OK. I'm particularly suspicious of the native MSADODC.OCX being used. I've googled around and found at least one other person who has had recent problems with it and was told that activeX controls in general can be problematic. Below is a snippet out of a +relay listing. It starts out working with an .mdb file, does some ADOish looking things and then looks like it is outputting the ADO error message to the apps error log right at the end. Can someone who is better at reading these things than I am tell me any more about what is going on? Thanks, Steve Bergman 000d:Call ntdll.WideCharToMultiByte(00000000,00000000,4076064c L"p:\\Program Files\\Electronic Manual\\databases\\index.mdb",ffffffff,40a02030,00000105,00000000,00000000) ret=66025580 000d:Ret ntdll.WideCharToMultiByte() retval=00000037 ret=66025580 000d:Call ntdll.GetFullPathNameA(40a02030 "p:\\Program Files\\Electronic Manual\\databases\\index.mdb",00000104,40a0226c,40a02028) ret=660255e1 000d:Ret ntdll.GetFullPathNameA() retval=00000036 ret=660255e1 000d:Call ntdll.WideCharToMultiByte(00000000,00000000,4076064c L"p:\\Program Files\\Electronic Manual\\databases\\index.mdb",ffffffff,40a024b8,00000105,00000000,00000000) ret=660283e0 000d:Ret ntdll.WideCharToMultiByte() retval=00000037 ret=660283e0 000d:Call ntdll.FindClose(407112c2) ret=6602f23d 000d:Ret ntdll.FindClose() retval=00000001 ret=6602f23d 000d:Call ntdll.FindFirstFileA(40a024b8 "p:\\Program Files\\Electronic Manual\\databases\\index.mdb",40a02008) ret=6602560f 000d:Ret ntdll.FindFirstFileA() retval=407112c2 ret=6602560f 000d:Call ntdll.FileTimeToLocalFileTime(40a0200c,40a01fdc) ret=6602d726 000d:Ret ntdll.FileTimeToLocalFileTime() retval=00000001 ret=6602d726 000d:Call ntdll.FileTimeToSystemTime(40a01fdc,40a01fe4) ret=6602d73e 000d:Ret ntdll.FileTimeToSystemTime() retval=00000001 ret=6602d73e 000d:Call ntdll.FileTimeToLocalFileTime(40a02014,40a01fdc) ret=6602d726 000d:Ret ntdll.FileTimeToLocalFileTime() retval=00000001 ret=6602d726 000d:Call ntdll.FileTimeToSystemTime(40a01fdc,40a01fe4) ret=6602d73e 000d:Ret ntdll.FileTimeToSystemTime() retval=00000001 ret=6602d73e 000d:Call ntdll.FileTimeToLocalFileTime(40a0201c,40a01fdc) ret=6602d726 000d:Ret ntdll.FileTimeToLocalFileTime() retval=00000001 ret=6602d726 000d:Call ntdll.FileTimeToSystemTime(40a01fdc,40a01fe4) ret=6602d73e 000d:Ret ntdll.FileTimeToSystemTime() retval=00000001 ret=6602d73e 000d:Call ntdll.MultiByteToWideChar(00000000,00000000,40a02394 "index.mdb",ffffffff,00000000,00000000) ret=66028641 000d:Ret ntdll.MultiByteToWideChar() retval=0000000a ret=66028641 000d:Call ntdll.TlsGetValue(00000002) ret=65341473 000d:Ret ntdll.TlsGetValue() retval=4070dc10 ret=65341473 000d:Call ntdll.MultiByteToWideChar(00000000,00000000,40a02394 "index.mdb",ffffffff,4077f564,0000000a) ret=66028689 000d:Ret ntdll.MultiByteToWideChar() retval=0000000a ret=66028689 000d:Call ntdll.TlsGetValue(00000002) ret=6534153b 000d:Ret ntdll.TlsGetValue() retval=4070dc10 ret=6534153b 000d:Call ntdll.RtlSizeHeap(406d0000,00000000,40776618) ret=40c22cc1 000d:Ret ntdll.RtlSizeHeap() retval=000000c0 ret=40c22cc1 000d:Call ntdll.TlsGetValue(00000002) ret=6534153b 000d:Ret ntdll.TlsGetValue() retval=4070dc10 ret=6534153b 000d:Call ntdll.RtlSizeHeap(406d0000,00000000,4077f560) ret=40c22cc1 000d:Ret ntdll.RtlSizeHeap() retval=00000020 ret=40c22cc1 000d:Call ntdll.TlsGetValue(00000002) ret=6534153b 000d:Ret ntdll.TlsGetValue() retval=4070dc10 ret=6534153b 000d:Call ntdll.RtlSizeHeap(406d0000,00000000,40760648) ret=40c22cc1 000d:Ret ntdll.RtlSizeHeap() retval=00000100 ret=40c22cc1 000d:Call ntdll.TlsGetValue(00000006) ret=66024578 000d:Ret ntdll.TlsGetValue() retval=4070ed50 ret=66024578 000d:Call ntdll.TlsGetValue(00000002) ret=65343da3 000d:Ret ntdll.TlsGetValue() retval=4070dc10 ret=65343da3 000d:Call ntdll.TlsGetValue(00000002) ret=65343da3 000d:Ret ntdll.TlsGetValue() retval=4070dc10 ret=65343da3 000d:Call ntdll.TlsGetValue(00000002) ret=65343da3 000d:Ret ntdll.TlsGetValue() retval=4070dc10 ret=65343da3 000d:Call ntdll.TlsGetValue(00000002) ret=65343da3 000d:Ret ntdll.TlsGetValue() retval=4070dc10 ret=65343da3 000d:Call ntdll.TlsGetValue(00000002) ret=65343da3 000d:Ret ntdll.TlsGetValue() retval=4070dc10 ret=65343da3 000d:Call ntdll.TlsGetValue(00000002) ret=65343da3 000d:Ret ntdll.TlsGetValue() retval=4070dc10 ret=65343da3 000d:Call ntdll.TlsGetValue(00000002) ret=6534153b 000d:Ret ntdll.TlsGetValue() retval=4070dc10 ret=6534153b 000d:Call ntdll.RtlSizeHeap(406d0000,00000000,40776618) ret=40c22cc1 000d:Ret ntdll.RtlSizeHeap() retval=000000c0 ret=40c22cc1 000d:Call ntdll.TlsGetValue(00000002) ret=6534153b 000d:Ret ntdll.TlsGetValue() retval=4070dc10 ret=6534153b 000d:Call ntdll.RtlSizeHeap(406d0000,00000000,40760648) ret=40c22cc1 000d:Ret ntdll.RtlSizeHeap() retval=00000100 ret=40c22cc1 000d:Call ntdll.TlsGetValue(00000002) ret=6534153b 000d:Ret ntdll.TlsGetValue() retval=4070dc10 ret=6534153b 000d:Call ntdll.RtlSizeHeap(406d0000,00000000,407608c8) ret=40c22cc1 000d:Ret ntdll.RtlSizeHeap() retval=000000d0 ret=40c22cc1 000d:Call ntdll.TlsGetValue(00000002) ret=6534153b 000d:Ret ntdll.TlsGetValue() retval=4070dc10 ret=6534153b 000d:Call ntdll.RtlSizeHeap(406d0000,00000000,407766e0) ret=40c22cc1 000d:Ret ntdll.RtlSizeHeap() retval=000000d0 ret=40c22cc1 000d:Call ole32.SetErrorInfo(00000000,00000000) ret=6535e17c 000d:Call ntdll.IsBadReadPtr(4070d7f8,00000058) ret=40c1ed5a 000d:Ret ntdll.IsBadReadPtr() retval=00000000 ret=40c1ed5a 000d:Ret ole32.SetErrorInfo() retval=00000000 ret=6535e17c 000d:Call ole32.CoGetClassObject(0041efa4,00000005,00000000,66030160,40a02540) ret=660475a4 000d:Call advapi32.RegOpenKeyExA(80000000,40a022c4 "CLSID\\{00000514-0000-0010-8000-00AA006D2EA4}\\InprocServer32",00000000,00020019,40a02074) ret=40c17b50 000d:Ret advapi32.RegOpenKeyExA() retval=00000000 ret=40c17b50 000d:Call advapi32.RegQueryValueExA(00000118,00000000,00000000,40a0206c,40a02078,40a02070) ret=40c17b7a 000d:Ret advapi32.RegQueryValueExA() retval=00000000 ret=40c17b7a 000d:Call advapi32.RegCloseKey(00000118) ret=40c17bbf 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=40c17bbf 000d:Call ntdll.LoadLibraryExA(40a021bc "C:\\Program Files\\Common Files\\System\\ADO\\msado15.dll",00000000,00000008) ret=40c17e5a 000d:Ret ntdll.LoadLibraryExA() retval=00000000 ret=40c17e5a err:ole:CoGetClassObject couldn't load InprocServer32 dll C:\Program Files\Common Files\System\ADO\msado15.dll 000d:Call ntdll.CreateFileA(40a020c4 "\\\\.\\pipe\\{00000514-0000-0010-8000-00AA006D2EA4}",c0000000,00000000,00000000,00000003,00000000,00000000) ret=40c2e02b 000d:Ret ntdll.CreateFileA() retval=ffffffff ret=40c2e02b 000d:Call advapi32.RegOpenKeyExA(80000000,40a01ef0 "CLSID\\{00000514-0000-0010-8000-00AA006D2EA4}\\LocalServer32",00000000,00020019,40a01c3c) ret=40c2deea 000d:Ret advapi32.RegOpenKeyExA() retval=00000002 ret=40c2deea 000d:Ret ole32.CoGetClassObject() retval=80040150 ret=660475a4 000d:Call ntdll.TlsGetValue(00000006) ret=660473ac 000d:Ret ntdll.TlsGetValue() retval=4070ed50 ret=660473ac 000d:Call ole32.GetErrorInfo(00000000,40a024e4) ret=6535e1aa 000d:Ret ole32.GetErrorInfo() retval=00000001 ret=6535e1aa 000d:Call ntdll.TlsGetValue(00000006) ret=6601d660 000d:Ret ntdll.TlsGetValue() retval=4070ed50 ret=6601d660 000d:Call ntdll.TlsGetValue(00000006) ret=66024e07 000d:Ret ntdll.TlsGetValue() retval=4070ed50 ret=66024e07 000d:Call ntdll.RaiseException(c000008f,00000001,00000002,40a024e8) ret=66024e92 000d:Call ntdll.IsBadReadPtr(00401548,00000004) ret=66024ee0 000d:Ret ntdll.IsBadReadPtr() retval=00000000 ret=66024ee0 000d:Call ntdll.TlsGetValue(00000006) ret=66025019 000d:Ret ntdll.TlsGetValue() retval=4070ed50 ret=66025019 000d:Call ntdll.RtlUnwind(40a025cc,661001ad,00000000,00000000) ret=661001ad fs=1007 eax=00000001 ebx=404818e4 ecx=40a025cc edx=00000006 esi=00401548 edi=40a025cc ebp=40a01f84 esp=40a01f78 ds=002b es=002b gs=0007 flags=00200202 000d:Ret ntdll.RtlUnwind() retval=00000000 ret=661001ad fs=1007 eax=00000000 ebx=404818e4 ecx=40a025cc edx=00000006 esi=00401548 edi=40a025cc ebp=40a01f84 esp=40a01f78 ds=002b es=002b gs=0007 flags=00200202 000d:Call ntdll.TlsGetValue(00000006) ret=66025078 000d:Ret ntdll.TlsGetValue() retval=4070ed50 ret=66025078 000d:Call ntdll.TlsGetValue(00000006) ret=66024f99 000d:Ret ntdll.TlsGetValue() retval=4070ed50 ret=66024f99 000d:Call ntdll.TlsGetValue(00000006) ret=66025167 000d:Ret ntdll.TlsGetValue() retval=4070ed50 ret=66025167 000d:Call ntdll.TlsGetValue(00000006) ret=66047a37 000d:Ret ntdll.TlsGetValue() retval=4070ed50 ret=66047a37 000d:Call ntdll.TlsGetValue(00000002) ret=6534153b 000d:Ret ntdll.TlsGetValue() retval=4070dc10 ret=6534153b 000d:Call ntdll.RtlSizeHeap(406d0000,00000000,407609a0) ret=40c22cc1 000d:Ret ntdll.RtlSizeHeap() retval=000000f0 ret=40c22cc1 000d:Call ntdll.TlsGetValue(00000002) ret=6534153b 000d:Ret ntdll.TlsGetValue() retval=4070dc10 ret=6534153b 000d:Call ntdll.RtlSizeHeap(406d0000,00000000,407780f0) ret=40c22cc1 000d:Ret ntdll.RtlSizeHeap() retval=00000018 ret=40c22cc1 000d:Call ntdll.TlsGetValue(00000002) ret=65343da3 000d:Ret ntdll.TlsGetValue() retval=4070dc10 ret=65343da3 000d:Call ntdll.RtlAllocateHeap(406d0000,00000000,000001e0) ret=40c229a1 000d:Ret ntdll.RtlAllocateHeap() retval=40790560 ret=40c229a1 000d:Call ole32.SetErrorInfo(00000000,00000000) ret=6535e17c 000d:Call ntdll.IsBadReadPtr(4070d7f8,00000058) ret=40c1ed5a 000d:Ret ntdll.IsBadReadPtr() retval=00000000 ret=40c1ed5a 000d:Ret ole32.SetErrorInfo() retval=00000000 ret=6535e17c 000d:Call ole32.CoGetClassObject(0041efa4,00000005,00000000,66030160,40a025b8) ret=660475a4 000d:Call advapi32.RegOpenKeyExA(80000000,40a0233c "CLSID\\{00000514-0000-0010-8000-00AA006D2EA4}\\InprocServer32",00000000,00020019,40a020ec) ret=40c17b50 000d:Ret advapi32.RegOpenKeyExA() retval=00000000 ret=40c17b50 000d:Call advapi32.RegQueryValueExA(00000118,00000000,00000000,40a020e4,40a020f0,40a020e8) ret=40c17b7a 000d:Ret advapi32.RegQueryValueExA() retval=00000000 ret=40c17b7a 000d:Call advapi32.RegCloseKey(00000118) ret=40c17bbf 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=40c17bbf 000d:Call ntdll.LoadLibraryExA(40a02234 "C:\\Program Files\\Common Files\\System\\ADO\\msado15.dll",00000000,00000008) ret=40c17e5a 000d:Ret ntdll.LoadLibraryExA() retval=00000000 ret=40c17e5a err:ole:CoGetClassObject couldn't load InprocServer32 dll C:\Program Files\Common Files\System\ADO\msado15.dll 000d:Call ntdll.CreateFileA(40a0213c "\\\\.\\pipe\\{00000514-0000-0010-8000-00AA006D2EA4}",c0000000,00000000,00000000,00000003,00000000,00000000) ret=40c2e02b 000d:Ret ntdll.CreateFileA() retval=ffffffff ret=40c2e02b 000d:Call advapi32.RegOpenKeyExA(80000000,40a01f68 "CLSID\\{00000514-0000-0010-8000-00AA006D2EA4}\\LocalServer32",00000000,00020019,40a01cb4) ret=40c2deea 000d:Ret advapi32.RegOpenKeyExA() retval=00000002 ret=40c2deea 000d:Ret ole32.CoGetClassObject() retval=80040150 ret=660475a4 000d:Call ntdll.TlsGetValue(00000006) ret=660473ac 000d:Ret ntdll.TlsGetValue() retval=4070ed50 ret=660473ac 000d:Call ole32.GetErrorInfo(00000000,40a0255c) ret=6535e1aa 000d:Ret ole32.GetErrorInfo() retval=00000001 ret=6535e1aa 000d:Call ntdll.TlsGetValue(00000006) ret=6601d660 000d:Ret ntdll.TlsGetValue() retval=4070ed50 ret=6601d660 000d:Call ntdll.TlsGetValue(00000006) ret=66024e07 000d:Ret ntdll.TlsGetValue() retval=4070ed50 ret=66024e07 000d:Call ntdll.RaiseException(c000008f,00000001,00000002,40a02560) ret=66024e92 000d:Call ntdll.IsBadReadPtr(004029e8,00000004) ret=66024ee0 000d:Ret ntdll.IsBadReadPtr() retval=00000000 ret=66024ee0 000d:Call ntdll.IsBadReadPtr(004053e0,00000004) ret=66024ee0 000d:Ret ntdll.IsBadReadPtr() retval=00000000 ret=66024ee0 000d:Call ntdll.TlsGetValue(00000006) ret=66025019 000d:Ret ntdll.TlsGetValue() retval=4070ed50 ret=66025019 000d:Call ntdll.RtlUnwind(40a027c8,661001ad,00000000,00000000) ret=661001ad fs=1007 eax=00000001 ebx=404818e4 ecx=40a027c8 edx=00000006 esi=004053e0 edi=40a027c8 ebp=40a01ffc esp=40a01ff0 ds=002b es=002b gs=0007 flags=00200212 000d:Call ntdll.IsBadReadPtr(004029e8,00000004) ret=66024ee0 000d:Ret ntdll.IsBadReadPtr() retval=00000000 ret=66024ee0 000d:Call ntdll.TlsGetValue(00000002) ret=6534153b 000d:Ret ntdll.TlsGetValue() retval=4070dc10 ret=6534153b 000d:Call ntdll.RtlSizeHeap(406d0000,00000000,40790560) ret=40c22cc1 000d:Ret ntdll.RtlSizeHeap() retval=000001e0 ret=40c22cc1 000d:Call ntdll.RtlFreeHeap(406d0000,00000000,40776b00) ret=40c22be3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=40c22be3 000d:Ret ntdll.RtlUnwind() retval=00000000 ret=661001ad fs=1007 eax=00000000 ebx=404818e4 ecx=40a027c8 edx=00000006 esi=004053e0 edi=40a027c8 ebp=40a01ffc esp=40a01ff0 ds=002b es=002b gs=0007 flags=00200212 000d:Call ntdll.TlsGetValue(00000006) ret=66025078 000d:Ret ntdll.TlsGetValue() retval=4070ed50 ret=66025078 000d:Call ntdll.TlsGetValue(00000006) ret=66024f99 000d:Ret ntdll.TlsGetValue() retval=4070ed50 ret=66024f99 000d:Call ntdll.TlsGetValue(00000006) ret=66025167 000d:Ret ntdll.TlsGetValue() retval=4070ed50 ret=66025167 000d:Call ntdll.TlsGetValue(00000006) ret=6602518d 000d:Ret ntdll.TlsGetValue() retval=4070ed50 ret=6602518d 000d:Call ntdll.TlsGetValue(00000006) ret=6602518d 000d:Ret ntdll.TlsGetValue() retval=4070ed50 ret=6602518d 000d:Call ntdll.TlsGetValue(00000006) ret=660133cd 000d:Ret ntdll.TlsGetValue() retval=4070ed50 ret=660133cd 000d:Call ntdll.TlsGetValue(00000006) ret=660d7e6e 000d:Ret ntdll.TlsGetValue() retval=4070ed50 ret=660d7e6e 000d:Call ntdll.TlsGetValue(00000006) ret=660df8a6 000d:Ret ntdll.TlsGetValue() retval=4070ed50 ret=660df8a6 000d:Call user32.LoadStringA(66000000,0000274e,40a02248,000001f4) ret=660df968 000d:Ret user32.LoadStringA() retval=00000010 ret=660df968 000d:Call ntdll.MultiByteToWideChar(00000000,00000000,40a02248 "Automation error",ffffffff,00000000,00000000) ret=660dfb1b 000d:Ret ntdll.MultiByteToWideChar() retval=00000011 ret=660dfb1b 000d:Call ntdll.TlsGetValue(00000002) ret=65341473 000d:Ret ntdll.TlsGetValue() retval=4070dc10 ret=65341473 000d:Call ntdll.MultiByteToWideChar(00000000,00000000,40a02248 "Automation error",ffffffff,406d4684,00000011) ret=660dfb4e 000d:Ret ntdll.MultiByteToWideChar() retval=00000011 ret=660dfb4e 000d:Call ntdll.RtlAllocateHeap(406d0000,00000000,00000800) ret=40c229a1 000d:Ret ntdll.RtlAllocateHeap() retval=40790748 ret=40c229a1 000d:Call ntdll.FormatMessageW(000012ff,00000000,80040150,00000409,40790748,00000400,00000000) ret=660d816f 000d:Ret ntdll.FormatMessageW() retval=00000000 ret=660d816f 000d:Call ntdll.RtlFreeHeap(406d0000,00000000,40790748) ret=40c22be3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=40c22be3 000d:Call ntdll.TlsGetValue(00000006) ret=660d81e2 000d:Ret ntdll.TlsGetValue() retval=4070ed50 ret=660d81e2 000d:Call ntdll.MultiByteToWideChar(00000000,00000000,0041e868 "em_2001",ffffffff,00000000,00000000) ret=660257aa 000d:Ret ntdll.MultiByteToWideChar() retval=00000008 ret=660257aa 000d:Call ntdll.TlsGetValue(00000002) ret=65341473 000d:Ret ntdll.TlsGetValue() retval=4070dc10 ret=65341473 000d:Call ntdll.MultiByteToWideChar(00000000,00000000,0041e868 "em_2001",ffffffff,4077f564,00000008) ret=660257cd 000d:Ret ntdll.MultiByteToWideChar() retval=00000008 ret=660257cd 000d:Call ntdll.TlsGetValue(00000006) ret=660138f6 000d:Ret ntdll.TlsGetValue() retval=4070ed50 ret=660138f6 000d:Call ntdll.TlsGetValue(00000006) ret=660138ca 000d:Ret ntdll.TlsGetValue() retval=4070ed50 ret=660138ca 000d:Call ntdll.TlsGetValue(00000002) ret=65341473 000d:Ret ntdll.TlsGetValue() retval=4070dc10 ret=65341473 000d:Call ntdll.TlsGetValue(00000006) ret=6602518d 000d:Ret ntdll.TlsGetValue() retval=4070ed50 ret=6602518d 000d:Call ntdll.TlsGetValue(00000002) ret=65341473 000d:Ret ntdll.TlsGetValue() retval=4070dc10 ret=65341473 000d:Call ntdll.GetUserDefaultLCID() ret=660106df 000d:Ret ntdll.GetUserDefaultLCID() retval=00000409 ret=660106df 000d:Call ntdll.TlsGetValue(00000002) ret=65341473 000d:Ret ntdll.TlsGetValue() retval=4070dc10 ret=65341473 000d:Call ntdll.TlsGetValue(00000002) ret=65343da3 000d:Ret ntdll.TlsGetValue() retval=4070dc10 ret=65343da3 000d:Call ntdll.RtlAllocateHeap(406d0000,00000000,00000020) ret=40c229a1 000d:Ret ntdll.RtlAllocateHeap() retval=40760750 ret=40c229a1 000d:Call ntdll.TlsGetValue(00000002) ret=65343da3 000d:Ret ntdll.TlsGetValue() retval=4070dc10 ret=65343da3 000d:Call ntdll.TlsGetValue(00000002) ret=65343da3 000d:Ret ntdll.TlsGetValue() retval=4070dc10 ret=65343da3 000d:Call ntdll.TlsGetValue(00000002) ret=65343da3 000d:Ret ntdll.TlsGetValue() retval=4070dc10 ret=65343da3 000d:Call ntdll.TlsGetValue(00000002) ret=65343da3 000d:Ret ntdll.TlsGetValue() retval=4070dc10 ret=65343da3 000d:Call ntdll.TlsGetValue(00000002) ret=65343da3 000d:Ret ntdll.TlsGetValue() retval=4070dc10 ret=65343da3 000d:Call ntdll.TlsGetValue(00000006) ret=66024578 000d:Ret ntdll.TlsGetValue() retval=4070ed50 ret=66024578 000d:Call ntdll.TlsGetValue(00000002) ret=6534153b 000d:Ret ntdll.TlsGetValue() retval=4070dc10 ret=6534153b 000d:Call ntdll.RtlSizeHeap(406d0000,00000000,4077f560) ret=40c22cc1 000d:Ret ntdll.RtlSizeHeap() retval=00000020 ret=40c22cc1 000d:Call ntdll.TlsGetValue(00000002) ret=6534153b 000d:Ret ntdll.TlsGetValue() retval=4070dc10 ret=6534153b 000d:Call ntdll.RtlSizeHeap(406d0000,00000000,406d4680) ret=40c22cc1 000d:Ret ntdll.RtlSizeHeap() retval=00000030 ret=40c22cc1 000d:Call ntdll.GetModuleFileNameA(00400000,40a024e4,00000104) ret=6603dff5 000d:Ret ntdll.GetModuleFileNameA() retval=0000002e ret=6603dff5 000d:Call ntdll.lstrlenA(40a024e4 "C:\\Program Files\\Electronic Manual\\em_2001.exe") ret=6600ebc0 000d:Ret ntdll.lstrlenA() retval=0000002e ret=6600ebc0 000d:Call ntdll.RtlAllocateHeap(41930000,00000000,0000002f) ret=6600ec32 000d:Ret ntdll.RtlAllocateHeap() retval=41950cb8 ret=6600ec32 000d:Call ntdll.RtlAllocateHeap(41930000,00000000,0000002f) ret=6600ec32 000d:Ret ntdll.RtlAllocateHeap() retval=41950cf0 ret=6600ec32 000d:Call ntdll.lstrcpyA(41950cb8,40a024e4 "C:\\Program Files\\Electronic Manual\\em_2001.exe") ret=6600ebf8 000d:Ret ntdll.lstrcpyA() retval=41950cb8 ret=6600ebf8 000d:Call user32.CharNextA(41950cb8 "C:\\Program Files\\Electronic Manual\\em_2001.exe") ret=660161c1 000d:Ret user32.CharNextA() retval=41950cb9 ret=660161c1 000d:Call user32.CharNextA(41950cb8 "C:\\Program Files\\Electronic Manual\\em_2001.exe") ret=66016213 000d:Ret user32.CharNextA() retval=41950cb9 ret=66016213 000d:Call user32.CharNextA(41950cb9 ":\\Program Files\\Electronic Manual\\em_2001.exe") ret=66016216 000d:Ret user32.CharNextA() retval=41950cba ret=66016216 000d:Call user32.CharNextA(41950cba "\\Program Files\\Electronic Manual\\em_2001.exe") ret=6601621d 000d:Ret user32.CharNextA() retval=41950cbb ret=6601621d 000d:Call user32.CharNextA(41950cba "\\Program Files\\Electronic Manual\\em_2001.exe") ret=66016223 000d:Ret user32.CharNextA() retval=41950cbb ret=66016223 000d:Call user32.CharNextA(41950cbb "Program Files\\Electronic Manual\\em_2001.exe") ret=66016223 000d:Ret user32.CharNextA() retval=41950cbc ret=66016223 000d:Call user32.CharNextA(41950cbc "rogram Files\\Electronic Manual\\em_2001.exe") ret=66016223 000d:Ret user32.CharNextA() retval=41950cbd ret=66016223 000d:Call user32.CharNextA(41950cbd "ogram Files\\Electronic Manual\\em_2001.exe") ret=66016223 000d:Ret user32.CharNextA() retval=41950cbe ret=66016223 000d:Call user32.CharNextA(41950cbe "gram Files\\Electronic Manual\\em_2001.exe") ret=66016223 000d:Ret user32.CharNextA() retval=41950cbf ret=66016223 000d:Call user32.CharNextA(41950cbf "ram Files\\Electronic Manual\\em_2001.exe") ret=66016223 000d:Ret user32.CharNextA() retval=41950cc0 ret=66016223 000d:Call user32.CharNextA(41950cc0 "am Files\\Electronic Manual\\em_2001.exe") ret=66016223 000d:Ret user32.CharNextA() retval=41950cc1 ret=66016223 000d:Call user32.CharNextA(41950cc1 "m Files\\Electronic Manual\\em_2001.exe") ret=66016223 000d:Ret user32.CharNextA() retval=41950cc2 ret=66016223 000d:Call user32.CharNextA(41950cc2 " Files\\Electronic Manual\\em_2001.exe") ret=66016223 000d:Ret user32.CharNextA() retval=41950cc3 ret=66016223 000d:Call user32.CharNextA(41950cc3 "Files\\Electronic Manual\\em_2001.exe") ret=66016223 000d:Ret user32.CharNextA() retval=41950cc4 ret=66016223 000d:Call user32.CharNextA(41950cc4 "iles\\Electronic Manual\\em_2001.exe") ret=66016223 000d:Ret user32.CharNextA() retval=41950cc5 ret=66016223 000d:Call user32.CharNextA(41950cc5 "les\\Electronic Manual\\em_2001.exe") ret=66016223 000d:Ret user32.CharNextA() retval=41950cc6 ret=66016223 000d:Call user32.CharNextA(41950cc6 "es\\Electronic Manual\\em_2001.exe") ret=66016223 000d:Ret user32.CharNextA() retval=41950cc7 ret=66016223 000d:Call user32.CharNextA(41950cc7 "s\\Electronic Manual\\em_2001.exe") ret=66016223 000d:Ret user32.CharNextA() retval=41950cc8 ret=66016223 000d:Call user32.CharNextA(41950cc8 "\\Electronic Manual\\em_2001.exe") ret=6601621d 000d:Ret user32.CharNextA() retval=41950cc9 ret=6601621d 000d:Call user32.CharNextA(41950cc8 "\\Electronic Manual\\em_2001.exe") ret=66016223 000d:Ret user32.CharNextA() retval=41950cc9 ret=66016223 000d:Call user32.CharNextA(41950cc9 "Electronic Manual\\em_2001.exe") ret=66016223 000d:Ret user32.CharNextA() retval=41950cca ret=66016223 000d:Call user32.CharNextA(41950cca "lectronic Manual\\em_2001.exe") ret=66016223 000d:Ret user32.CharNextA() retval=41950ccb ret=66016223 000d:Call user32.CharNextA(41950ccb "ectronic Manual\\em_2001.exe") ret=66016223 000d:Ret user32.CharNextA() retval=41950ccc ret=66016223 000d:Call user32.CharNextA(41950ccc "ctronic Manual\\em_2001.exe") ret=66016223 000d:Ret user32.CharNextA() retval=41950ccd ret=66016223 000d:Call user32.CharNextA(41950ccd "tronic Manual\\em_2001.exe") ret=66016223 000d:Ret user32.CharNextA() retval=41950cce ret=66016223 000d:Call user32.CharNextA(41950cce "ronic Manual\\em_2001.exe") ret=66016223 000d:Ret user32.CharNextA() retval=41950ccf ret=66016223 000d:Call user32.CharNextA(41950ccf "onic Manual\\em_2001.exe") ret=66016223 000d:Ret user32.CharNextA() retval=41950cd0 ret=66016223 000d:Call user32.CharNextA(41950cd0 "nic Manual\\em_2001.exe") ret=66016223 000d:Ret user32.CharNextA() retval=41950cd1 ret=66016223 000d:Call user32.CharNextA(41950cd1 "ic Manual\\em_2001.exe") ret=66016223 000d:Ret user32.CharNextA() retval=41950cd2 ret=66016223 000d:Call user32.CharNextA(41950cd2 "c Manual\\em_2001.exe") ret=66016223 000d:Ret user32.CharNextA() retval=41950cd3 ret=66016223 000d:Call user32.CharNextA(41950cd3 " Manual\\em_2001.exe") ret=66016223 000d:Ret user32.CharNextA() retval=41950cd4 ret=66016223 000d:Call user32.CharNextA(41950cd4 "Manual\\em_2001.exe") ret=66016223 000d:Ret user32.CharNextA() retval=41950cd5 ret=66016223 000d:Call user32.CharNextA(41950cd5 "anual\\em_2001.exe") ret=66016223 000d:Ret user32.CharNextA() retval=41950cd6 ret=66016223 000d:Call user32.CharNextA(41950cd6 "nual\\em_2001.exe") ret=66016223 000d:Ret user32.CharNextA() retval=41950cd7 ret=66016223 000d:Call user32.CharNextA(41950cd7 "ual\\em_2001.exe") ret=66016223 000d:Ret user32.CharNextA() retval=41950cd8 ret=66016223 000d:Call user32.CharNextA(41950cd8 "al\\em_2001.exe") ret=66016223 000d:Ret user32.CharNextA() retval=41950cd9 ret=66016223 000d:Call user32.CharNextA(41950cd9 "l\\em_2001.exe") ret=66016223 000d:Ret user32.CharNextA() retval=41950cda ret=66016223 000d:Call user32.CharNextA(41950cda "\\em_2001.exe") ret=6601621d 000d:Ret user32.CharNextA() retval=41950cdb ret=6601621d 000d:Call user32.CharNextA(41950cda "\\em_2001.exe") ret=66016223 000d:Ret user32.CharNextA() retval=41950cdb ret=66016223 000d:Call user32.CharNextA(41950cdb "em_2001.exe") ret=66016223 000d:Ret user32.CharNextA() retval=41950cdc ret=66016223 000d:Call user32.CharNextA(41950cdc "m_2001.exe") ret=66016223 000d:Ret user32.CharNextA() retval=41950cdd ret=66016223 000d:Call user32.CharNextA(41950cdd "_2001.exe") ret=66016223 000d:Ret user32.CharNextA() retval=41950cde ret=66016223 000d:Call user32.CharNextA(41950cde "2001.exe") ret=66016223 000d:Ret user32.CharNextA() retval=41950cdf ret=66016223 000d:Call user32.CharNextA(41950cdf "001.exe") ret=66016223 000d:Ret user32.CharNextA() retval=41950ce0 ret=66016223 000d:Call user32.CharNextA(41950ce0 "01.exe") ret=66016223 000d:Ret user32.CharNextA() retval=41950ce1 ret=66016223 000d:Call user32.CharNextA(41950ce1 "1.exe") ret=66016223 000d:Ret user32.CharNextA() retval=41950ce2 ret=66016223 000d:Call user32.CharNextA(41950ce2 ".exe") ret=66016223 000d:Ret user32.CharNextA() retval=41950ce3 ret=66016223 000d:Call user32.CharNextA(41950ce3 "exe") ret=66016223 000d:Ret user32.CharNextA() retval=41950ce4 ret=66016223 000d:Call user32.CharNextA(41950ce4 "xe") ret=66016223 000d:Ret user32.CharNextA() retval=41950ce5 ret=66016223 000d:Call user32.CharNextA(41950ce5 "e") ret=66016223 000d:Ret user32.CharNextA() retval=41950ce6 ret=66016223 000d:Call ntdll.RtlAllocateHeap(41930000,00000000,00000023) ret=6601f061 000d:Ret ntdll.RtlAllocateHeap() retval=41950d28 ret=6601f061 000d:Call ntdll.RtlFreeHeap(41930000,00000000,41950cf0) ret=66003a5d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=66003a5d 000d:Call ntdll.RtlFreeHeap(41930000,00000000,41950cb8) ret=66003a6d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=66003a6d 000d:Call ntdll.MultiByteToWideChar(00000000,00000000,41950d28 "C:\\Program Files\\Electronic Manual",ffffffff,00000000,00000000) ret=6601b7bd 000d:Ret ntdll.MultiByteToWideChar() retval=00000023 ret=6601b7bd 000d:Call ntdll.TlsGetValue(00000002) ret=65341473 000d:Ret ntdll.TlsGetValue() retval=4070dc10 ret=65341473 000d:Call ntdll.MultiByteToWideChar(00000000,00000000,41950d28 "C:\\Program Files\\Electronic Manual",ffffffff,4077814c,00000023) ret=6601b7e6 000d:Ret ntdll.MultiByteToWideChar() retval=00000023 ret=6601b7e6 000d:Call ntdll.RtlFreeHeap(41930000,00000000,41950d28) ret=6602d290 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=6602d290 000d:Call ntdll.TlsGetValue(00000002) ret=65343da3 000d:Ret ntdll.TlsGetValue() retval=4070dc10 ret=65343da3 000d:Call ntdll.TlsGetValue(00000002) ret=65343da3 000d:Ret ntdll.TlsGetValue() retval=4070dc10 ret=65343da3 000d:Call ntdll.RtlAllocateHeap(406d0000,00000000,00000070) ret=40c229a1 000d:Ret ntdll.RtlAllocateHeap() retval=40776b00 ret=40c229a1 000d:Call ntdll.TlsGetValue(00000002) ret=6534153b 000d:Ret ntdll.TlsGetValue() retval=4070dc10 ret=6534153b 000d:Call ntdll.RtlSizeHeap(406d0000,00000000,40778148) ret=40c22cc1 000d:Ret ntdll.RtlSizeHeap() retval=000000c0 ret=40c22cc1 000d:Call ntdll.TlsGetValue(00000002) ret=6534153b 000d:Ret ntdll.TlsGetValue() retval=4070dc10 ret=6534153b 000d:Call ntdll.RtlSizeHeap(406d0000,00000000,407609a0) ret=40c22cc1 000d:Ret ntdll.RtlSizeHeap() retval=000000f0 ret=40c22cc1 000d:Call ntdll.TlsGetValue(00000006) ret=660257e9 000d:Ret ntdll.TlsGetValue() retval=4070ed50 ret=660257e9 000d:Call ntdll.TlsGetValue(00000006) ret=66025892 000d:Ret ntdll.TlsGetValue() retval=4070ed50 ret=66025892 000d:Call ntdll.TlsGetValue(00000006) ret=66025892 000d:Ret ntdll.TlsGetValue() retval=4070ed50 ret=66025892 000d:Call ntdll.WideCharToMultiByte(00000000,00000000,40776b04 L"C:\\Program Files\\Electronic Manual\\em_2001.log",ffffffff,40a02428,00000105,00000000,00000000) ret=66025580 000d:Ret ntdll.WideCharToMultiByte() retval=0000002f ret=66025580 000d:Call ntdll.GetFullPathNameA(40a02428 "C:\\Program Files\\Electronic Manual\\em_2001.log",00000104,40a02558,40a02420) ret=660255e1 000d:Ret ntdll.GetFullPathNameA() retval=0000002e ret=660255e1 000d:Call ntdll.TlsGetValue(00000006) ret=66015adc 000d:Ret ntdll.TlsGetValue() retval=4070ed50 ret=66015adc 000d:Call ntdll.TlsGetValue(00000006) ret=66025b07 000d:Ret ntdll.TlsGetValue() retval=4070ed50 ret=66025b07 000d:Call ntdll.CreateFileA(40a02558 "C:\\Program Files\\Electronic Manual\\em_2001.log",c0000000,00000003,40a02518,00000004,00000080,00000000) ret=66025c89 000d:Ret ntdll.CreateFileA() retval=00000118 ret=66025c89 000d:Call ntdll.GetFileType(00000118) ret=66025c9b 000d:Ret ntdll.GetFileType() retval=00000001 ret=66025c9b 000d:Call ntdll.SetFilePointer(00000118,00000000,00000000,00000002) ret=66025f6d 000d:Ret ntdll.SetFilePointer() retval=0002d425 ret=66025f6d 000d:Call ntdll.RtlAllocateHeap(406d0000,00000000,0000026a) ret=40c229a1 000d:Ret ntdll.RtlAllocateHeap() retval=40790748 ret=40c229a1 000d:Call ntdll.TlsGetValue(00000006) ret=66025ffc 000d:Ret ntdll.TlsGetValue() retval=4070ed50 ret=66025ffc 000d:Call ntdll.TlsGetValue(00000006) ret=66025892 000d:Ret ntdll.TlsGetValue() retval=4070ed50 ret=66025892 000d:Call ntdll.TlsGetValue(00000006) ret=66015adc 000d:Ret ntdll.TlsGetValue() retval=4070ed50 ret=66015adc 000d:Call ntdll.TlsGetValue(00000006) ret=660144d3 000d:Ret ntdll.TlsGetValue() retval=4070ed50 ret=660144d3 000d:Call ntdll.TlsGetValue(00000006) ret=660261ea 000d:Ret ntdll.TlsGetValue() retval=4070ed50 ret=660261ea 000d:Call ntdll.WideCharToMultiByte(00000000,00000000,407766e4 L"-2147221168 Automation error ( caused by: em_2001) occurred while refreshing dis"...,00000054,00000000,00000000,00000000,00000000) ret=66026268 000d:Ret ntdll.WideCharToMultiByte() retval=00000054 ret=66026268 000d:Call ntdll.WideCharToMultiByte(00000000,00000000,407766e4 L"-2147221168 Automation error ( caused by: em_2001) occurred while refreshing dis"...,00000054,00000000,00000000,00000000,00000000) ret=66026310 000d:Ret ntdll.WideCharToMultiByte() retval=00000054 ret=66026310 000d:Call ntdll.TlsGetValue(00000002) ret=65343da3 000d:Ret ntdll.TlsGetValue() retval=4070dc10 ret=65343da3 000d:Call ntdll.WideCharToMultiByte(00000000,00000000,407766e4 L"-2147221168 Automation error ( caused by: em_2001) occurred while refreshing dis"...,00000054,4077814c,00000054,00000000,00000000) ret=6602633b _______________________________________________ wine-users mailing list wine-users@xxxxxxxxxx http://www.winehq.org/mailman/listinfo/wine-users