Re: Problem with ADO connection

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



OK.  I'm particularly suspicious of the native MSADODC.OCX being used. 
I've googled around and found at least one other person who has had
recent problems with it and was told that activeX controls in general
can be problematic.

Below is a snippet out of a +relay listing.  It starts out working with
an .mdb file, does some ADOish looking things and then looks like it is
outputting the ADO error message to the apps error log right at the
end.  Can someone who is better at reading these things than I am tell
me any more about what is going on?

Thanks,
Steve Bergman



000d:Call ntdll.WideCharToMultiByte(00000000,00000000,4076064c
L"p:\\Program Files\\Electronic
Manual\\databases\\index.mdb",ffffffff,40a02030,00000105,00000000,00000000) ret=66025580
000d:Ret  ntdll.WideCharToMultiByte() retval=00000037 ret=66025580
000d:Call ntdll.GetFullPathNameA(40a02030 "p:\\Program Files\\Electronic
Manual\\databases\\index.mdb",00000104,40a0226c,40a02028) ret=660255e1
000d:Ret  ntdll.GetFullPathNameA() retval=00000036 ret=660255e1
000d:Call ntdll.WideCharToMultiByte(00000000,00000000,4076064c
L"p:\\Program Files\\Electronic
Manual\\databases\\index.mdb",ffffffff,40a024b8,00000105,00000000,00000000) ret=660283e0
000d:Ret  ntdll.WideCharToMultiByte() retval=00000037 ret=660283e0
000d:Call ntdll.FindClose(407112c2) ret=6602f23d
000d:Ret  ntdll.FindClose() retval=00000001 ret=6602f23d
000d:Call ntdll.FindFirstFileA(40a024b8 "p:\\Program Files\\Electronic
Manual\\databases\\index.mdb",40a02008) ret=6602560f
000d:Ret  ntdll.FindFirstFileA() retval=407112c2 ret=6602560f
000d:Call ntdll.FileTimeToLocalFileTime(40a0200c,40a01fdc) ret=6602d726
000d:Ret  ntdll.FileTimeToLocalFileTime() retval=00000001 ret=6602d726
000d:Call ntdll.FileTimeToSystemTime(40a01fdc,40a01fe4) ret=6602d73e
000d:Ret  ntdll.FileTimeToSystemTime() retval=00000001 ret=6602d73e
000d:Call ntdll.FileTimeToLocalFileTime(40a02014,40a01fdc) ret=6602d726
000d:Ret  ntdll.FileTimeToLocalFileTime() retval=00000001 ret=6602d726
000d:Call ntdll.FileTimeToSystemTime(40a01fdc,40a01fe4) ret=6602d73e
000d:Ret  ntdll.FileTimeToSystemTime() retval=00000001 ret=6602d73e
000d:Call ntdll.FileTimeToLocalFileTime(40a0201c,40a01fdc) ret=6602d726
000d:Ret  ntdll.FileTimeToLocalFileTime() retval=00000001 ret=6602d726
000d:Call ntdll.FileTimeToSystemTime(40a01fdc,40a01fe4) ret=6602d73e
000d:Ret  ntdll.FileTimeToSystemTime() retval=00000001 ret=6602d73e
000d:Call ntdll.MultiByteToWideChar(00000000,00000000,40a02394
"index.mdb",ffffffff,00000000,00000000) ret=66028641
000d:Ret  ntdll.MultiByteToWideChar() retval=0000000a ret=66028641
000d:Call ntdll.TlsGetValue(00000002) ret=65341473
000d:Ret  ntdll.TlsGetValue() retval=4070dc10 ret=65341473
000d:Call ntdll.MultiByteToWideChar(00000000,00000000,40a02394
"index.mdb",ffffffff,4077f564,0000000a) ret=66028689
000d:Ret  ntdll.MultiByteToWideChar() retval=0000000a ret=66028689
000d:Call ntdll.TlsGetValue(00000002) ret=6534153b
000d:Ret  ntdll.TlsGetValue() retval=4070dc10 ret=6534153b
000d:Call ntdll.RtlSizeHeap(406d0000,00000000,40776618) ret=40c22cc1
000d:Ret  ntdll.RtlSizeHeap() retval=000000c0 ret=40c22cc1
000d:Call ntdll.TlsGetValue(00000002) ret=6534153b
000d:Ret  ntdll.TlsGetValue() retval=4070dc10 ret=6534153b
000d:Call ntdll.RtlSizeHeap(406d0000,00000000,4077f560) ret=40c22cc1
000d:Ret  ntdll.RtlSizeHeap() retval=00000020 ret=40c22cc1
000d:Call ntdll.TlsGetValue(00000002) ret=6534153b
000d:Ret  ntdll.TlsGetValue() retval=4070dc10 ret=6534153b
000d:Call ntdll.RtlSizeHeap(406d0000,00000000,40760648) ret=40c22cc1
000d:Ret  ntdll.RtlSizeHeap() retval=00000100 ret=40c22cc1
000d:Call ntdll.TlsGetValue(00000006) ret=66024578
000d:Ret  ntdll.TlsGetValue() retval=4070ed50 ret=66024578
000d:Call ntdll.TlsGetValue(00000002) ret=65343da3
000d:Ret  ntdll.TlsGetValue() retval=4070dc10 ret=65343da3
000d:Call ntdll.TlsGetValue(00000002) ret=65343da3
000d:Ret  ntdll.TlsGetValue() retval=4070dc10 ret=65343da3
000d:Call ntdll.TlsGetValue(00000002) ret=65343da3
000d:Ret  ntdll.TlsGetValue() retval=4070dc10 ret=65343da3
000d:Call ntdll.TlsGetValue(00000002) ret=65343da3
000d:Ret  ntdll.TlsGetValue() retval=4070dc10 ret=65343da3
000d:Call ntdll.TlsGetValue(00000002) ret=65343da3
000d:Ret  ntdll.TlsGetValue() retval=4070dc10 ret=65343da3
000d:Call ntdll.TlsGetValue(00000002) ret=65343da3
000d:Ret  ntdll.TlsGetValue() retval=4070dc10 ret=65343da3
000d:Call ntdll.TlsGetValue(00000002) ret=6534153b
000d:Ret  ntdll.TlsGetValue() retval=4070dc10 ret=6534153b
000d:Call ntdll.RtlSizeHeap(406d0000,00000000,40776618) ret=40c22cc1
000d:Ret  ntdll.RtlSizeHeap() retval=000000c0 ret=40c22cc1
000d:Call ntdll.TlsGetValue(00000002) ret=6534153b
000d:Ret  ntdll.TlsGetValue() retval=4070dc10 ret=6534153b
000d:Call ntdll.RtlSizeHeap(406d0000,00000000,40760648) ret=40c22cc1
000d:Ret  ntdll.RtlSizeHeap() retval=00000100 ret=40c22cc1
000d:Call ntdll.TlsGetValue(00000002) ret=6534153b
000d:Ret  ntdll.TlsGetValue() retval=4070dc10 ret=6534153b
000d:Call ntdll.RtlSizeHeap(406d0000,00000000,407608c8) ret=40c22cc1
000d:Ret  ntdll.RtlSizeHeap() retval=000000d0 ret=40c22cc1
000d:Call ntdll.TlsGetValue(00000002) ret=6534153b
000d:Ret  ntdll.TlsGetValue() retval=4070dc10 ret=6534153b
000d:Call ntdll.RtlSizeHeap(406d0000,00000000,407766e0) ret=40c22cc1
000d:Ret  ntdll.RtlSizeHeap() retval=000000d0 ret=40c22cc1
000d:Call ole32.SetErrorInfo(00000000,00000000) ret=6535e17c
000d:Call ntdll.IsBadReadPtr(4070d7f8,00000058) ret=40c1ed5a
000d:Ret  ntdll.IsBadReadPtr() retval=00000000 ret=40c1ed5a
000d:Ret  ole32.SetErrorInfo() retval=00000000 ret=6535e17c
000d:Call
ole32.CoGetClassObject(0041efa4,00000005,00000000,66030160,40a02540)
ret=660475a4
000d:Call advapi32.RegOpenKeyExA(80000000,40a022c4
"CLSID\\{00000514-0000-0010-8000-00AA006D2EA4}\\InprocServer32",00000000,00020019,40a02074) ret=40c17b50
000d:Ret  advapi32.RegOpenKeyExA() retval=00000000 ret=40c17b50
000d:Call
advapi32.RegQueryValueExA(00000118,00000000,00000000,40a0206c,40a02078,40a02070) ret=40c17b7a
000d:Ret  advapi32.RegQueryValueExA() retval=00000000 ret=40c17b7a
000d:Call advapi32.RegCloseKey(00000118) ret=40c17bbf
000d:Ret  advapi32.RegCloseKey() retval=00000000 ret=40c17bbf
000d:Call ntdll.LoadLibraryExA(40a021bc "C:\\Program Files\\Common
Files\\System\\ADO\\msado15.dll",00000000,00000008) ret=40c17e5a
000d:Ret  ntdll.LoadLibraryExA() retval=00000000 ret=40c17e5a
err:ole:CoGetClassObject couldn't load InprocServer32 dll C:\Program
Files\Common Files\System\ADO\msado15.dll
000d:Call ntdll.CreateFileA(40a020c4
"\\\\.\\pipe\\{00000514-0000-0010-8000-00AA006D2EA4}",c0000000,00000000,00000000,00000003,00000000,00000000) ret=40c2e02b
000d:Ret  ntdll.CreateFileA() retval=ffffffff ret=40c2e02b
000d:Call advapi32.RegOpenKeyExA(80000000,40a01ef0
"CLSID\\{00000514-0000-0010-8000-00AA006D2EA4}\\LocalServer32",00000000,00020019,40a01c3c) ret=40c2deea
000d:Ret  advapi32.RegOpenKeyExA() retval=00000002 ret=40c2deea
000d:Ret  ole32.CoGetClassObject() retval=80040150 ret=660475a4
000d:Call ntdll.TlsGetValue(00000006) ret=660473ac
000d:Ret  ntdll.TlsGetValue() retval=4070ed50 ret=660473ac
000d:Call ole32.GetErrorInfo(00000000,40a024e4) ret=6535e1aa
000d:Ret  ole32.GetErrorInfo() retval=00000001 ret=6535e1aa
000d:Call ntdll.TlsGetValue(00000006) ret=6601d660
000d:Ret  ntdll.TlsGetValue() retval=4070ed50 ret=6601d660
000d:Call ntdll.TlsGetValue(00000006) ret=66024e07
000d:Ret  ntdll.TlsGetValue() retval=4070ed50 ret=66024e07
000d:Call ntdll.RaiseException(c000008f,00000001,00000002,40a024e8)
ret=66024e92
000d:Call ntdll.IsBadReadPtr(00401548,00000004) ret=66024ee0
000d:Ret  ntdll.IsBadReadPtr() retval=00000000 ret=66024ee0
000d:Call ntdll.TlsGetValue(00000006) ret=66025019
000d:Ret  ntdll.TlsGetValue() retval=4070ed50 ret=66025019
000d:Call ntdll.RtlUnwind(40a025cc,661001ad,00000000,00000000)
ret=661001ad fs=1007
 eax=00000001 ebx=404818e4 ecx=40a025cc edx=00000006 esi=00401548
edi=40a025cc
 ebp=40a01f84 esp=40a01f78 ds=002b es=002b gs=0007 flags=00200202
000d:Ret  ntdll.RtlUnwind() retval=00000000 ret=661001ad fs=1007
 eax=00000000 ebx=404818e4 ecx=40a025cc edx=00000006 esi=00401548
edi=40a025cc
 ebp=40a01f84 esp=40a01f78 ds=002b es=002b gs=0007 flags=00200202
000d:Call ntdll.TlsGetValue(00000006) ret=66025078
000d:Ret  ntdll.TlsGetValue() retval=4070ed50 ret=66025078
000d:Call ntdll.TlsGetValue(00000006) ret=66024f99
000d:Ret  ntdll.TlsGetValue() retval=4070ed50 ret=66024f99
000d:Call ntdll.TlsGetValue(00000006) ret=66025167
000d:Ret  ntdll.TlsGetValue() retval=4070ed50 ret=66025167
000d:Call ntdll.TlsGetValue(00000006) ret=66047a37
000d:Ret  ntdll.TlsGetValue() retval=4070ed50 ret=66047a37
000d:Call ntdll.TlsGetValue(00000002) ret=6534153b
000d:Ret  ntdll.TlsGetValue() retval=4070dc10 ret=6534153b
000d:Call ntdll.RtlSizeHeap(406d0000,00000000,407609a0) ret=40c22cc1
000d:Ret  ntdll.RtlSizeHeap() retval=000000f0 ret=40c22cc1
000d:Call ntdll.TlsGetValue(00000002) ret=6534153b
000d:Ret  ntdll.TlsGetValue() retval=4070dc10 ret=6534153b
000d:Call ntdll.RtlSizeHeap(406d0000,00000000,407780f0) ret=40c22cc1
000d:Ret  ntdll.RtlSizeHeap() retval=00000018 ret=40c22cc1
000d:Call ntdll.TlsGetValue(00000002) ret=65343da3
000d:Ret  ntdll.TlsGetValue() retval=4070dc10 ret=65343da3
000d:Call ntdll.RtlAllocateHeap(406d0000,00000000,000001e0) ret=40c229a1
000d:Ret  ntdll.RtlAllocateHeap() retval=40790560 ret=40c229a1
000d:Call ole32.SetErrorInfo(00000000,00000000) ret=6535e17c
000d:Call ntdll.IsBadReadPtr(4070d7f8,00000058) ret=40c1ed5a
000d:Ret  ntdll.IsBadReadPtr() retval=00000000 ret=40c1ed5a
000d:Ret  ole32.SetErrorInfo() retval=00000000 ret=6535e17c
000d:Call
ole32.CoGetClassObject(0041efa4,00000005,00000000,66030160,40a025b8)
ret=660475a4
000d:Call advapi32.RegOpenKeyExA(80000000,40a0233c
"CLSID\\{00000514-0000-0010-8000-00AA006D2EA4}\\InprocServer32",00000000,00020019,40a020ec) ret=40c17b50
000d:Ret  advapi32.RegOpenKeyExA() retval=00000000 ret=40c17b50
000d:Call
advapi32.RegQueryValueExA(00000118,00000000,00000000,40a020e4,40a020f0,40a020e8) ret=40c17b7a
000d:Ret  advapi32.RegQueryValueExA() retval=00000000 ret=40c17b7a
000d:Call advapi32.RegCloseKey(00000118) ret=40c17bbf
000d:Ret  advapi32.RegCloseKey() retval=00000000 ret=40c17bbf
000d:Call ntdll.LoadLibraryExA(40a02234 "C:\\Program Files\\Common
Files\\System\\ADO\\msado15.dll",00000000,00000008) ret=40c17e5a
000d:Ret  ntdll.LoadLibraryExA() retval=00000000 ret=40c17e5a
err:ole:CoGetClassObject couldn't load InprocServer32 dll C:\Program
Files\Common Files\System\ADO\msado15.dll
000d:Call ntdll.CreateFileA(40a0213c
"\\\\.\\pipe\\{00000514-0000-0010-8000-00AA006D2EA4}",c0000000,00000000,00000000,00000003,00000000,00000000) ret=40c2e02b
000d:Ret  ntdll.CreateFileA() retval=ffffffff ret=40c2e02b
000d:Call advapi32.RegOpenKeyExA(80000000,40a01f68
"CLSID\\{00000514-0000-0010-8000-00AA006D2EA4}\\LocalServer32",00000000,00020019,40a01cb4) ret=40c2deea
000d:Ret  advapi32.RegOpenKeyExA() retval=00000002 ret=40c2deea
000d:Ret  ole32.CoGetClassObject() retval=80040150 ret=660475a4
000d:Call ntdll.TlsGetValue(00000006) ret=660473ac
000d:Ret  ntdll.TlsGetValue() retval=4070ed50 ret=660473ac
000d:Call ole32.GetErrorInfo(00000000,40a0255c) ret=6535e1aa
000d:Ret  ole32.GetErrorInfo() retval=00000001 ret=6535e1aa
000d:Call ntdll.TlsGetValue(00000006) ret=6601d660
000d:Ret  ntdll.TlsGetValue() retval=4070ed50 ret=6601d660
000d:Call ntdll.TlsGetValue(00000006) ret=66024e07
000d:Ret  ntdll.TlsGetValue() retval=4070ed50 ret=66024e07
000d:Call ntdll.RaiseException(c000008f,00000001,00000002,40a02560)
ret=66024e92
000d:Call ntdll.IsBadReadPtr(004029e8,00000004) ret=66024ee0
000d:Ret  ntdll.IsBadReadPtr() retval=00000000 ret=66024ee0
000d:Call ntdll.IsBadReadPtr(004053e0,00000004) ret=66024ee0
000d:Ret  ntdll.IsBadReadPtr() retval=00000000 ret=66024ee0
000d:Call ntdll.TlsGetValue(00000006) ret=66025019
000d:Ret  ntdll.TlsGetValue() retval=4070ed50 ret=66025019
000d:Call ntdll.RtlUnwind(40a027c8,661001ad,00000000,00000000)
ret=661001ad fs=1007
 eax=00000001 ebx=404818e4 ecx=40a027c8 edx=00000006 esi=004053e0
edi=40a027c8
 ebp=40a01ffc esp=40a01ff0 ds=002b es=002b gs=0007 flags=00200212
000d:Call ntdll.IsBadReadPtr(004029e8,00000004) ret=66024ee0
000d:Ret  ntdll.IsBadReadPtr() retval=00000000 ret=66024ee0
000d:Call ntdll.TlsGetValue(00000002) ret=6534153b
000d:Ret  ntdll.TlsGetValue() retval=4070dc10 ret=6534153b
000d:Call ntdll.RtlSizeHeap(406d0000,00000000,40790560) ret=40c22cc1
000d:Ret  ntdll.RtlSizeHeap() retval=000001e0 ret=40c22cc1
000d:Call ntdll.RtlFreeHeap(406d0000,00000000,40776b00) ret=40c22be3
000d:Ret  ntdll.RtlFreeHeap() retval=00000001 ret=40c22be3
000d:Ret  ntdll.RtlUnwind() retval=00000000 ret=661001ad fs=1007
 eax=00000000 ebx=404818e4 ecx=40a027c8 edx=00000006 esi=004053e0
edi=40a027c8
 ebp=40a01ffc esp=40a01ff0 ds=002b es=002b gs=0007 flags=00200212
000d:Call ntdll.TlsGetValue(00000006) ret=66025078
000d:Ret  ntdll.TlsGetValue() retval=4070ed50 ret=66025078
000d:Call ntdll.TlsGetValue(00000006) ret=66024f99
000d:Ret  ntdll.TlsGetValue() retval=4070ed50 ret=66024f99
000d:Call ntdll.TlsGetValue(00000006) ret=66025167
000d:Ret  ntdll.TlsGetValue() retval=4070ed50 ret=66025167
000d:Call ntdll.TlsGetValue(00000006) ret=6602518d
000d:Ret  ntdll.TlsGetValue() retval=4070ed50 ret=6602518d
000d:Call ntdll.TlsGetValue(00000006) ret=6602518d
000d:Ret  ntdll.TlsGetValue() retval=4070ed50 ret=6602518d
000d:Call ntdll.TlsGetValue(00000006) ret=660133cd
000d:Ret  ntdll.TlsGetValue() retval=4070ed50 ret=660133cd
000d:Call ntdll.TlsGetValue(00000006) ret=660d7e6e
000d:Ret  ntdll.TlsGetValue() retval=4070ed50 ret=660d7e6e
000d:Call ntdll.TlsGetValue(00000006) ret=660df8a6
000d:Ret  ntdll.TlsGetValue() retval=4070ed50 ret=660df8a6
000d:Call user32.LoadStringA(66000000,0000274e,40a02248,000001f4)
ret=660df968
000d:Ret  user32.LoadStringA() retval=00000010 ret=660df968
000d:Call ntdll.MultiByteToWideChar(00000000,00000000,40a02248
"Automation error",ffffffff,00000000,00000000) ret=660dfb1b
000d:Ret  ntdll.MultiByteToWideChar() retval=00000011 ret=660dfb1b
000d:Call ntdll.TlsGetValue(00000002) ret=65341473
000d:Ret  ntdll.TlsGetValue() retval=4070dc10 ret=65341473
000d:Call ntdll.MultiByteToWideChar(00000000,00000000,40a02248
"Automation error",ffffffff,406d4684,00000011) ret=660dfb4e
000d:Ret  ntdll.MultiByteToWideChar() retval=00000011 ret=660dfb4e
000d:Call ntdll.RtlAllocateHeap(406d0000,00000000,00000800) ret=40c229a1
000d:Ret  ntdll.RtlAllocateHeap() retval=40790748 ret=40c229a1
000d:Call
ntdll.FormatMessageW(000012ff,00000000,80040150,00000409,40790748,00000400,00000000) ret=660d816f
000d:Ret  ntdll.FormatMessageW() retval=00000000 ret=660d816f
000d:Call ntdll.RtlFreeHeap(406d0000,00000000,40790748) ret=40c22be3
000d:Ret  ntdll.RtlFreeHeap() retval=00000001 ret=40c22be3
000d:Call ntdll.TlsGetValue(00000006) ret=660d81e2
000d:Ret  ntdll.TlsGetValue() retval=4070ed50 ret=660d81e2
000d:Call ntdll.MultiByteToWideChar(00000000,00000000,0041e868
"em_2001",ffffffff,00000000,00000000) ret=660257aa
000d:Ret  ntdll.MultiByteToWideChar() retval=00000008 ret=660257aa
000d:Call ntdll.TlsGetValue(00000002) ret=65341473
000d:Ret  ntdll.TlsGetValue() retval=4070dc10 ret=65341473
000d:Call ntdll.MultiByteToWideChar(00000000,00000000,0041e868
"em_2001",ffffffff,4077f564,00000008) ret=660257cd
000d:Ret  ntdll.MultiByteToWideChar() retval=00000008 ret=660257cd
000d:Call ntdll.TlsGetValue(00000006) ret=660138f6
000d:Ret  ntdll.TlsGetValue() retval=4070ed50 ret=660138f6
000d:Call ntdll.TlsGetValue(00000006) ret=660138ca
000d:Ret  ntdll.TlsGetValue() retval=4070ed50 ret=660138ca
000d:Call ntdll.TlsGetValue(00000002) ret=65341473
000d:Ret  ntdll.TlsGetValue() retval=4070dc10 ret=65341473
000d:Call ntdll.TlsGetValue(00000006) ret=6602518d
000d:Ret  ntdll.TlsGetValue() retval=4070ed50 ret=6602518d
000d:Call ntdll.TlsGetValue(00000002) ret=65341473
000d:Ret  ntdll.TlsGetValue() retval=4070dc10 ret=65341473
000d:Call ntdll.GetUserDefaultLCID() ret=660106df
000d:Ret  ntdll.GetUserDefaultLCID() retval=00000409 ret=660106df
000d:Call ntdll.TlsGetValue(00000002) ret=65341473
000d:Ret  ntdll.TlsGetValue() retval=4070dc10 ret=65341473
000d:Call ntdll.TlsGetValue(00000002) ret=65343da3
000d:Ret  ntdll.TlsGetValue() retval=4070dc10 ret=65343da3
000d:Call ntdll.RtlAllocateHeap(406d0000,00000000,00000020) ret=40c229a1
000d:Ret  ntdll.RtlAllocateHeap() retval=40760750 ret=40c229a1
000d:Call ntdll.TlsGetValue(00000002) ret=65343da3
000d:Ret  ntdll.TlsGetValue() retval=4070dc10 ret=65343da3
000d:Call ntdll.TlsGetValue(00000002) ret=65343da3
000d:Ret  ntdll.TlsGetValue() retval=4070dc10 ret=65343da3
000d:Call ntdll.TlsGetValue(00000002) ret=65343da3
000d:Ret  ntdll.TlsGetValue() retval=4070dc10 ret=65343da3
000d:Call ntdll.TlsGetValue(00000002) ret=65343da3
000d:Ret  ntdll.TlsGetValue() retval=4070dc10 ret=65343da3
000d:Call ntdll.TlsGetValue(00000002) ret=65343da3
000d:Ret  ntdll.TlsGetValue() retval=4070dc10 ret=65343da3
000d:Call ntdll.TlsGetValue(00000006) ret=66024578
000d:Ret  ntdll.TlsGetValue() retval=4070ed50 ret=66024578
000d:Call ntdll.TlsGetValue(00000002) ret=6534153b
000d:Ret  ntdll.TlsGetValue() retval=4070dc10 ret=6534153b
000d:Call ntdll.RtlSizeHeap(406d0000,00000000,4077f560) ret=40c22cc1
000d:Ret  ntdll.RtlSizeHeap() retval=00000020 ret=40c22cc1
000d:Call ntdll.TlsGetValue(00000002) ret=6534153b
000d:Ret  ntdll.TlsGetValue() retval=4070dc10 ret=6534153b
000d:Call ntdll.RtlSizeHeap(406d0000,00000000,406d4680) ret=40c22cc1
000d:Ret  ntdll.RtlSizeHeap() retval=00000030 ret=40c22cc1
000d:Call ntdll.GetModuleFileNameA(00400000,40a024e4,00000104)
ret=6603dff5
000d:Ret  ntdll.GetModuleFileNameA() retval=0000002e ret=6603dff5
000d:Call ntdll.lstrlenA(40a024e4 "C:\\Program Files\\Electronic
Manual\\em_2001.exe") ret=6600ebc0
000d:Ret  ntdll.lstrlenA() retval=0000002e ret=6600ebc0
000d:Call ntdll.RtlAllocateHeap(41930000,00000000,0000002f) ret=6600ec32
000d:Ret  ntdll.RtlAllocateHeap() retval=41950cb8 ret=6600ec32
000d:Call ntdll.RtlAllocateHeap(41930000,00000000,0000002f) ret=6600ec32
000d:Ret  ntdll.RtlAllocateHeap() retval=41950cf0 ret=6600ec32
000d:Call ntdll.lstrcpyA(41950cb8,40a024e4 "C:\\Program
Files\\Electronic Manual\\em_2001.exe") ret=6600ebf8
000d:Ret  ntdll.lstrcpyA() retval=41950cb8 ret=6600ebf8
000d:Call user32.CharNextA(41950cb8 "C:\\Program Files\\Electronic
Manual\\em_2001.exe") ret=660161c1
000d:Ret  user32.CharNextA() retval=41950cb9 ret=660161c1
000d:Call user32.CharNextA(41950cb8 "C:\\Program Files\\Electronic
Manual\\em_2001.exe") ret=66016213
000d:Ret  user32.CharNextA() retval=41950cb9 ret=66016213
000d:Call user32.CharNextA(41950cb9 ":\\Program Files\\Electronic
Manual\\em_2001.exe") ret=66016216
000d:Ret  user32.CharNextA() retval=41950cba ret=66016216
000d:Call user32.CharNextA(41950cba "\\Program Files\\Electronic
Manual\\em_2001.exe") ret=6601621d
000d:Ret  user32.CharNextA() retval=41950cbb ret=6601621d
000d:Call user32.CharNextA(41950cba "\\Program Files\\Electronic
Manual\\em_2001.exe") ret=66016223
000d:Ret  user32.CharNextA() retval=41950cbb ret=66016223
000d:Call user32.CharNextA(41950cbb "Program Files\\Electronic
Manual\\em_2001.exe") ret=66016223
000d:Ret  user32.CharNextA() retval=41950cbc ret=66016223
000d:Call user32.CharNextA(41950cbc "rogram Files\\Electronic
Manual\\em_2001.exe") ret=66016223
000d:Ret  user32.CharNextA() retval=41950cbd ret=66016223
000d:Call user32.CharNextA(41950cbd "ogram Files\\Electronic
Manual\\em_2001.exe") ret=66016223
000d:Ret  user32.CharNextA() retval=41950cbe ret=66016223
000d:Call user32.CharNextA(41950cbe "gram Files\\Electronic
Manual\\em_2001.exe") ret=66016223
000d:Ret  user32.CharNextA() retval=41950cbf ret=66016223
000d:Call user32.CharNextA(41950cbf "ram Files\\Electronic
Manual\\em_2001.exe") ret=66016223
000d:Ret  user32.CharNextA() retval=41950cc0 ret=66016223
000d:Call user32.CharNextA(41950cc0 "am Files\\Electronic
Manual\\em_2001.exe") ret=66016223
000d:Ret  user32.CharNextA() retval=41950cc1 ret=66016223
000d:Call user32.CharNextA(41950cc1 "m Files\\Electronic
Manual\\em_2001.exe") ret=66016223
000d:Ret  user32.CharNextA() retval=41950cc2 ret=66016223
000d:Call user32.CharNextA(41950cc2 " Files\\Electronic
Manual\\em_2001.exe") ret=66016223
000d:Ret  user32.CharNextA() retval=41950cc3 ret=66016223
000d:Call user32.CharNextA(41950cc3 "Files\\Electronic
Manual\\em_2001.exe") ret=66016223
000d:Ret  user32.CharNextA() retval=41950cc4 ret=66016223
000d:Call user32.CharNextA(41950cc4 "iles\\Electronic
Manual\\em_2001.exe") ret=66016223
000d:Ret  user32.CharNextA() retval=41950cc5 ret=66016223
000d:Call user32.CharNextA(41950cc5 "les\\Electronic
Manual\\em_2001.exe") ret=66016223
000d:Ret  user32.CharNextA() retval=41950cc6 ret=66016223
000d:Call user32.CharNextA(41950cc6 "es\\Electronic
Manual\\em_2001.exe") ret=66016223
000d:Ret  user32.CharNextA() retval=41950cc7 ret=66016223
000d:Call user32.CharNextA(41950cc7 "s\\Electronic Manual\\em_2001.exe")
ret=66016223
000d:Ret  user32.CharNextA() retval=41950cc8 ret=66016223
000d:Call user32.CharNextA(41950cc8 "\\Electronic Manual\\em_2001.exe")
ret=6601621d
000d:Ret  user32.CharNextA() retval=41950cc9 ret=6601621d
000d:Call user32.CharNextA(41950cc8 "\\Electronic Manual\\em_2001.exe")
ret=66016223
000d:Ret  user32.CharNextA() retval=41950cc9 ret=66016223
000d:Call user32.CharNextA(41950cc9 "Electronic Manual\\em_2001.exe")
ret=66016223
000d:Ret  user32.CharNextA() retval=41950cca ret=66016223
000d:Call user32.CharNextA(41950cca "lectronic Manual\\em_2001.exe")
ret=66016223
000d:Ret  user32.CharNextA() retval=41950ccb ret=66016223
000d:Call user32.CharNextA(41950ccb "ectronic Manual\\em_2001.exe")
ret=66016223
000d:Ret  user32.CharNextA() retval=41950ccc ret=66016223
000d:Call user32.CharNextA(41950ccc "ctronic Manual\\em_2001.exe")
ret=66016223
000d:Ret  user32.CharNextA() retval=41950ccd ret=66016223
000d:Call user32.CharNextA(41950ccd "tronic Manual\\em_2001.exe")
ret=66016223
000d:Ret  user32.CharNextA() retval=41950cce ret=66016223
000d:Call user32.CharNextA(41950cce "ronic Manual\\em_2001.exe")
ret=66016223
000d:Ret  user32.CharNextA() retval=41950ccf ret=66016223
000d:Call user32.CharNextA(41950ccf "onic Manual\\em_2001.exe")
ret=66016223
000d:Ret  user32.CharNextA() retval=41950cd0 ret=66016223
000d:Call user32.CharNextA(41950cd0 "nic Manual\\em_2001.exe")
ret=66016223
000d:Ret  user32.CharNextA() retval=41950cd1 ret=66016223
000d:Call user32.CharNextA(41950cd1 "ic Manual\\em_2001.exe")
ret=66016223
000d:Ret  user32.CharNextA() retval=41950cd2 ret=66016223
000d:Call user32.CharNextA(41950cd2 "c Manual\\em_2001.exe")
ret=66016223
000d:Ret  user32.CharNextA() retval=41950cd3 ret=66016223
000d:Call user32.CharNextA(41950cd3 " Manual\\em_2001.exe") ret=66016223
000d:Ret  user32.CharNextA() retval=41950cd4 ret=66016223
000d:Call user32.CharNextA(41950cd4 "Manual\\em_2001.exe") ret=66016223
000d:Ret  user32.CharNextA() retval=41950cd5 ret=66016223
000d:Call user32.CharNextA(41950cd5 "anual\\em_2001.exe") ret=66016223
000d:Ret  user32.CharNextA() retval=41950cd6 ret=66016223
000d:Call user32.CharNextA(41950cd6 "nual\\em_2001.exe") ret=66016223
000d:Ret  user32.CharNextA() retval=41950cd7 ret=66016223
000d:Call user32.CharNextA(41950cd7 "ual\\em_2001.exe") ret=66016223
000d:Ret  user32.CharNextA() retval=41950cd8 ret=66016223
000d:Call user32.CharNextA(41950cd8 "al\\em_2001.exe") ret=66016223
000d:Ret  user32.CharNextA() retval=41950cd9 ret=66016223
000d:Call user32.CharNextA(41950cd9 "l\\em_2001.exe") ret=66016223
000d:Ret  user32.CharNextA() retval=41950cda ret=66016223
000d:Call user32.CharNextA(41950cda "\\em_2001.exe") ret=6601621d
000d:Ret  user32.CharNextA() retval=41950cdb ret=6601621d
000d:Call user32.CharNextA(41950cda "\\em_2001.exe") ret=66016223
000d:Ret  user32.CharNextA() retval=41950cdb ret=66016223
000d:Call user32.CharNextA(41950cdb "em_2001.exe") ret=66016223
000d:Ret  user32.CharNextA() retval=41950cdc ret=66016223
000d:Call user32.CharNextA(41950cdc "m_2001.exe") ret=66016223
000d:Ret  user32.CharNextA() retval=41950cdd ret=66016223
000d:Call user32.CharNextA(41950cdd "_2001.exe") ret=66016223
000d:Ret  user32.CharNextA() retval=41950cde ret=66016223
000d:Call user32.CharNextA(41950cde "2001.exe") ret=66016223
000d:Ret  user32.CharNextA() retval=41950cdf ret=66016223
000d:Call user32.CharNextA(41950cdf "001.exe") ret=66016223
000d:Ret  user32.CharNextA() retval=41950ce0 ret=66016223
000d:Call user32.CharNextA(41950ce0 "01.exe") ret=66016223
000d:Ret  user32.CharNextA() retval=41950ce1 ret=66016223
000d:Call user32.CharNextA(41950ce1 "1.exe") ret=66016223
000d:Ret  user32.CharNextA() retval=41950ce2 ret=66016223
000d:Call user32.CharNextA(41950ce2 ".exe") ret=66016223
000d:Ret  user32.CharNextA() retval=41950ce3 ret=66016223
000d:Call user32.CharNextA(41950ce3 "exe") ret=66016223
000d:Ret  user32.CharNextA() retval=41950ce4 ret=66016223
000d:Call user32.CharNextA(41950ce4 "xe") ret=66016223
000d:Ret  user32.CharNextA() retval=41950ce5 ret=66016223
000d:Call user32.CharNextA(41950ce5 "e") ret=66016223
000d:Ret  user32.CharNextA() retval=41950ce6 ret=66016223
000d:Call ntdll.RtlAllocateHeap(41930000,00000000,00000023) ret=6601f061
000d:Ret  ntdll.RtlAllocateHeap() retval=41950d28 ret=6601f061
000d:Call ntdll.RtlFreeHeap(41930000,00000000,41950cf0) ret=66003a5d
000d:Ret  ntdll.RtlFreeHeap() retval=00000001 ret=66003a5d
000d:Call ntdll.RtlFreeHeap(41930000,00000000,41950cb8) ret=66003a6d
000d:Ret  ntdll.RtlFreeHeap() retval=00000001 ret=66003a6d
000d:Call ntdll.MultiByteToWideChar(00000000,00000000,41950d28
"C:\\Program Files\\Electronic Manual",ffffffff,00000000,00000000)
ret=6601b7bd
000d:Ret  ntdll.MultiByteToWideChar() retval=00000023 ret=6601b7bd
000d:Call ntdll.TlsGetValue(00000002) ret=65341473
000d:Ret  ntdll.TlsGetValue() retval=4070dc10 ret=65341473
000d:Call ntdll.MultiByteToWideChar(00000000,00000000,41950d28
"C:\\Program Files\\Electronic Manual",ffffffff,4077814c,00000023)
ret=6601b7e6
000d:Ret  ntdll.MultiByteToWideChar() retval=00000023 ret=6601b7e6
000d:Call ntdll.RtlFreeHeap(41930000,00000000,41950d28) ret=6602d290
000d:Ret  ntdll.RtlFreeHeap() retval=00000001 ret=6602d290
000d:Call ntdll.TlsGetValue(00000002) ret=65343da3
000d:Ret  ntdll.TlsGetValue() retval=4070dc10 ret=65343da3
000d:Call ntdll.TlsGetValue(00000002) ret=65343da3
000d:Ret  ntdll.TlsGetValue() retval=4070dc10 ret=65343da3
000d:Call ntdll.RtlAllocateHeap(406d0000,00000000,00000070) ret=40c229a1
000d:Ret  ntdll.RtlAllocateHeap() retval=40776b00 ret=40c229a1
000d:Call ntdll.TlsGetValue(00000002) ret=6534153b
000d:Ret  ntdll.TlsGetValue() retval=4070dc10 ret=6534153b
000d:Call ntdll.RtlSizeHeap(406d0000,00000000,40778148) ret=40c22cc1
000d:Ret  ntdll.RtlSizeHeap() retval=000000c0 ret=40c22cc1
000d:Call ntdll.TlsGetValue(00000002) ret=6534153b
000d:Ret  ntdll.TlsGetValue() retval=4070dc10 ret=6534153b
000d:Call ntdll.RtlSizeHeap(406d0000,00000000,407609a0) ret=40c22cc1
000d:Ret  ntdll.RtlSizeHeap() retval=000000f0 ret=40c22cc1
000d:Call ntdll.TlsGetValue(00000006) ret=660257e9
000d:Ret  ntdll.TlsGetValue() retval=4070ed50 ret=660257e9
000d:Call ntdll.TlsGetValue(00000006) ret=66025892
000d:Ret  ntdll.TlsGetValue() retval=4070ed50 ret=66025892
000d:Call ntdll.TlsGetValue(00000006) ret=66025892
000d:Ret  ntdll.TlsGetValue() retval=4070ed50 ret=66025892
000d:Call ntdll.WideCharToMultiByte(00000000,00000000,40776b04
L"C:\\Program Files\\Electronic
Manual\\em_2001.log",ffffffff,40a02428,00000105,00000000,00000000)
ret=66025580
000d:Ret  ntdll.WideCharToMultiByte() retval=0000002f ret=66025580
000d:Call ntdll.GetFullPathNameA(40a02428 "C:\\Program Files\\Electronic
Manual\\em_2001.log",00000104,40a02558,40a02420) ret=660255e1
000d:Ret  ntdll.GetFullPathNameA() retval=0000002e ret=660255e1
000d:Call ntdll.TlsGetValue(00000006) ret=66015adc
000d:Ret  ntdll.TlsGetValue() retval=4070ed50 ret=66015adc
000d:Call ntdll.TlsGetValue(00000006) ret=66025b07
000d:Ret  ntdll.TlsGetValue() retval=4070ed50 ret=66025b07
000d:Call ntdll.CreateFileA(40a02558 "C:\\Program Files\\Electronic
Manual\\em_2001.log",c0000000,00000003,40a02518,00000004,00000080,00000000) ret=66025c89
000d:Ret  ntdll.CreateFileA() retval=00000118 ret=66025c89
000d:Call ntdll.GetFileType(00000118) ret=66025c9b
000d:Ret  ntdll.GetFileType() retval=00000001 ret=66025c9b
000d:Call ntdll.SetFilePointer(00000118,00000000,00000000,00000002)
ret=66025f6d
000d:Ret  ntdll.SetFilePointer() retval=0002d425 ret=66025f6d
000d:Call ntdll.RtlAllocateHeap(406d0000,00000000,0000026a) ret=40c229a1
000d:Ret  ntdll.RtlAllocateHeap() retval=40790748 ret=40c229a1
000d:Call ntdll.TlsGetValue(00000006) ret=66025ffc
000d:Ret  ntdll.TlsGetValue() retval=4070ed50 ret=66025ffc
000d:Call ntdll.TlsGetValue(00000006) ret=66025892
000d:Ret  ntdll.TlsGetValue() retval=4070ed50 ret=66025892
000d:Call ntdll.TlsGetValue(00000006) ret=66015adc
000d:Ret  ntdll.TlsGetValue() retval=4070ed50 ret=66015adc
000d:Call ntdll.TlsGetValue(00000006) ret=660144d3
000d:Ret  ntdll.TlsGetValue() retval=4070ed50 ret=660144d3
000d:Call ntdll.TlsGetValue(00000006) ret=660261ea
000d:Ret  ntdll.TlsGetValue() retval=4070ed50 ret=660261ea
000d:Call ntdll.WideCharToMultiByte(00000000,00000000,407766e4
L"-2147221168 Automation error ( caused by: em_2001) occurred while
refreshing dis"...,00000054,00000000,00000000,00000000,00000000)
ret=66026268
000d:Ret  ntdll.WideCharToMultiByte() retval=00000054 ret=66026268
000d:Call ntdll.WideCharToMultiByte(00000000,00000000,407766e4
L"-2147221168 Automation error ( caused by: em_2001) occurred while
refreshing dis"...,00000054,00000000,00000000,00000000,00000000)
ret=66026310
000d:Ret  ntdll.WideCharToMultiByte() retval=00000054 ret=66026310
000d:Call ntdll.TlsGetValue(00000002) ret=65343da3
000d:Ret  ntdll.TlsGetValue() retval=4070dc10 ret=65343da3
000d:Call ntdll.WideCharToMultiByte(00000000,00000000,407766e4
L"-2147221168 Automation error ( caused by: em_2001) occurred while
refreshing dis"...,00000054,4077814c,00000054,00000000,00000000)
ret=6602633b


_______________________________________________
wine-users mailing list
wine-users@xxxxxxxxxx
http://www.winehq.org/mailman/listinfo/wine-users

[Index of Archives]     [Gimp for Windows]     [Red Hat]     [Samba]     [Yosemite Camping]     [Graphics Cards]     [Wine Home]

  Powered by Linux