 14 03 92 13 b8 c0 00 00
....0............
035bff88 01 00 00 00 8a 01 00 00 - 7b fe aa 0a 79 02 00 00
.........{...y...
035bff98 f5 02 00 00 00 00 00 00 - 00 0d 00 00 08 00 00 00
.................
035bffa8 00 00 00 00 91 fa 7c 0b - 8b 02 00 00 d8 01 00 00
.......|.........
035bffb8 ec ff 5b 03 f0 4e f0 77 - 00 00 00 00 d7 f4 f8 77
...[..N.w.......w
035bffc8 df df a0 30 00 00 00 00 - df df a0 30 c4 ff 5b 03
....0.......0..[.
035bffd8 00 00 13 00 ff ff ff ff - 6c b9 f3 77 50 d2 f3 77
.........l..wP..w
035bffe8 00 00 00 00 00 00 00 00 - 00 00 00 00 6a d8 a0 30
.............j..0
035bfff8 00 00 00 00 00 00 00 00 - b0 00 00 00 00 01 00 00
.................
035c0008 ff ee ff ee 02 10 00 00 - 00 00 00 00 00 fe 00 00
.................
035c0018 00 00 10 00 00 20 00 00 - 00 02 00 00 00 20 00 00 .....
........ ..
035c0028 ab 01 00 00 ff ef fd 7f - 0d 00 48 05 00 00 00 00
...........H.....
035c0038 00 00 00 00 00 00 00 00 - 00 00 00 00 d8 04 5c 03
...............\.
035c0048 0f 00 00 00 f8 ff ff ff - 50 00 5c 03 50 00 5c 03
.........P.\.P.\.
035c0058 80 05 5c 03 00 00 00 00 - 00 00 00 00 00 00 00 00
...\.............
035c0068 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................

State Dump for Thread Id 0x15d

eax=00000001 ebx=00000000 ecx=00140be8 edx=00000000 esi=0015c5d0
edi=001449a0
eip=77f68067 esp=045afdf0 ebp=045aff90 iopl=0 nv up ei pl nz
na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000
efl=00000206


function: ZwReplyWaitReceivePort
77f6805c b890000000 mov eax,0x90
77f68061 8d542404 lea edx,[esp+0x4]
ss:055be7f7=????????
77f68065 cd2e int 2e
77f68067 c21000 ret 0x10
77f6806a 8bc0 mov eax,eax

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
045aff90 77e17f38 77e17b56 001449a0 045affec 00000000
ntdll!ZwReplyWaitReceivePort
00003a98 00000000 00000000 00000000 00000000 00000000
rpcrt4!I_RpcAllocate



Application exception occurred:
App: (pid=267)
When: 7/2/2004 @ 14:27:6.747
Exception number: c0000005 (access violation)

*----> System Information <----*
Computer Name: 11876T
User Name: 11955
Number of Processors: 1
Processor Type: x86 Family 6 Model 8 Stepping 1
Windows Version: 4.0
Current Build: 1381
Service Pack: 6
Current Type: Uniprocessor Free
Registered Organization: Weather Shield Mfg., Inc.
Registered Owner: Autorized User

*----> Task List <----*
0 Idle.exe
2 System.exe
20 smss.exe
24 csrss.exe
34 winlogon.exe
40 services.exe
43 lsass.exe
69 spoolss.exe
88 Mcshield.exe
97 VsTskMgr.exe
114 RpcSs.exe
101 hpzstatn.exe
44 FrameworkServic.exe
136 pstores.exe
139 MSTask.exe
182 NAPRDMGR.exe
161 nddeagnt.exe
172 Explorer.exe
170 point32.exe
59 UpdaterUI.exe
105 loadwc.exe
237 SHSTAT.exe
169 pcsws.exe
233 ddhelp.exe
239 pcscm.exe
269 OUTLOOK.exe
249 MAPISP32.exe
267 EXCEL.exe
312 pcsws.exe
298 PHOTOED.exe
307 AcroRd32.exe
348 AGENTSVR.exe
421 winvnc.exe
403 iexplore.exe
484 HPFSTSC0.exe
393 HPFPEGN0.exe
455 drwtsn32.exe
0 _Total.exe

(30000000 - 306d9000)
(77f60000 - 77fbf000) dll\ntdll.dbg
(77dc0000 - 77dff000) dll\advapi32.dbg
(77f00000 - 77f5f000) dll\kernel32.dbg
(77e70000 - 77ec2000) dll\user32.dbg
(78140000 - 78175000) dll\gdi32.dbg
(77e10000 - 77e67000) dll\rpcrt4.dbg
(308c0000 - 30e1d000)
(77b20000 - 77bd1000) dll\ole32.dbg
(61210000 - 6121f000)
(77c40000 - 77d7b000) dll\shell32.dbg
(71710000 - 71794000) dll\comctl32.dbg
(65340000 - 653db000) D:\OA\rwin32\oleaut32.dll
(65000000 - 65264000) Vbe6.dbg
(65300000 - 65327000) vbe6intl.dbg
(61220000 - 61232000)
(71300000 - 71306000) dll\msidle.dbg
(770f0000 - 772ed000)
(779b0000 - 779b9000) dll\linkinfo.dbg
(77720000 - 77731000) dll\mpr.dbg
(77a40000 - 77a4d000) dll\ntshrui.dbg
(78000000 - 78044000)
(4ca00000 - 4ca41000) dll\netapi32.dbg
(77840000 - 77849000) dll\NetRap.dbg
(777e0000 - 777ed000) dll\samlib.dbg
(776d0000 - 776d8000) dll\wsock32.dbg
(776b0000 - 776c4000) dll\ws2_32.dbg
(776a0000 - 776a7000) dll\ws2help.dbg
(77950000 - 77979000) dll\wldap32.dbg
(77bf0000 - 77bf7000) dll\rpcltc1.dbg
(48000000 - 4806c000)
(777f0000 - 777fc000) dll\ntlanman.dbg
(77890000 - 778a5000) dll\netui0.dbg
(77850000 - 7788a000) dll\netui1.dbg
(02b70000 - 02cb9000)
(70a70000 - 70ad5000)
(77fd0000 - 77ffa000) dll\winmm.dbg
(77c00000 - 77c18000) drv\winspool.dbg
(61dd0000 - 61df1000) dll\mapistub.dbg
(62100000 - 621c3000) MSMAPI32.dbg
(3ff30000 - 3ff48000) dll\gapi32.dbg
(77a90000 - 77a9b000) dll\version.dbg
(779c0000 - 779c8000) dll\lz32.dbg
(626f0000 - 62715000) EMSABP32.dbg
(625d0000 - 625ef000) EMSUI32.dbg
(62030000 - 620ee000) OUTEX.dbg
(74fc0000 - 74fcf000) dll\rpcltccm.dbg
(77670000 - 77687000) dll\mswsock.dbg
(74ff0000 - 74ffe000) dll\rnr20.dbg
(77660000 - 7766f000) dll\msafd.dbg
(77690000 - 77699000) dll\wshtcpip.dbg
(76e70000 - 76e82000) dll\secur128.dbg
(077d0000 - 077e1000) dll\msapsspc.dbg
(779d0000 - 779d0000)
(780a0000 - 780b2000)
(77400000 - 7741e000) dll\sch128c.dbg
(5e380000 - 5e3a5000) dll\msoss.dbg
(5cf00000 - 5cf75000) dll\crypt32.dbg
(07800000 - 07810000) dll\msasn1.dbg
(07810000 - 07820000)
(716d0000 - 716ef000) dll\msnsspc.dbg
(3a020000 - 3a03f000)
(629a0000 - 62a32000) MSPST32.dbg
(62730000 - 627c0000) EMSMDB32.dbg
(67f90000 - 67f9e000)
(32a00000 - 32a22000)
(28750000 - 2875e000)
(10000000 - 10000000)

State Dump for Thread Id 0xe1

eax=00000005 ebx=00000000 ecx=00000000 edx=80000000 esi=00750008
edi=0012ddb0
eip=3057f69d esp=0012bd64 ebp=0012c07c iopl=0 nv up ei pl zr
na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000
efl=00000246


function: LPenHelper
3057f677 74e2 jz LPenHelper+0x17b141
(3057f65b)
3057f679 8d85f4fcffff lea eax,[ebp+0xfffffcf4]
ss:0012bd70=0012c1e0
3057f67f 50 push eax
3057f680 57 push edi
3057f681 e89589b9ff call Ordinal44+0x11801b
(3011801b)
3057f686 d12508f16830 shl dword ptr [3068f108],1
ds:3068f108=00000001
3057f68c eb89 jmp LPenHelper+0x17b0fd
(3057f617)
3057f68e ff750c push dword ptr [ebp+0xc]
ss:0154aa82=????????
3057f691 ff1544150030
ds:30001544=308ca275
call dword ptr [Ordinal44+0x1544
(30001544)]
3057f697 8b0d34356a30 mov ecx,[306a3534]
ds:306a3534=00000000
FAULT ->3057f69d 66894110 mov [ecx+0x10],ax
ds:0141ea07=????
3057f6a1 a134356a30 mov eax,[306a3534]
ds:306a3534=00000000
3057f6a6 0fb74810 movzx ecx,word ptr [eax+0x10]
ds:0141ea0c=????
3057f6aa d1e1 shl ecx,1
3057f6ac 51 push ecx
3057f6ad 83c012 add eax,0x12
3057f6b0 ff750c push dword ptr [ebp+0xc]
ss:0154aa82=????????
3057f6b3 50 push eax
3057f6b4 e83f0ba9ff call Ordinal44+0x101f8 (300101f8)
3057f6b9 83c40c add esp,0xc
3057f6bc ff7518 push dword ptr [ebp+0x18]
ss:0154aa82=????????
3057f6bf e8727cb9ff call Ordinal44+0x117336
(30117336)

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0012c07c 30a6bf23 00000002 00750008 05c00c1c 00000010 !LPenHelper
0012c09c 30a696e9 05c00214 00000002 00750008 05c00c1c !GetSelectedLbx
0012c4f8 30a67484 05c00214 00000009 05c00c1c 00000010 !TmtGetTmc
0012c510 30a697d3 05c00214 0000000c 05c00c1c 00000010 !WindowOfDlgCur
0012c968 30a67484 05c00214 00000008 05c00c1c 00000010 !TmtGetTmc
0012c980 30a63d8f 05c00214 00000010 05c00c1c 00000010 !WindowOfDlgCur
0012c99c 30a6b59e 05c00214 00000200 0000001d 30a63acd !FKillDlgFocus
0012c9c8 30a634bd 05c00514 05c00514 00000004 0012cb94 !ClbeGetLbx
0012c9e0 30a68a21 00000000 00008001 00000000 00000000
!IEntryFindListBox
0012c9f8 30a63592 05c00514 00008001 00000000 00000000 !SetTmcText
0012ca18 30a63451 00bf01e0 00000004 00000000 0012cb94
!IEntryFindListBox
0012ca34 30a68a21 05c00514 00000004 00000000 0012cb94
!IEntryFindListBox
0012ca4c 30a6b1fc 05c00514 00000004 00000000 0012cb94 !SetTmcText
0012caac 30a67bb7 00000004 00000000 0012cb94 00474da0 !GetLbxLbg
0012cb80 77e72cf4 495b04e6 00000202 00000000 00bf01e0 !TmcGetFocus
0012cb9c 77e82834 ffff035c 495b04e6 00000202 00000000
user32!ScreenToClient
0012cbbc 30171b1c ffff035c 495b04e6 00000202 00000000
user32!CallWindowProcW
0012cbd8 77e71416 495b04e6 00000202 00000000 00bf01e0 !Ordinal44
0012ccf4 00bf01e0 065cb847 00000203 00000183 05c008a4
user32!TranslateMessageEx

*----> Raw Stack Dump <----*
0012bd64 00 00 00 00 08 00 75 00 - 00 00 00 00 e0 c1 12 00
.......u.........
0012bd74 ee c1 12 00 54 b2 ea 77 - 01 00 00 00 98 bd 12 00
.....T..w........
0012bd84 01 00 00 00 8e bd 12 00 - ac bd 02 01 bc bd 12 00
.................
0012bd94 54 83 3e 30 14 c4 12 00 - 04 00 00 00 16 c4 12 00
T.>0............
0012bda4 fc 10 90 30 16 c4 12 00 - 09 00 00 00 52 c6 12 00
....0........R...
0012bdb4 09 00 00 00 04 00 00 00 - 00 00 00 00 14 c4 12 00
.................
0012bdc4 55 25 17 30 14 c4 12 00 - 50 c6 12 00 04 00 00 00
U%.0....P.......
0012bdd4 50 c6 12 00 8c 27 ac 00 - b4 c8 12 00 00 00 31 40
P....'[email protected]
0012bde4 00 00 00 00 00 b8 8c 40 - 00 00 00 00 00 00 31 40
[email protected]@
0012bdf4 00 00 00 f0 17 80 76 40 - 00 00 00 00 00 00 31 40
[email protected]@
0012be04 00 00 00 08 f4 77 81 c0 - 00 00 00 00 00 00 00 80
......w..........
0012be14 00 00 00 00 00 00 74 40 - 00 00 00 00 00 00 31 40
[email protected]@
0012be24 00 00 00 00 00 b8 8c 40 - 00 00 00 00 00 00 31 40
[email protected]@
0012be34 00 00 00 00 00 b8 82 c0 - 00 00 00 00 00 00 00 80
.................
0012be44 dc bf 12 00 1a 71 a4 30 - 6c bf 12 00 dc bf 12 00
......q.0l.......
0012be54 f8 72 a4 30 02 00 00 00 - ac c9 12 00 00 00 00 00
..r.0............
0012be64 00 00 01 01 00 00 00 00 - e0 dc ed 3f 00 00 00 00
............?....
0012be74 00 00 00 00 00 00 00 f0 - 17 80 76 40 00 00 00 00
[email protected]
0012be84 00 00 31 40 3a 00 c1 05 - 03 00 00 00 c4 be 12 00
[email protected]:...........
0012be94 1f bd 92 30 08 00 00 00 - 04 00 00 00 cc be 12 00
....0............

State Dump for Thread Id 0x77

eax=00000000 ebx=00000000 ecx=00beff88 edx=00000000 esi=00164998
edi=0013e738
eip=77f68067 esp=00befdf0 ebp=00beff90 iopl=0 nv up ei pl nz
na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000
efl=00000206


function: ZwReplyWaitReceivePort
77f6805c b890000000 mov eax,0x90
77f68061 8d542404 lea edx,[esp+0x4]
ss:0200e7f7=????????
77f68065 cd2e int 2e
77f68067 c21000 ret 0x10
77f6806a 8bc0 mov eax,eax

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
00beff90 77e17f38 77e17b56 0013e738 00beffec 0012e638
ntdll!ZwReplyWaitReceivePort
00003a98 00000000 00000000 00000000 00000000 00000000
rpcrt4!I_RpcAllocate

*----> Raw Stack Dump <----*
00befdf0 96 7f e1 77 c0 00 00 00 - 6c ff be 00 00 00 00 00
....w....l.......
00befe00 d8 b2 13 00 58 e8 13 00 - 1c 9f 13 00 24 9f 13 00
.....X.......$...
00befe10 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
00befe20 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
00befe30 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
00befe40 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
00befe50 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
00befe60 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
00befe70 00 00 00 00 00 00 00 00 - 00 00 00 00 98 fe be 00
.................
00befe80 c7 bb b2 77 00 00 b2 77 - 02 00 00 00 00 00 00 00
....w...w........
00befe90 e0 2c 13 00 00 f0 fd 7f - d8 2c 13 00 67 3e f6 77
..,.......,..g>.w
00befea0 00 00 b2 77 02 00 00 00 - 00 00 00 00 1c ff be 00
....w............
00befeb0 00 00 00 00 92 12 f6 77 - 60 65 fa 77 98 12 f6 77
........w`e.w...w
00befec0 30 ff be 00 3e 10 e5 77 - 40 8c 13 00 00 00 00 00
0...>[email protected]
00befed0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
00befee0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
00befef0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
00beff00 00 00 00 00 c0 fe be 00 - 00 00 00 00 ff ff ff ff
.................
00beff10 94 2f f9 77 e8 e0 f9 77 - ff ff ff ff 00 00 00 00
../.w...w........
00beff20 47 65 f7 77 4f 65 f7 77 - 30 ff be 00 01 00 00 00
Ge.wOe.w0.......

State Dump for Thread Id 0x59

eax=00000000 ebx=00000000 ecx=0013a158 edx=00000000 esi=00164998
edi=0013e738
eip=77f68067 esp=0322fdf0 ebp=0322ff90 iopl=0 nv up ei pl nz
na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000
efl=00000206


function: ZwReplyWaitReceivePort
77f6805c b890000000 mov eax,0x90
77f68061 8d542404 lea edx,[esp+0x4]
ss:0464e7f7=????????
77f68065 cd2e int 2e
77f68067 c21000 ret 0x10
77f6806a 8bc0 mov eax,eax

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0322ff90 77e17f38 77e17b56 0013e738 0322ffec 00000000
ntdll!ZwReplyWaitReceivePort
00003a98 00000000 00000000 00000000 00000000 00000000
rpcrt4!I_RpcAllocate

State Dump for Thread Id 0x129

eax=00000000 ebx=00000000 ecx=00000001 edx=00000000 esi=05beff94
edi=000000c8
eip=77f679df esp=05beff80 ebp=05beff9c iopl=0 nv up ei pl nz
na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000
efl=00000202


function: NtDelayExecution
77f679d4 b827000000 mov eax,0x27
77f679d9 8d542404 lea edx,[esp+0x4]
ss:0700e987=????????
77f679dd cd2e int 2e
77f679df c20800 ret 0x8
77f679e2 8bc0 mov eax,eax

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
05beff9c 77f1d087 000000c8 00000000 6504ce7c 000000c8
ntdll!NtDelayExecution
05beffec 00000000 6504ce6c 00000000 00000000 00340034 kernel32!Sleep
00000000 00000000 00000000 00000000 00000000 00000000 !<nosymbols>

*----> Raw Stack Dump <----*
05beff80 be d0 f1 77 00 00 00 00 - 94 ff be 05 7c d0 f1 77
....w........|..w
05beff90 00 00 00 00 80 7b e1 ff - ff ff ff ff ec ff be 05
......{..........
05beffa0 87 d0 f1 77 c8 00 00 00 - 00 00 00 00 7c ce 04 65
....w........|..e
05beffb0 c8 00 00 00 dc ed 12 00 - f5 65 8c 30 f0 4e f0 77
..........e.0.N.w
05beffc0 00 00 00 00 dc ed 12 00 - f5 65 8c 30 00 00 00 00
..........e.0....
05beffd0 f5 65 8c 30 c4 ff be 05 - cc 2d 74 00 ff ff ff ff
..e.0.....-t.....
05beffe0 6c b9 f3 77 50 d2 f3 77 - 00 00 00 00 00 00 00 00
l..wP..w........
05befff0 00 00 00 00 6c ce 04 65 - 00 00 00 00 00 00 00 00
.....l..e........
05bf0000 34 00 34 00 00 10 d8 03 - 01 00 00 00 00 00 00 00
4.4.............
05bf0010 06 00 00 00 1a 00 00 00 - 0a 00 00 00 00 00 00 00
.................
05bf0020 00 00 00 00 40 8d 09 06 - 01 00 0a 00 0a 00 00 00
[email protected]
05bf0030 00 00 00 00 00 00 cc 0f - 00 00 00 00 00 00 00 00
.................
05bf0040 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
05bf0050 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
05bf0060 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
05bf0070 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
05bf0080 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
05bf0090 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
05bf00a0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
05bf00b0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................

State Dump for Thread Id 0x167

eax=00000000 ebx=0765fe74 ecx=0000020c edx=00000000 esi=7ffdf000
edi=00000001
eip=77f6838b esp=0765fe50 ebp=0765fea4 iopl=0 nv up ei pl nz
ac pe cy
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000
efl=00000213


function: NtWaitForMultipleObjects
77f68380 b8c4000000 mov eax,0xc4
77f68385 8d542404 lea edx,[esp+0x4]
ss:08a7e857=????????
77f68389 cd2e int 2e
77f6838b c21400 ret 0x14
77f6838e 8bc0 mov eax,eax

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0765fea4 77e7ae57 00000003 0765fecc 00000000 ffffffff
ntdll!NtWaitForMultipleObjects
0765ff00 77e7ae9c 00000002 0765ff78 ffffffff 000000ff
user32!MsgWaitForMultipleObjectsEx
0765ff1c 62107518 00000002 0765ff78 00000000 ffffffff
user32!MsgWaitForMultipleObjects
77f67600 8b000000 83042454 7500147a 42fff04f 8b197504
MSMAPI32!ScInitMapiUtil

*----> Raw Stack Dump <----*
0765fe50 34 d0 f1 77 03 00 00 00 - 74 fe 65 07 01 00 00 00
4..w....t.e.....
0765fe60 00 00 00 00 00 00 00 00 - d4 fe 65 07 00 00 00 00
...........e.....
0765fe70 cc fe 65 07 b8 00 00 00 - 1c 02 00 00 08 02 00 00
...e.............
0765fe80 00 76 f6 77 61 cc 11 62 - e0 26 46 07 95 cc 11 62
..v.wa..b.&F....b
0765fe90 a4 ff 65 07 26 23 e7 77 - 64 ff 65 07 00 00 00 00
...e.&#.wd.e.....
0765fea0 00 00 00 00 00 ff 65 07 - 57 ae e7 77 03 00 00 00
.......e.W..w....
0765feb0 cc fe 65 07 00 00 00 00 - ff ff ff ff 00 00 00 00
...e.............
0765fec0 26 23 e7 77 f8 1d e7 77 - 7f ae e7 77 b8 00 00 00
&#.w...w...w....
0765fed0 1c 02 00 00 08 02 00 00 - 49 4f f0 77 0b 86 10 62
.........IO.w...b
0765fee0 5c 0b 46 07 d3 85 10 62 - 5c 0b 46 07 e2 cd f1 77
\.F....b\.F....w
0765fef0 00 00 00 00 00 00 00 00 - 44 a0 fd 7f 08 02 00 00
.........D.......
0765ff00 1c ff 65 07 9c ae e7 77 - 02 00 00 00 78 ff 65 07
...e....w....x.e.
0765ff10 ff ff ff ff ff 00 00 00 - 00 00 00 00 00 76 f6 77
..............v.w
0765ff20 18 75 10 62 02 00 00 00 - 78 ff 65 07 00 00 00 00
..u.b....x.e.....
0765ff30 ff ff ff ff ff 00 00 00 - 2c eb 12 00 61 5c f6 77
.........,...a\.w
0765ff40 ec ff 65 07 74 ec 12 00 - 00 00 00 00 68 bc 76 84
...e.t.......h.v.
0765ff50 f0 a6 11 80 00 01 00 00 - 67 e0 0d 05 00 00 00 00
.........g.......
0765ff60 84 00 30 c0 dc 08 46 07 - 7c 00 46 07 54 0b 46 07
...0...F.|.F.T.F.
0765ff70 00 00 00 00 01 00 00 00 - b8 00 00 00 1c 02 00 00
.................
0765ff80 d8 9d 13 00 ff ff ff ff - 00 00 00 00 00 00 00 00
.................

State Dump for Thread Id 0x134

eax=00000000 ebx=07a6fec8 ecx=7ffd9000 edx=00000000 esi=7ffdf000
edi=00000001
eip=77f6838b esp=07a6fea4 ebp=07a6fef8 iopl=0 nv up ei pl nz
ac pe cy
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000
efl=00000213


function: NtWaitForMultipleObjects
77f68380 b8c4000000 mov eax,0xc4
77f68385 8d542404 lea edx,[esp+0x4]
ss:08e8e8ab=00000000
77f68389 cd2e int 2e
77f6838b c21400 ret 0x14
77f6838e 8bc0 mov eax,eax

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
07a6fef8 77e7ae57 00000002 07a6ff20 00000000 ffffffff
ntdll!NtWaitForMultipleObjects
07a6ff54 77e7ae9c 00000001 07421e1c ffffffff 000000ff
user32!MsgWaitForMultipleObjectsEx
07a6ff70 6211514d 00000001 07421e1c 00000000 ffffffff
user32!MsgWaitForMultipleObjects
77f67600 8b000000 83042454 7500147a 42fff04f 8b197504
MSMAPI32!MAPIDeinitIdle

*----> Raw Stack Dump <----*
07a6fea4 34 d0 f1 77 02 00 00 00 - c8 fe a6 07 01 00 00 00
4..w............
07a6feb4 00 00 00 00 00 00 00 00 - 24 ff a6 07 00 00 00 00
.........$.......
07a6fec4 20 ff a6 07 b4 02 00 00 - 84 02 00 00 00 00 00 00
................
07a6fed4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
07a6fee4 00 00 00 00 00 1f 0a fa - ff ff ff ff 00 00 00 00
.................
07a6fef4 00 00 00 00 54 ff a6 07 - 57 ae e7 77 02 00 00 00
.....T...W..w....
07a6ff04 20 ff a6 07 00 00 00 00 - ff ff ff ff 00 00 00 00
................
07a6ff14 1c 1e 42 07 d0 1d 42 07 - 00 1e 42 07 b4 02 00 00
...B...B...B.....
07a6ff24 84 02 00 00 40 ff a6 07 - 58 90 fd 7f 44 90 fd 7f
[email protected]
07a6ff34 d8 51 45 00 00 00 00 00 - 00 00 00 00 00 00 00 00
..QE.............
07a6ff44 00 00 00 00 00 00 00 00 - 44 90 fd 7f 84 02 00 00
.........D.......
07a6ff54 70 ff a6 07 9c ae e7 77 - 01 00 00 00 1c 1e 42 07
p......w......B.
07a6ff64 ff ff ff ff ff 00 00 00 - 00 00 00 00 00 76 f6 77
..............v.w
07a6ff74 4d 51 11 62 01 00 00 00 - 1c 1e 42 07 00 00 00 00
MQ.b......B.....
07a6ff84 ff ff ff ff ff 00 00 00 - 00 00 00 00 ec ff a6 07
.................
07a6ff94 ff ff ff ff b0 e9 12 00 - 00 00 00 00 46 02 00 00
.............F...
07a6ffa4 83 77 11 80 e0 ee 3b 87 - 80 ed 3b 87 b4 c9 11 80
..w....;...;.....
07a6ffb4 68 4b 38 87 83 91 f6 77 - f0 4e f0 77 00 00 00 00
hK8....w.N.w....
07a6ffc4 ff ff ff ff b0 e9 12 00 - 00 00 00 00 b0 e9 12 00
.................
07a6ffd4 c4 ff a6 07 88 06 13 00 - ff ff ff ff 6c b9 f3 77
.............l..w

State Dump for Thread Id 0x16e

eax=001d1f70 ebx=00000000 ecx=001d1f70 edx=00000000 esi=07cfff88
edi=74ff3891
eip=77f679df esp=07cfff74 ebp=07cfff90 iopl=0 nv up ei pl nz
na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000
efl=00000206


function: NtDelayExecution
77f679d4 b827000000 mov eax,0x27
77f679d9 8d542404 lea edx,[esp+0x4]
ss:0911e97b=????????
77f679dd cd2e int 2e
77f679df c20800 ret 0x8
77f679e2 8bc0 mov eax,eax

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
07cfff90 77f1d087 00001388 00000000 77e32c0d 00001388
ntdll!NtDelayExecution
07cfffec 00000000 00000000 00000000 00000000 00000000 kernel32!Sleep
00000000 00000000 00000000 00000000 00000000 00000000 !<nosymbols>

State Dump for Thread Id 0x163

eax=7ffd6000 ebx=07fffd40 ecx=00000000 edx=00000000 esi=00000000
edi=00000270
eip=77f6839b esp=07fffca0 ebp=07fffcf4 iopl=0 nv up ei pl zr
na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000
efl=00000246


function: NtWaitForSingleObject
77f68390 b8c5000000 mov eax,0xc5
77f68395 8d542404 lea edx,[esp+0x4]
ss:0941e6a7=????????
77f68399 cd2e int 2e
77f6839b c20c00 ret 0xc
77f6839e 8bc0 mov eax,eax

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
07fffcf4 77664a12 00000270 0000028c 00000001 00000004
ntdll!NtWaitForSingleObject
07fffe1c 776ba274 00000000 07fffeb8 00000000 00000000
msafd!<nosymbols>
07fffe6c 6275cdcc 00000000 07fffeb8 00000000 00000000 ws2_32!select
0000011c 00000000 00000000 00000000 00000000 00000000
EMSMDB32!MSProviderInit

*----> Raw Stack Dump <----*
07fffca0 f3 87 66 77 70 02 00 00 - 01 00 00 00 cc fc ff 07
...fwp...........
07fffcb0 00 00 00 00 b8 fe ff 07 - 40 fd ff 07 60 d0 36 82
[email protected]`.6.
07fffcc0 6a 60 c4 01 ff ff ff ff - ff ff ff 7f c0 b4 b3 ff
j`..............
07fffcd0 ff ff ff ff 00 00 00 00 - 5f 1a 73 62 01 00 00 00
........._.sb....
07fffce0 c3 49 66 77 8c 02 00 00 - 70 02 00 00 00 00 00 00
..Ifw....p.......
07fffcf0 00 00 00 00 1c fe ff 07 - 12 4a 66 77 70 02 00 00
..........Jfwp...
07fffd00 8c 02 00 00 01 00 00 00 - 04 00 00 00 98 fd 73 03
...............s.
07fffd10 b8 fe ff 07 b0 ed 20 00 - 00 1f 0a fa ff ff ff ff ......
..........
07fffd20 00 00 00 00 00 fe ff 07 - 8c 02 00 00 19 00 00 00
.................
07fffd30 ff ff ff ff 7c 02 00 00 - 19 00 00 00 48 05 13 00
.....|.......H...
07fffd40 12 00 00 00 00 00 00 00 - d0 1d bb 07 00 00 00 00
.................
07fffd50 78 d7 17 00 88 06 13 00 - 00 00 13 00 00 00 00 00
x...............
07fffd60 10 00 00 00 10 00 00 00 - 6c fe ff 07 01 00 00 00
.........l.......
07fffd70 50 e8 f9 77 00 00 00 00 - 00 00 00 00 00 00 00 00
P..w............
07fffd80 0a 00 00 00 80 69 67 ff - 00 00 00 00 00 00 00 00
......ig.........
07fffd90 f6 ff ff ff 01 00 00 00 - ff ff ff ff e0 97 74 03
...............t.
07fffda0 94 fd ff 07 00 00 00 00 - 5c fe ff 07 6c b9 f3 77
.........\...l..w
07fffdb0 20 cc f3 77 ff ff ff ff - 6c fe ff 07 20 fd ff 07
...w....l... ...
07fffdc0 38 00 00 00 03 01 00 00 - 28 fd ff 07 e0 97 74 03
8.......(.....t.
07fffdd0 00 00 00 00 00 00 00 00 - 02 00 00 00 7b 27 00 00
.............{'..

State Dump for Thread Id 0x13c

eax=08e920b0 ebx=00000d00 ecx=08e920bc edx=00000000 esi=00000000
edi=08e8ff9c
eip=77eae1e3 esp=08e8ff38 ebp=08e8ff5c iopl=0 nv up ei pl zr
na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000
efl=00000246


function: GetMenuItemRect
77eae1c8 b884110000 mov eax,0x1184
77eae1cd 8d542404 lea edx,[esp+0x4]
ss:0a2ae93f=????????
77eae1d1 cd2e int 2e
77eae1d3 c21000 ret 0x10
77eae1d6 8bc0 mov eax,eax
77eae1d8 b885110000 mov eax,0x1185
77eae1dd 8d542404 lea edx,[esp+0x4]
ss:0a2ae93f=????????
77eae1e1 cd2e int 2e
77eae1e3 c21400 ret 0x14
77eae1e6 8bc0 mov eax,eax

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
08e8ff5c 30a0d917 08e8ff9c 00000000 00000000 00000000
user32!GetMenuItemRect
08e8ffb8 77f04ef0 00000000 77f8f4d7 30a0dfdf 00000000
!MsoFCustomAWDatabases
08e8ffec 00000000 30a0d86a 00000000 00000000 000000b0
kernel32!lstrcmpiW
00000000 00000000 00000000 00000000 00000000 00000000 !<nosymbols>

*----> Raw Stack Dump <----*
08e8ff38 ba 2b e7 77 9c ff e8 08 - 00 00 00 00 00 00 00 00
..+.w............
08e8ff48 00 00 00 00 58 ff e8 08 - f8 1d e7 77 00 00 00 00
.....X......w....
08e8ff58 09 04 09 04 b8 ff e8 08 - 17 d9 a0 30 9c ff e8 08
............0....
08e8ff68 00 00 00 00 00 00 00 00 - 00 00 00 00 d7 f4 f8 77
................w
08e8ff78 df df a0 30 00 00 00 00 - 6c 06 1d 00 a3 c0 00 00
....0....l.......
08e8ff88 01 00 00 00 d9 01 00 00 - 13 9b f9 05 b8 00 00 00
.................
08e8ff98 de 00 00 00 00 00 00 00 - 00 0d 00 00 08 00 00 00
.................
08e8ffa8 00 00 00 00 03 9d 5c 06 - 29 01 00 00 2a 01 00 00
.......\.)...*...
08e8ffb8 ec ff e8 08 f0 4e f0 77 - 00 00 00 00 d7 f4 f8 77
......N.w.......w
08e8ffc8 df df a0 30 00 00 00 00 - df df a0 30 c4 ff e8 08
....0.......0....
08e8ffd8 00 00 13 00 ff ff ff ff - 6c b9 f3 77 50 d2 f3 77
.........l..wP..w
08e8ffe8 00 00 00 00 00 00 00 00 - 00 00 00 00 6a d8 a0 30
.............j..0
08e8fff8 00 00 00 00 00 00 00 00 - b0 00 00 00 00 01 00 00
.................
08e90008 ff ee ff ee 02 10 00 00 - 00 00 00 00 00 fe 00 00
.................
08e90018 00 00 10 00 00 20 00 00 - 00 02 00 00 00 20 00 00 .....
........ ..
08e90028 ab 01 00 00 ff ef fd 7f - 14 00 48 05 00 00 00 00
...........H.....
08e90038 00 00 00 00 00 00 00 00 - 00 00 00 00 d8 04 e9 08
.................
08e90048 0f 00 00 00 f8 ff ff ff - 50 00 e9 08 50 00 e9 08
.........P...P...
08e90058 80 05 e9 08 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
08e90068 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................

State Dump for Thread Id 0x1ae

eax=653529c0 ebx=03bdff24 ecx=0012f84c edx=00000000 esi=7ffdf000
edi=00000001
eip=77f6838b esp=03bdff00 ebp=03bdff54 iopl=0 nv up ei pl nz
ac pe cy
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000
efl=00000213


function: NtWaitForMultipleObjects
77f68380 b8c4000000 mov eax,0xc4
77f68385 8d542404 lea edx,[esp+0x4]
ss:04ffe907=????????
77f68389 cd2e int 2e
77f6838b c21400 ret 0x14
77f6838e 8bc0 mov eax,eax

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
03bdff54 77f1cf41 00000002 03bdff98 00000000 ffffffff
ntdll!NtWaitForMultipleObjects
03bdff70 65352a46 00000002 03bdff98 00000000 ffffffff
kernel32!WaitForMultipleObjects
 
Ad

Advertisements


Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top