Since the old version broke unexpectedly, I have installed the latest released RPM's for FC3. Now quicken fails silently, even when I revert to the earlier version. I have turned on logging with WINDEDEBUG=all. Here are the last 400 lines of the log. I would appreciate any assistance that you can give. 0009:trace:syslevel:_EnterSysLevel (0x7f94e320, level 2): thread 9 count after 1 0009:Ret kernel32.97() retval=7fd9e220 ret=7f903f80 0009:Call kernel32.UnMapLS(00000000) ret=7f89427f 0009:Ret kernel32.UnMapLS() retval=7fd19bed ret=7f89427f 0009:Call ntdll.RtlFreeHeap(7fda0000,00000000,00000000) ret=7f8942a2 0009:Ret ntdll.RtlFreeHeap() retval=00000001 ret=7f8942a2 0009:Call ntdll.RtlFreeHeap(7fda0000,00000000,7fdeb8b8) ret=7f8942c2 0009:trace:heap:RtlFreeHeap (0x7fda0000,00000002,0x7fdeb8b8): returning TRUE 0009:Ret ntdll.RtlFreeHeap() retval=00000001 ret=7f8942c2 0009:Call kernel32.98(7f94e320) ret=7f903fa8 0009:trace:syslevel:_LeaveSysLevel (0x7f94e320, level 2): thread 9 count before 1 0009:Call ntdll.RtlLeaveCriticalSection(7f94e320) ret=7fd1fbce 0009:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=7fd1fbce 0009:trace:syslevel:_LeaveSysLevel (0x7f94e320, level 2): thread 9 count after 0 0009:Ret kernel32.98() retval=00000052 ret=7f903fa8 0009:Ret user32.UnregisterClassW() retval=00000001 ret=7eb71b7a 0009:Call user32.UnregisterClassW(7fa7fbc4 L"msctls_trackbar32",00000000) ret=7eb75934 0009:Call kernel32.GlobalFindAtomW(7fa7fbc4 L"msctls_trackbar32") ret=7f894e02 0009:Call ntdll.NtFindAtom(7fa7fbc4,00000022,7fa7f9ba) ret=7fccb7d7 0009: find_atom( table=(nil), name=L"msctls_trackbar32" ) 0009: find_atom() = 0 { atom=c017 } 0009:trace:atom:NtFindAtom L"msctls_trackbar32" -> c017 0009:Ret ntdll.NtFindAtom() retval=00000000 ret=7fccb7d7 0009:Ret kernel32.GlobalFindAtomW() retval=0000c017 ret=7f894e02 0009:trace:class:UnregisterClassW L"msctls_trackbar32" (nil) c017 0009: destroy_class( atom=c017, instance=(nil) ) 0009: destroy_class() = 0 { client_ptr=0x7fdeb900 } 0009:trace:class:CLASS_FreeClass 0x7fdeb900 0009:Call kernel32.97(7f94e320) ret=7f903f80 0009:trace:syslevel:_EnterSysLevel (0x7f94e320, level 2): thread 9 count before 0 0009:Call ntdll.RtlEnterCriticalSection(7f94e320) ret=7fd1fa24 0009:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=7fd1fa24 0009:trace:syslevel:_EnterSysLevel (0x7f94e320, level 2): thread 9 count after 1 0009:Ret kernel32.97() retval=7fd9e220 ret=7f903f80 0009:Call kernel32.UnMapLS(00000000) ret=7f89427f 0009:Ret kernel32.UnMapLS() retval=7fd19bed ret=7f89427f 0009:Call ntdll.RtlFreeHeap(7fda0000,00000000,00000000) ret=7f8942a2 0009:Ret ntdll.RtlFreeHeap() retval=00000001 ret=7f8942a2 0009:Call ntdll.RtlFreeHeap(7fda0000,00000000,7fdeb900) ret=7f8942c2 0009:trace:heap:RtlFreeHeap (0x7fda0000,00000002,0x7fdeb900): returning TRUE 0009:Ret ntdll.RtlFreeHeap() retval=00000001 ret=7f8942c2 0009:Call kernel32.98(7f94e320) ret=7f903fa8 0009:trace:syslevel:_LeaveSysLevel (0x7f94e320, level 2): thread 9 count before 1 0009:Call ntdll.RtlLeaveCriticalSection(7f94e320) ret=7fd1fbce 0009:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=7fd1fbce 0009:trace:syslevel:_LeaveSysLevel (0x7f94e320, level 2): thread 9 count after 0 0009:Ret kernel32.98() retval=00000052 ret=7f903fa8 0009:Ret user32.UnregisterClassW() retval=00000001 ret=7eb75934 0009:Call user32.UnregisterClassW(7fa7fbd4 L"SysTreeView32",00000000) ret=7eb7f966 0009:Call kernel32.GlobalFindAtomW(7fa7fbd4 L"SysTreeView32") ret=7f894e02 0009:Call ntdll.NtFindAtom(7fa7fbd4,0000001a,7fa7f9ca) ret=7fccb7d7 0009: find_atom( table=(nil), name=L"SysTreeView32" ) 0009: find_atom() = 0 { atom=c018 } 0009:trace:atom:NtFindAtom L"SysTreeView32" -> c018 0009:Ret ntdll.NtFindAtom() retval=00000000 ret=7fccb7d7 0009:Ret kernel32.GlobalFindAtomW() retval=0000c018 ret=7f894e02 0009:trace:class:UnregisterClassW L"SysTreeView32" (nil) c018 0009: destroy_class( atom=c018, instance=(nil) ) 0009: destroy_class() = 0 { client_ptr=0x7fdeb948 } 0009:trace:class:CLASS_FreeClass 0x7fdeb948 0009:Call kernel32.97(7f94e320) ret=7f903f80 0009:trace:syslevel:_EnterSysLevel (0x7f94e320, level 2): thread 9 count before 0 0009:Call ntdll.RtlEnterCriticalSection(7f94e320) ret=7fd1fa24 0009:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=7fd1fa24 0009:trace:syslevel:_EnterSysLevel (0x7f94e320, level 2): thread 9 count after 1 0009:Ret kernel32.97() retval=7fd9e220 ret=7f903f80 0009:Call kernel32.UnMapLS(00000000) ret=7f89427f 0009:Ret kernel32.UnMapLS() retval=7fd19bed ret=7f89427f 0009:Call ntdll.RtlFreeHeap(7fda0000,00000000,00000000) ret=7f8942a2 0009:Ret ntdll.RtlFreeHeap() retval=00000001 ret=7f8942a2 0009:Call ntdll.RtlFreeHeap(7fda0000,00000000,7fdeb948) ret=7f8942c2 0009:trace:heap:RtlFreeHeap (0x7fda0000,00000002,0x7fdeb948): returning TRUE 0009:Ret ntdll.RtlFreeHeap() retval=00000001 ret=7f8942c2 0009:Call kernel32.98(7f94e320) ret=7f903fa8 0009:trace:syslevel:_LeaveSysLevel (0x7f94e320, level 2): thread 9 count before 1 0009:Call ntdll.RtlLeaveCriticalSection(7f94e320) ret=7fd1fbce 0009:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=7fd1fbce 0009:trace:syslevel:_LeaveSysLevel (0x7f94e320, level 2): thread 9 count after 0 0009:Ret kernel32.98() retval=00000052 ret=7f903fa8 0009:Ret user32.UnregisterClassW() retval=00000001 ret=7eb7f966 0009:Call user32.UnregisterClassW(7fa7fbd4 L"msctls_updown32",00000000) ret=7eb81c64 0009:Call kernel32.GlobalFindAtomW(7fa7fbd4 L"msctls_updown32") ret=7f894e02 0009:Call ntdll.NtFindAtom(7fa7fbd4,0000001e,7fa7f9ca) ret=7fccb7d7 0009: find_atom( table=(nil), name=L"msctls_updown32" ) 0009: find_atom() = 0 { atom=c019 } 0009:trace:atom:NtFindAtom L"msctls_updown32" -> c019 0009:Ret ntdll.NtFindAtom() retval=00000000 ret=7fccb7d7 0009:Ret kernel32.GlobalFindAtomW() retval=0000c019 ret=7f894e02 0009:trace:class:UnregisterClassW L"msctls_updown32" (nil) c019 0009: destroy_class( atom=c019, instance=(nil) ) 0009: destroy_class() = 0 { client_ptr=0x7fdeb990 } 0009:trace:class:CLASS_FreeClass 0x7fdeb990 0009:Call kernel32.97(7f94e320) ret=7f903f80 0009:trace:syslevel:_EnterSysLevel (0x7f94e320, level 2): thread 9 count before 0 0009:Call ntdll.RtlEnterCriticalSection(7f94e320) ret=7fd1fa24 0009:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=7fd1fa24 0009:trace:syslevel:_EnterSysLevel (0x7f94e320, level 2): thread 9 count after 1 0009:Ret kernel32.97() retval=7fd9e220 ret=7f903f80 0009:Call kernel32.UnMapLS(00000000) ret=7f89427f 0009:Ret kernel32.UnMapLS() retval=7fd19bed ret=7f89427f 0009:Call ntdll.RtlFreeHeap(7fda0000,00000000,00000000) ret=7f8942a2 0009:Ret ntdll.RtlFreeHeap() retval=00000001 ret=7f8942a2 0009:Call ntdll.RtlFreeHeap(7fda0000,00000000,7fdeb990) ret=7f8942c2 0009:trace:heap:RtlFreeHeap (0x7fda0000,00000002,0x7fdeb990): returning TRUE 0009:Ret ntdll.RtlFreeHeap() retval=00000001 ret=7f8942c2 0009:Call kernel32.98(7f94e320) ret=7f903fa8 0009:trace:syslevel:_LeaveSysLevel (0x7f94e320, level 2): thread 9 count before 1 0009:Call ntdll.RtlLeaveCriticalSection(7f94e320) ret=7fd1fbce 0009:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=7fd1fbce 0009:trace:syslevel:_LeaveSysLevel (0x7f94e320, level 2): thread 9 count after 0 0009:Ret kernel32.98() retval=00000052 ret=7f903fa8 0009:Ret user32.UnregisterClassW() retval=00000001 ret=7eb81c64 0009:Call gdi32.DeleteObject(000001b8) ret=7eb06425 0009:Call kernel32.97(7f849460) ret=7eeb96ec 0009:trace:syslevel:_EnterSysLevel (0x7f849460, level 3): thread 9 count before 0 0009:Call ntdll.RtlEnterCriticalSection(7f849460) ret=7fd1fa24 0009:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=7fd1fa24 0009:trace:syslevel:_EnterSysLevel (0x7f849460, level 3): thread 9 count after 1 0009:Ret kernel32.97() retval=7fd9e220 ret=7eeb96ec 0009:trace:gdi:GDI_GetObjPtr (0x1b8): enter 1 0009:trace:gdi:DeleteObject 0x1b8 0009:Call kernel32.97(7f849460) ret=7eeb96ec 0009:trace:syslevel:_EnterSysLevel (0x7f849460, level 3): thread 9 count before 1 0009:Call ntdll.RtlEnterCriticalSection(7f849460) ret=7fd1fa24 0009:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=7fd1fa24 0009:trace:syslevel:_EnterSysLevel (0x7f849460, level 3): thread 9 count after 2 0009:Ret kernel32.97() retval=7fd9e220 ret=7eeb96ec 0009:trace:gdi:GDI_GetObjPtr (0x1bc): enter 2 0009:trace:gdi:DeleteObject 0x1bc 0009:Call ntdll.RtlFreeHeap(7fda0000,00000000,7fdeb5d0) ret=7ee93591 0009:trace:heap:RtlFreeHeap (0x7fda0000,00000002,0x7fdeb5d0): returning TRUE 0009:Ret ntdll.RtlFreeHeap() retval=00000001 ret=7ee93591 0009:Call ntdll.RtlFreeHeap(7fda0000,00000000,7fdeb570) ret=7eeba00b 0009:trace:heap:RtlFreeHeap (0x7fda0000,00000002,0x7fdeb570): returning TRUE 0009:Ret ntdll.RtlFreeHeap() retval=00000001 ret=7eeba00b 0009:trace:gdi:GDI_FreeObject (0x1bc): leave 2 0009:Call kernel32.98(7f849460) ret=7eeb9fa4 0009:trace:syslevel:_LeaveSysLevel (0x7f849460, level 3): thread 9 count before 2 0009:Call ntdll.RtlLeaveCriticalSection(7f849460) ret=7fd1fbce 0009:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=7fd1fbce 0009:trace:syslevel:_LeaveSysLevel (0x7f849460, level 3): thread 9 count after 1 0009:Ret kernel32.98() retval=00000052 ret=7eeb9fa4 0009:Call ntdll.RtlFreeHeap(7fda0000,00000000,7fdeb548) ret=7eeba00b 0009:trace:heap:RtlFreeHeap (0x7fda0000,00000002,0x7fdeb548): returning TRUE 0009:Ret ntdll.RtlFreeHeap() retval=00000001 ret=7eeba00b 0009:trace:gdi:GDI_FreeObject (0x1b8): leave 1 0009:Call kernel32.98(7f849460) ret=7eeb9fa4 0009:trace:syslevel:_LeaveSysLevel (0x7f849460, level 3): thread 9 count before 1 0009:Call ntdll.RtlLeaveCriticalSection(7f849460) ret=7fd1fbce 0009:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=7fd1fbce 0009:trace:syslevel:_LeaveSysLevel (0x7f849460, level 3): thread 9 count after 0 0009:Ret kernel32.98() retval=00000052 ret=7eeb9fa4 0009:Ret gdi32.DeleteObject() retval=00000001 ret=7eb06425 0009:Call gdi32.DeleteObject(000001b4) ret=7eb0643c 0009:Call kernel32.97(7f849460) ret=7eeb96ec 0009:trace:syslevel:_EnterSysLevel (0x7f849460, level 3): thread 9 count before 0 0009:Call ntdll.RtlEnterCriticalSection(7f849460) ret=7fd1fa24 0009:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=7fd1fa24 0009:trace:syslevel:_EnterSysLevel (0x7f849460, level 3): thread 9 count after 1 0009:Ret kernel32.97() retval=7fd9e220 ret=7eeb96ec 0009:trace:gdi:GDI_GetObjPtr (0x1b4): enter 1 0009:trace:gdi:DeleteObject 0x1b4 0009:Call ntdll.RtlFreeHeap(7fda0000,00000000,7fdeb530) ret=7ee93591 0009:trace:heap:RtlFreeHeap (0x7fda0000,00000002,0x7fdeb530): returning TRUE 0009:Ret ntdll.RtlFreeHeap() retval=00000001 ret=7ee93591 0009:Call ntdll.RtlFreeHeap(7fda0000,00000000,7fdeb4e8) ret=7eeba00b 0009:trace:heap:RtlFreeHeap (0x7fda0000,00000002,0x7fdeb4e8): returning TRUE 0009:Ret ntdll.RtlFreeHeap() retval=00000001 ret=7eeba00b 0009:trace:gdi:GDI_FreeObject (0x1b4): leave 1 0009:Call kernel32.98(7f849460) ret=7eeb9fa4 0009:trace:syslevel:_LeaveSysLevel (0x7f849460, level 3): thread 9 count before 1 0009:Call ntdll.RtlLeaveCriticalSection(7f849460) ret=7fd1fbce 0009:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=7fd1fbce 0009:trace:syslevel:_LeaveSysLevel (0x7f849460, level 3): thread 9 count after 0 0009:Ret kernel32.98() retval=00000052 ret=7eeb9fa4 0009:Ret gdi32.DeleteObject() retval=00000001 ret=7eb0643c 0009:Call kernel32.GlobalDeleteAtom(0000c00b) ret=7eb0645a 0009:Call ntdll.NtDeleteAtom(0000c00b) ret=7fccb4fe 0009: delete_atom( table=(nil), atom=c00b ) 0009: delete_atom() = 0 0009:Ret ntdll.NtDeleteAtom() retval=00000000 ret=7fccb4fe 0009:Ret kernel32.GlobalDeleteAtom() retval=00000000 ret=7eb0645a 0009:trace:commctrl:DllMain Subclassing atom deleted: 0xc00b 0009:Call kernel32.FreeLibrary(7db20000) ret=7eb81d63 0009:Call ntdll.LdrUnloadDll(7db20000) ret=7fcfb177 0009:trace:module:LdrUnloadDll (0x7db20000) 0009:Ret ntdll.LdrUnloadDll() retval=00000000 ret=7fcfb177 0009:Ret kernel32.FreeLibrary() retval=00000001 ret=7eb81d63 0009:Ret PE DLL (proc=0x7eb81d6c,module=0x7eaf0000 L"comctl32.dll",reason=PROCESS_DETACH,res=0x1) retval=1 0009:Call PE DLL (proc=0x7db2fe00,module=0x7db20000 L"uxtheme.dll",reason=PROCESS_DETACH,res=0x1) 0009:trace:uxtheme:DllMain 0x7db20000 0x0 0x1: stub 0009:Ret PE DLL (proc=0x7db2fe00,module=0x7db20000 L"uxtheme.dll",reason=PROCESS_DETACH,res=0x1) retval=1 0009:Call PE DLL (proc=0x7ebea630,module=0x7ebc0000 L"shlwapi.dll",reason=PROCESS_DETACH,res=0x1) 0009:trace:shell:DllMain 0x7ebc0000 0x0 0x1 0009:Call kernel32.TlsFree(00000003) ret=7ebde5ac 0009:Call ntdll.RtlAcquirePebLock() ret=7fd077f4 0009:Ret ntdll.RtlAcquirePebLock() retval=00000000 ret=7fd077f4 0009:Call ntdll.RtlAreBitsSet(7beff86c,00000003,00000001) ret=7fd0786d 0009:trace:ntdll:RtlAreBitsSet (0x7beff86c,3,1) 0009:Ret ntdll.RtlAreBitsSet() retval=00000001 ret=7fd0786d 0009:Call ntdll.RtlClearBits(7beff86c,00000003,00000001) ret=7fd078b1 0009:trace:ntdll:RtlClearBits (0x7beff86c,3,1) 0009:Ret ntdll.RtlClearBits() retval=ffff00ff ret=7fd078b1 0009:Call ntdll.NtSetInformationThread (fffffffe,0000000a,7fa7fb5c,00000004) ret=7fd078df 0009:Ret ntdll.NtSetInformationThread() retval=00000000 ret=7fd078df 0009:Call ntdll.RtlReleasePebLock() ret=7fd0783d 0009:Ret ntdll.RtlReleasePebLock() retval=00000000 ret=7fd0783d 0009:Ret kernel32.TlsFree() retval=00000001 ret=7ebde5ac 0009:Ret PE DLL (proc=0x7ebea630,module=0x7ebc0000 L"shlwapi.dll",reason=PROCESS_DETACH,res=0x1) retval=1 0009:Call PE DLL (proc=0x65f17038,module=0x65f00000 L"ole32.dll",reason=PROCESS_DETACH,res=0x1) 0009:Call kernel32.CreateMutexA(7fa7fa90,00000000,65f17294 "OleHeapDestroyMutex") ret=65f207c8 0009:Call ntdll.RtlInitUnicodeString(7fa7f758,7fa7f7a8 L"OleHeapDestroyMutex") ret=7fd1d0fc 0009:Ret ntdll.RtlInitUnicodeString() retval=00000028 ret=7fd1d0fc 0009:Call ntdll.NtCreateMutant(7fa7f754,001f0001,7fa7f760,00000000) ret=7fd1d124 0009: create_mutex( access=001f0001, attributes=00000040, owned=0, name=L"OleHeapDestroyMutex" ) 0009: create_mutex() = 0 { handle=0x100 } 0009:Ret ntdll.NtCreateMutant() retval=00000000 ret=7fd1d124 0009:Call ntdll.RtlNtStatusToDosError(00000000) ret=7fd1d12f 0009:Ret ntdll.RtlNtStatusToDosError() retval=00000000 ret=7fd1d12f 0009:Ret kernel32.CreateMutexA() retval=00000100 ret=65f207c8 0009:Call kernel32.GetLastError() ret=65f207d8 0009:Ret kernel32.GetLastError() retval=00000000 ret=65f207d8 0009:Call kernel32.WaitForSingleObject(00000100,ffffffff) ret=65f20800 0009:Call ntdll.NtWaitForMultipleObjects (00000001,7fa7f8a0,00000000,00000000,00000000) ret=7fd1c47f 0009: select( flags=4, cookie=0x7fa7f6b0, signal=(nil), timeout=0, handles={0x100} ) 0009: select() = 0 0009:Ret ntdll.NtWaitForMultipleObjects() retval=00000000 ret=7fd1c47f 0009:Ret kernel32.WaitForSingleObject() retval=00000000 ret=65f20800 0009:Call kernel32.ReleaseMutex(00000100) ret=65f1719d 0009:Call ntdll.NtReleaseMutant(00000100,00000000) ret=7fd1d353 0009: release_mutex( handle=0x100 ) 0009: release_mutex() = 0 { prev_count=00000001 } 0009:Ret ntdll.NtReleaseMutant() retval=00000000 ret=7fd1d353 0009:Ret kernel32.ReleaseMutex() retval=00000001 ret=65f1719d 0009:Call kernel32.CloseHandle(00000100) ret=65f171a6 0009:Call ntdll.NtClose(00000100) ret=7fd07f3a 0009: close_handle( handle=0x100 ) 0009: close_handle() = 0 { fd=-1 } 0009:Ret ntdll.NtClose() retval=00000000 ret=7fd07f3a 0009:Ret kernel32.CloseHandle() retval=00000001 ret=65f171a6 0009:Call ntdll.RtlEnterCriticalSection(65fb3520) ret=65f20841 0009:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=65f20841 0009:Call kernel32.ReleaseMutex(000000c4) ret=65f3b601 0009:Call ntdll.NtReleaseMutant(000000c4,00000000) ret=7fd1d353 0009: release_mutex( handle=0xc4 ) 0009: release_mutex() = MUTANT_NOT_OWNED { prev_count=00000000 } 0009:Ret ntdll.NtReleaseMutant() retval=c0000046 ret=7fd1d353 0009:Call ntdll.RtlNtStatusToDosError(c0000046) ret=7fd1d370 0009:Ret ntdll.RtlNtStatusToDosError() retval=00000120 ret=7fd1d370 0009:Ret kernel32.ReleaseMutex() retval=00000000 ret=65f3b601 0009:Call kernel32.CloseHandle(000000c4) ret=65f3b60d 0009:Call ntdll.NtClose(000000c4) ret=7fd07f3a 0009: close_handle( handle=0xc4 ) 0009: close_handle() = 0 { fd=-1 } 0009:Ret ntdll.NtClose() retval=00000000 ret=7fd07f3a 0009:Ret kernel32.CloseHandle() retval=00000001 ret=65f3b60d 0009:Call kernel32.ReleaseMutex(00000000) ret=65f3b62a 0009:Call ntdll.NtReleaseMutant(00000000,00000000) ret=7fd1d353 0009: release_mutex( handle=(nil) ) 0009: release_mutex() = INVALID_HANDLE { prev_count=00000000 } 0009:Ret ntdll.NtReleaseMutant() retval=c0000008 ret=7fd1d353 0009:Call ntdll.RtlNtStatusToDosError(c0000008) ret=7fd1d370 0009:Ret ntdll.RtlNtStatusToDosError() retval=00000006 ret=7fd1d370 0009:Ret kernel32.ReleaseMutex() retval=00000000 ret=65f3b62a 0009:Call kernel32.CloseHandle(00000000) ret=65f3b636 0009:Call ntdll.NtClose(00000000) ret=7fd07f3a 0009: close_handle( handle=(nil) ) 0009: close_handle() = INVALID_HANDLE { fd=0 } 0009:Ret ntdll.NtClose() retval=c0000008 ret=7fd07f3a 0009:Call ntdll.RtlNtStatusToDosError(c0000008) ret=7fd07f6a 0009:Ret ntdll.RtlNtStatusToDosError() retval=00000006 ret=7fd07f6a 0009:Ret kernel32.CloseHandle() retval=00000000 ret=65f3b636 0009:Call kernel32.ReleaseMutex(00000000) ret=65f3b653 0009:Call ntdll.NtReleaseMutant(00000000,00000000) ret=7fd1d353 0009: release_mutex( handle=(nil) ) 0009: release_mutex() = INVALID_HANDLE { prev_count=00000000 } 0009:Ret ntdll.NtReleaseMutant() retval=c0000008 ret=7fd1d353 0009:Call ntdll.RtlNtStatusToDosError(c0000008) ret=7fd1d370 0009:Ret ntdll.RtlNtStatusToDosError() retval=00000006 ret=7fd1d370 0009:Ret kernel32.ReleaseMutex() retval=00000000 ret=65f3b653 0009:Call kernel32.CloseHandle(00000000) ret=65f3b65f 0009:Call ntdll.NtClose(00000000) ret=7fd07f3a 0009: close_handle( handle=(nil) ) 0009: close_handle() = INVALID_HANDLE { fd=0 } 0009:Ret ntdll.NtClose() retval=c0000008 ret=7fd07f3a 0009:Call ntdll.RtlNtStatusToDosError(c0000008) ret=7fd07f6a 0009:Ret ntdll.RtlNtStatusToDosError() retval=00000006 ret=7fd07f6a 0009:Ret kernel32.CloseHandle() retval=00000000 ret=65f3b65f 0009:Call kernel32.ReleaseMutex(00000000) ret=65f3b67c 0009:Call ntdll.NtReleaseMutant(00000000,00000000) ret=7fd1d353 0009: release_mutex( handle=(nil) ) 0009: release_mutex() = INVALID_HANDLE { prev_count=00000000 } 0009:Ret ntdll.NtReleaseMutant() retval=c0000008 ret=7fd1d353 0009:Call ntdll.RtlNtStatusToDosError(c0000008) ret=7fd1d370 0009:Ret ntdll.RtlNtStatusToDosError() retval=00000006 ret=7fd1d370 0009:Ret kernel32.ReleaseMutex() retval=00000000 ret=65f3b67c 0009:Call kernel32.CloseHandle(00000000) ret=65f3b688 0009:Call ntdll.NtClose(00000000) ret=7fd07f3a 0009: close_handle( handle=(nil) ) 0009: close_handle() = INVALID_HANDLE { fd=0 } 0009:Ret ntdll.NtClose() retval=c0000008 ret=7fd07f3a 0009:Call ntdll.RtlNtStatusToDosError(c0000008) ret=7fd07f6a 0009:Ret ntdll.RtlNtStatusToDosError() retval=00000006 ret=7fd07f6a 0009:Ret kernel32.CloseHandle() retval=00000000 ret=65f3b688 0009:Call kernel32.ReleaseMutex(00000000) ret=65f3b695 0009:Call ntdll.NtReleaseMutant(00000000,00000000) ret=7fd1d353 0009: release_mutex( handle=(nil) ) 0009: release_mutex() = INVALID_HANDLE { prev_count=00000000 } 0009:Ret ntdll.NtReleaseMutant() retval=c0000008 ret=7fd1d353 0009:Call ntdll.RtlNtStatusToDosError(c0000008) ret=7fd1d370 0009:Ret ntdll.RtlNtStatusToDosError() retval=00000006 ret=7fd1d370 0009:Ret kernel32.ReleaseMutex() retval=00000000 ret=65f3b695 0009:Call kernel32.CloseHandle(00000000) ret=65f3b6a1 0009:Call ntdll.NtClose(00000000) ret=7fd07f3a 0009: close_handle( handle=(nil) ) 0009: close_handle() = INVALID_HANDLE { fd=0 } 0009:Ret ntdll.NtClose() retval=c0000008 ret=7fd07f3a 0009:Call ntdll.RtlNtStatusToDosError(c0000008) ret=7fd07f6a 0009:Ret ntdll.RtlNtStatusToDosError() retval=00000006 ret=7fd07f6a 0009:Ret kernel32.CloseHandle() retval=00000000 ret=65f3b6a1 0009:Call ntdll.RtlDeleteCriticalSection(65fb3538) ret=65f0f4f2 0009:trace:heap:RtlFreeHeap (0x7fda0000,00000002,0x7fdeb498): returning TRUE 0009:Ret ntdll.RtlDeleteCriticalSection() retval=00000000 ret=65f0f4f2 0009:Call ntdll.RtlLeaveCriticalSection(65fb3520) ret=65f20862 0009:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=65f20862 0009:Call ntdll.RtlDeleteCriticalSection(65fb3520) ret=65f3b6ce 0009:trace:heap:RtlFreeHeap (0x7fda0000,00000002,0x7fdeb470): returning TRUE 0009:Ret ntdll.RtlDeleteCriticalSection() retval=00000000 ret=65f3b6ce 0009:Ret PE DLL (proc=0x65f17038,module=0x65f00000 L"ole32.dll",reason=PROCESS_DETACH,res=0x1) retval=1 0009:Call PE DLL (proc=0x7f917f98,module=0x7f880000 L"user32.dll",reason=PROCESS_DETACH,res=0x1) 0009:Call kernel32.__wine_dll_unregister_16(7f9469dc) ret=7f8822bd 0009:Ret kernel32.__wine_dll_unregister_16() retval=0000000a ret=7f8822bd 0009:Call kernel32.__wine_dll_unregister_16(7f947090) ret=7f8827cd 0009:Ret kernel32.__wine_dll_unregister_16() retval=0000000b ret=7f8827cd 0009:Call kernel32.__wine_dll_unregister_16(7f947b4c) ret=7f882a35 0009:Ret kernel32.__wine_dll_unregister_16() retval=0000000c ret=7f882a35 0009:Call kernel32.__wine_dll_unregister_16(7f947fdc) ret=7f882b0d 0009:Ret kernel32.__wine_dll_unregister_16() retval=0000000d ret=7f882b0d 0009:Call kernel32.__wine_dll_unregister_16(7f948398) ret=7f884825 0009:Ret kernel32.__wine_dll_unregister_16() retval=0000000e ret=7f884825 0009:Ret PE DLL (proc=0x7f917f98,module=0x7f880000 L"user32.dll",reason=PROCESS_DETACH,res=0x1) retval=1 0009:Call PE DLL (proc=0x7dd6bb90,module=0x7dd10000 L"winex11.drv",reason=PROCESS_DETACH,res=0x1) 0009:Call ntdll.RtlEnterCriticalSection(7dd7f3c0) ret=7dd5a90a 0009:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=7dd5a90a 0009:Call ntdll.RtlLeaveCriticalSection(7dd7f3c0) ret=7dd5a97c 0009:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=7dd5a97c 0009:Call ntdll.RtlEnterCriticalSection(7dd7f3c0) ret=7dd5a90a 0009:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=7dd5a90a 0009:Call ntdll.RtlLeaveCriticalSection(7dd7f3c0) ret=7dd5a97c 0009:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=7dd5a97c 0009:Call ntdll.RtlEnterCriticalSection(7dd7f660) ret=7dd66e0f 0009:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=7dd66e0f 0009:Call ntdll.RtlLeaveCriticalSection(7dd7f660) ret=7dd66e40 0009:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=7dd66e40 0009:Call ntdll.RtlDeleteCriticalSection(7dd7f3c0) ret=7dd5ac9d 0009:Ret ntdll.RtlDeleteCriticalSection() retval=00000000 ret=7dd5ac9d 0009:Call kernel32.TlsFree(00000000) ret=7dd5acb0 0009:Call ntdll.RtlAcquirePebLock() ret=7fd077f4 0009:Ret ntdll.RtlAcquirePebLock() retval=00000000 ret=7fd077f4 0009:Call ntdll.RtlAreBitsSet(7beff86c,00000000,00000001) ret=7fd0786d 0009:trace:ntdll:RtlAreBitsSet (0x7beff86c,0,1) 0009:Ret ntdll.RtlAreBitsSet() retval=00000001 ret=7fd0786d 0009:Call ntdll.RtlClearBits(7beff86c,00000000,00000001) ret=7fd078b1 0009:trace:ntdll:RtlClearBits (0x7beff86c,0,1) 0009:Ret ntdll.RtlClearBits() retval=000000fe ret=7fd078b1 0009:Call ntdll.NtSetInformationThread (fffffffe,0000000a,7fa7f9cc,00000004) ret=7fd078df 0009:Ret ntdll.NtSetInformationThread() retval=00000000 ret=7fd078df 0009:Call ntdll.RtlReleasePebLock() ret=7fd0783d 0009:Ret ntdll.RtlReleasePebLock() retval=00000000 ret=7fd0783d 0009:Ret kernel32.TlsFree() retval=00000001 ret=7dd5acb0 0009:Ret PE DLL (proc=0x7dd6bb90,module=0x7dd10000 L"winex11.drv",reason=PROCESS_DETACH,res=0x1) retval=1 0009:Call PE DLL (proc=0x763912c0,module=0x76390000 L"imm32.dll",reason=PROCESS_DETACH,res=0x1) 0009:Call ntdll.RtlDeleteCriticalSection(763a6020) ret=76391307 0009:trace:heap:RtlFreeHeap (0x7fda0000,00000002,0x7fde91a8): returning TRUE 0009:Ret ntdll.RtlDeleteCriticalSection() retval=00000000 ret=76391307 0009:Ret PE DLL (proc=0x763912c0,module=0x76390000 L"imm32.dll",reason=PROCESS_DETACH,res=0x1) retval=1 0009:Call PE DLL (proc=0x7eee0894,module=0x7ee80000 L"gdi32.dll",reason=PROCESS_DETACH,res=0x1) 0009:Call kernel32.__wine_dll_unregister_16(7f844ed8) ret=7ee89b4d 0009:Ret kernel32.__wine_dll_unregister_16() retval=00000007 ret=7ee89b4d 0009:Call kernel32.__wine_dll_unregister_16(7f844fd0) ret=7ee8b4dd 0009:Ret kernel32.__wine_dll_unregister_16() retval=00000008 ret=7ee8b4dd 0009:Call kernel32.__wine_dll_unregister_16(7f848d70) ret=7ee8b699 0009:Ret kernel32.__wine_dll_unregister_16() retval=00000009 ret=7ee8b699 0009:Ret PE DLL (proc=0x7eee0894,module=0x7ee80000 L"gdi32.dll",reason=PROCESS_DETACH,res=0x1) retval=1 0009:Call PE DLL (proc=0x7ed907d0,module=0x7ed70000 L"advapi32.dll",reason=PROCESS_DETACH,res=0x1) 0009:Ret PE DLL (proc=0x7ed907d0,module=0x7ed70000 L"advapi32.dll",reason=PROCESS_DETACH,res=0x1) retval=1 0009:Call PE DLL (proc=0x7fd317ec,module=0x7fcc0000 L"kernel32.dll",reason=PROCESS_DETACH,res=0x1) 0009:Call ntdll.RtlEnterCriticalSection(7fd9e160) ret=7fd12055 0009:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=7fd12055 0009:Call ntdll.RtlLeaveCriticalSection(7fd9e160) ret=7fd12065 0009:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=7fd12065 0009:Ret PE DLL (proc=0x7fd317ec,module=0x7fcc0000 L"kernel32.dll",reason=PROCESS_DETACH,res=0x1) retval=1 0009:Call PE DLL (proc=0x7bee2948,module=0x7bea0000 L"ntdll.dll",reason=PROCESS_DETACH,res=0x1) 0009:Ret PE DLL (proc=0x7bee2948,module=0x7bea0000 L"ntdll.dll",reason=PROCESS_DETACH,res=0x1) retval=1 0009:Ret ntdll.LdrShutdownProcess() retval=00000000 ret=7fd0745f 0009:Call ntdll.NtTerminateProcess(ffffffff,00000000) ret=7fd0746f 0009: terminate_process( handle=0xffffffff, exit_code=0 ) 0009: terminate_process() = 0 { self=1 } 0009: *killed* exit_code=0 wineserver: exiting (pid=4467) On Fri, 2005-11-25 at 21:05 -0600, David Johnson wrote: > Wine 20050111 has been working fine until today ... now it fails when I > go to run Quicken 2002. > > I am running Fedora Core 3 on a Pentium 3 with all of the current > updates, wine 20050111. Windows Version is set to "Win98" > > Error message: > > fixme:msvcrt:_setmbcp Unreal codepages (e.g. -3) not implemented. > > What has happened? > > Thanks, > > David Johnson > > > _______________________________________________ > wine-users mailing list > wine-users@xxxxxxxxxx > http://www.winehq.org/mailman/listinfo/wine-users _______________________________________________ wine-users mailing list wine-users@xxxxxxxxxx http://www.winehq.org/mailman/listinfo/wine-users