1. You are viewing our forum as a guest. For full access please Register. WindowsBBS.com is completely free, paid for by advertisers and donations.

urlmon dll problem

Discussion in 'Windows XP' started by Jayt36, 2004/08/29.

Thread Status:
Not open for further replies.
  1. 2004/08/29
    Jayt36

    Jayt36 Inactive Thread Starter

    Joined:
    2003/03/23
    Messages:
    112
    Likes Received:
    0
    Whenever I view a video on www.msn.com I get an error stating that IE has
    encountered an error and must close. It seems to be related to the urlmon
    dll. When I do a file search I find three urlmon dlls on my computer. In
    c/1386 there is one with a version # of 6.0.2800.1106. There is one listed
    as Urlmon dll (3) in my Windows/System 32 folder with the version number of
    6.0.2800.1143. And there is another one in Windows/System32 with a version
    number of 6.0.2800.1400.
    I have tried registering urlmon dll (successfully) and have run SFC /scannow, but the problem persists. Any suggestions?
    btw- my OS is WinXp Pro.
     
  2. 2004/08/29
    JoeHobart

    JoeHobart Inactive Alumni

    Joined:
    2004/05/19
    Messages:
    919
    Likes Received:
    1
    can you give us a specific link to an example video. I would expect that your problem is related to a BHO (ala hijack/spyware) or an old plugin for video playback. That URLMON version is within bounds.

    Alternatly, you could do a dump analysis and post that here for a little more targeted info.
     

  3. to hide this advert.

  4. 2004/08/29
    Jayt36

    Jayt36 Inactive Thread Starter

    Joined:
    2003/03/23
    Messages:
    112
    Likes Received:
    0
    Actually, there is no url as such. When you go to www.msn.com there is a section called Broadband Highlights. This is the only area that causes me a problem. Every time I try to view it I get the error "IE has encountered an error and has to close" - when I click on to see what the error report is it refers to urlmon dll.
    I do have a popup blocker - pop up manager - but that is my only browser helper, and I have tried accessing the videos with that uninstalled and I still get the error.
    But thanks for the reply.
     
  5. 2004/08/30
    Newt

    Newt Inactive

    Joined:
    2002/01/07
    Messages:
    10,974
    Likes Received:
    2
    Maybe the Data Dump Joe suggested would provide useful information.

    If you used Hijackthis to get the BHO information and maybe to disable the BHO, what version? Otherwise, what anti-spyware tools are you using?
     
    Newt,
    #4
  6. 2004/08/30
    JoeHobart

    JoeHobart Inactive Alumni

    Joined:
    2004/05/19
    Messages:
    919
    Likes Received:
    1
  7. 2004/08/30
    Jayt36

    Jayt36 Inactive Thread Starter

    Joined:
    2003/03/23
    Messages:
    112
    Likes Received:
    0
    Newt, I am using the latest versions and updated files of Spybot Search and Destroy and also Ad-aware SE Personal. It really doesn't do a "dump ", it just has the "IE has encountered an error and must close..."


    Joe, I only get the "IE has encountered an error and must close" on
    http://video.msn.com/video/p.htm?setcp=b . It happens when a video is playing (usually when switching from one video to the next one). Not on either of the other two sites.
     
  8. 2004/08/30
    JoeHobart

    JoeHobart Inactive Alumni

    Joined:
    2004/05/19
    Messages:
    919
    Likes Received:
    1
    Set this so we can get a dump to look at.

    How to disable or redirect Internet Explorer error reporting
    http://support.microsoft.com/default.aspx?kbid=310116

    To disable Internet Explorer Error Reporting so that the default operating system error handler is shown if a crash occurs, set the following registry key:
    HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main
    IEWatsonEnabled = (DWORD) 0
     
  9. 2004/08/31
    Jayt36

    Jayt36 Inactive Thread Starter

    Joined:
    2003/03/23
    Messages:
    112
    Likes Received:
    0
    Joe, I would like to co-operate but my registry has no such key. I found the user dump that the IE error reporting sends to MS but it says it is too large to be posted here. I am afraid I am lost. Anyway, it is just the one area and not a very important one that I can't use. Thanks to you and all the others who have tried to help.
     
  10. 2004/08/31
    Newt

    Newt Inactive

    Joined:
    2002/01/07
    Messages:
    10,974
    Likes Received:
    2
    Jayt36 - if you don't already have it you can easily create it.

    start~run~regedit and when the app starts, drill down to
    HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main

    Right-click on the folder symbol named 'Main' and then follow along as shown in the pictures.

    If you happen to goof, not a problem since a misnamed key is inactive and since you can always go back and modify or delete/recreate the correct one.
     
    Newt,
    #9
  11. 2004/08/31
    JoeHobart

    JoeHobart Inactive Alumni

    Joined:
    2004/05/19
    Messages:
    919
    Likes Received:
    1
    also, if you found the cab for that error reporting, you can extract the.dmp and run it through that tool.
     
  12. 2004/08/31
    Jayt36

    Jayt36 Inactive Thread Starter

    Joined:
    2003/03/23
    Messages:
    112
    Likes Received:
    0
    Newt and Joe, I created the registry key. When IE closes is makes a report to C/Documents and Settings/my name/local settings/temp. It creates a file WEREF. The file holds another file called appcompat which is 42.1 kb in size. I can open it in Notepad. But when I try to copy and paste it to the forum, the forum tells me it is too big. Now what?
     
  13. 2004/08/31
    JoeHobart

    JoeHobart Inactive Alumni

    Joined:
    2004/05/19
    Messages:
    919
    Likes Received:
    1
    well pfft.

    close all IE windows
    open up a CMD prompt
    Code:
    cd\program files\internet explorer
    ntsd iexplore
    Reproduce the crash. When IE appears to hang, you should have some gibberish in the NTSD window and the words 'first chance exception: Access violation' nearby.

    type .dump c:\ie.dmp
    type Q and press enter to exit

    If it doesnt say access violation, or hangs way before it should have crashed, hit G and press enter.

    This is assured to get a dump for you to run the analysis tool against.
     
  14. 2004/08/31
    Jayt36

    Jayt36 Inactive Thread Starter

    Joined:
    2003/03/23
    Messages:
    112
    Likes Received:
    0
    Joe, I don't mean to be dense and I really appreciate your help, but I must be doing something wrong. I opened the CMD prompt and typed in what you said cd\program files\internet explorer ntsd iexplore. However, if I hit enter it tells me it cannot find the path. If I just leave the cmd prompt open and cause the "crash" -although crash is not exactly what it does -it pops up a window and says "IE has encountered an error and must close ". When it closes there is nothing in the cmd prompt window. What am I doing wrong?
     
  15. 2004/09/01
    JoeHobart

    JoeHobart Inactive Alumni

    Joined:
    2004/05/19
    Messages:
    919
    Likes Received:
    1
    i wasnt totally clear from formatting limitations.. there are two seperate commands there.

    the idea here is to
    a) cd \program files\internet explorer

    then once you are in that directory run this command

    b) ntsd iexplore

    That will spawn a new dos window, hit G to get it started and repro your issue.
     
  16. 2004/09/01
    Jayt36

    Jayt36 Inactive Thread Starter

    Joined:
    2003/03/23
    Messages:
    112
    Likes Received:
    0
    Joe, here is the debug log. Even if we don't get the problem fixed, I have learned how to do something new, and that is always good. :)

    Opened log file 'c:\debuglog.txt'
    Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols

    Microsoft (R) Windows Debugger Version 6.3.0017.0
    Copyright (c) Microsoft Corporation. All rights reserved.


    Loading Dump File [C:\Documents and Settings\All Users\Application Data\Microsoft\Dr Watson\user.dmp]
    User Mini Dump File: Only registers, stack and portions of memory are available

    Comment: 'Dr. Watson generated MiniDump'
    Windows XP Version 2600 (Service Pack 1) UP Free x86 compatible
    Product: WinNt, suite: SingleUserTS
    Debug session time: Wed Sep 01 12:43:59 2004
    System Uptime: not available
    Process Uptime: 0 days 0:02:05.000
    Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: C:\WINDOWS;C:\WINDOWS\system32;C:\WINDOWS\system32\drivers
    ........................................................................................................................................
    (1e0.ee8): Access violation - code c0000005 (!!! second chance !!!)
    eax=00000000 ebx=00000000 ecx=1a4042bc edx=05957130 esi=05957188 edi=00000001
    eip=1a406b8d esp=038eea00 ebp=038eea20 iopl=0 nv up ei pl nz na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000206
    URLMON!COInetProt::Terminate+0x8:
    1a406b8d 8b08 mov ecx,[eax] ds:0023:00000000=????????
    0:014> !analyze -v;r;kv;lmtn;.logclose;q
    *******************************************************************************
    * *
    * Exception Analysis *
    * *
    *******************************************************************************


    FAULTING_IP:
    URLMON!COInetProt::Terminate+8
    1a406b8d 8b08 mov ecx,[eax]

    EXCEPTION_RECORD: ffffffff -- (.exr ffffffffffffffff)
    .exr ffffffffffffffff
    ExceptionAddress: 1a406b8d (URLMON!COInetProt::Terminate+0x00000008)
    ExceptionCode: c0000005 (Access violation)
    ExceptionFlags: 00000000
    NumberParameters: 2
    Parameter[0]: 00000000
    Parameter[1]: 00000000
    Attempt to read from address 00000000

    DEFAULT_BUCKET_ID: APPLICATION_FAULT

    PROCESS_NAME: IEXPLORE.EXE

    ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx ". The memory could not be "%s ".

    READ_ADDRESS: 00000000

    BUGCHECK_STR: ACCESS_VIOLATION

    THREAD_ATTRIBUTES:
    LAST_CONTROL_TRANSFER: from 1a406b22 to 1a406b8d

    STACK_TEXT:
    038eea00 1a406b22 05957188 00000000 637edc24 URLMON!COInetProt::Terminate+0x8
    038eea20 635e71b9 00000001 00000000 05a3ff14 URLMON!CTransaction::Terminate+0x10c
    038eea50 635e651b 0595718c 05a3fe28 00000000 MSHTML!CDwnBindData::TerminateBind+0x1c0
    038eea70 635f6235 80040155 059570a4 1a40699e MSHTML!CDwnBindData::Terminate+0xc4
    038eea7c 1a40699e 05a3fe64 80040155 00000000 MSHTML!CDwnBindData::ReportResult+0x5e
    038eea90 1a4052cd 0595718c 80040155 00000000 URLMON!COInetProt::ReportResult+0x19
    038eeab8 1a421f40 0595718c f4000000 00000000 URLMON!CTransaction::DispatchReport+0x18d
    038eeaf0 1a409b9d 05956fe0 800c0014 00000000 URLMON!CTransaction::ReportResult+0xab
    038eeb04 1a409a8f 001c1580 800c0014 00000000 URLMON!CINetEmbdFilter::ReportResult+0x19
    038eeb30 1a4239bf 800c0014 00000000 00000000 URLMON!CINet::ReportResultAndStop+0x117
    038eebac 1a423f6b 038eebc8 038efc10 0000012e URLMON!CINetHttp::RedirectRequest+0x2e7
    038efc14 1a40d18d 00000000 059eba00 00000000 URLMON!CINetHttp::QueryStatusOnResponse+0x183
    038efc2c 1a40d12d 00000000 059eba00 1a40da20 URLMON!CINet::QueryInfoOnResponse+0x42
    038efc38 1a40da20 038efcbc 059eba00 1a40d99d URLMON!CINet::INetQueryInfo+0x12
    038efc44 1a40d99d 00000005 80004005 059eba00 URLMON!CINet::OnINetInternal+0xb2
    038efc54 1a40d97c 059eba00 038efcbc 1a40d963 URLMON!CINet::MyContinue+0x1e
    038efc60 1a40d963 02e31ac0 038efcbc 038efcbc URLMON!CINetProtImpl::Continue+0x10
    038efc74 1a40e706 059eba00 038efcbc 1a42196a URLMON!CINet::Continue+0x29
    038efc80 1a42196a 05957188 038efcbc 059eba00 URLMON!COInetProt::Continue+0x11
    038efca0 1a40d854 05956fe0 038efcbc 059eba00 URLMON!CTransaction::Switch+0x65
    038efccc 1a40dacf 00000005 00000000 00000000 URLMON!CINet::TransitState+0x91
    038efd68 1a40bcbb 00000080 00000001 00cc000c URLMON!CINet::OnINetSendRequest+0xe5
    038efd80 63009628 00cc000c 059eba00 00000064 URLMON!CINet::CINetCallback+0x1e8
    038efebc 63010026 00000064 038efda8 00000008 WININET!InternetIndicateStatus+0xc1
    038efeec 70aba601 00000000 02e225b0 70aba5e8 WININET!CFsm::RunWorkItem+0xdd
    038eff00 77f96ae2 02e225b0 77fc59fc 02e22610 SHLWAPI!ExecuteWorkItem+0x19
    038eff48 77f9613d 70aba5e8 02e225b0 00000000 ntdll!RtlpWorkerCallout+0x70
    038eff64 77f96a6e 00000000 02e225b0 02e22610 ntdll!RtlpExecuteWorkerRequest+0x17
    038eff74 77f95b8b 77f96126 00000000 02e225b0 ntdll!RtlpApcCallout+0x10
    038effb4 77e7d33b 00000000 00000024 77f57f98 ntdll!RtlpWorkerThread+0x85
    038effec 00000000 77f95b06 00000000 00000000 KERNEL32!BaseThreadStart+0x37


    FOLLOWUP_IP:
    URLMON!COInetProt::Terminate+8
    1a406b8d 8b08 mov ecx,[eax]

    SYMBOL_STACK_INDEX: 0

    FOLLOWUP_NAME: MachineOwner

    SYMBOL_NAME: URLMON!COInetProt::Terminate+8

    MODULE_NAME: URLMON

    IMAGE_NAME: URLMON.DLL

    DEBUG_FLR_IMAGE_TIMESTAMP: 400f1754

    STACK_COMMAND: .ecxr ; kb

    BUCKET_ID: ACCESS_VIOLATION_URLMON!COInetProt::Terminate+8

    Followup: MachineOwner
    ---------

    eax=00000000 ebx=00000000 ecx=1a4042bc edx=05957130 esi=05957188 edi=00000001
    eip=1a406b8d esp=038eea00 ebp=038eea20 iopl=0 nv up ei pl nz na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000206
    URLMON!COInetProt::Terminate+0x8:
    1a406b8d 8b08 mov ecx,[eax] ds:0023:00000000=????????
    ChildEBP RetAddr Args to Child
    038eea00 1a406b22 05957188 00000000 637edc24 URLMON!COInetProt::Terminate+0x8 (FPO: [2,0,2])
    038eea20 635e71b9 00000001 00000000 05a3ff14 URLMON!CTransaction::Terminate+0x10c (FPO: [Non-Fpo])
    038eea50 635e651b 0595718c 05a3fe28 00000000 MSHTML!CDwnBindData::TerminateBind+0x1c0 (FPO: [Non-Fpo])
    038eea70 635f6235 80040155 059570a4 1a40699e MSHTML!CDwnBindData::Terminate+0xc4 (FPO: [EBP 0x038eea74] [1,1,4])
    038eea7c 1a40699e 05a3fe64 80040155 00000000 MSHTML!CDwnBindData::ReportResult+0x5e (FPO: [4,0,1])
    038eea90 1a4052cd 0595718c 80040155 00000000 URLMON!COInetProt::ReportResult+0x19 (FPO: [4,0,0])
    038eeab8 1a421f40 0595718c f4000000 00000000 URLMON!CTransaction::DispatchReport+0x18d (FPO: [Non-Fpo])
    038eeaf0 1a409b9d 05956fe0 800c0014 00000000 URLMON!CTransaction::ReportResult+0xab (FPO: [Non-Fpo])
    038eeb04 1a409a8f 001c1580 800c0014 00000000 URLMON!CINetEmbdFilter::ReportResult+0x19 (FPO: [4,0,0])
    038eeb30 1a4239bf 800c0014 00000000 00000000 URLMON!CINet::ReportResultAndStop+0x117 (FPO: [Non-Fpo])
    038eebac 1a423f6b 038eebc8 038efc10 0000012e URLMON!CINetHttp::RedirectRequest+0x2e7 (FPO: [Non-Fpo])
    038efc14 1a40d18d 00000000 059eba00 00000000 URLMON!CINetHttp::QueryStatusOnResponse+0x183 (FPO: [Non-Fpo])
    038efc2c 1a40d12d 00000000 059eba00 1a40da20 URLMON!CINet::QueryInfoOnResponse+0x42 (FPO: [Non-Fpo])
    038efc38 1a40da20 038efcbc 059eba00 1a40d99d URLMON!CINet::INetQueryInfo+0x12 (FPO: [0,0,2])
    038efc44 1a40d99d 00000005 80004005 059eba00 URLMON!CINet::OnINetInternal+0xb2 (FPO: [1,0,2])
    038efc54 1a40d97c 059eba00 038efcbc 1a40d963 URLMON!CINet::MyContinue+0x1e (FPO: [2,0,2])
    038efc60 1a40d963 02e31ac0 038efcbc 038efcbc URLMON!CINetProtImpl::Continue+0x10 (FPO: [2,0,0])
    038efc74 1a40e706 059eba00 038efcbc 1a42196a URLMON!CINet::Continue+0x29 (FPO: [2,0,2])
    038efc80 1a42196a 05957188 038efcbc 059eba00 URLMON!COInetProt::Continue+0x11 (FPO: [2,0,0])
    038efca0 1a40d854 05956fe0 038efcbc 059eba00 URLMON!CTransaction::Switch+0x65 (FPO: [Non-Fpo])
    start end module name
    00400000 00419000 IEXPLORE IEXPLORE.EXE Thu Aug 29 04:22:25 2002 (3D6DD9C1)
    00d80000 00da3000 PopupMgr_1_0_2_1P PopupMgr_1.0.2.1P.dll Thu Apr 15 23:45:02 2004 (407F56BE)
    00e40000 00e69000 mnyside mnyside.dll Tue Jul 16 07:54:40 2002 (3D340980)
    00e90000 01091000 MSI MSI.DLL Thu Aug 29 06:40:29 2002 (3D6DFA1D)
    010a0000 010b1000 misstub misstub.dll Tue Jul 16 07:54:21 2002 (3D34096D)
    01310000 013cb000 SDHelper SDHelper.dll Fri Jun 19 18:22:17 1992 (2A425E19)
    014f0000 01502000 DmPh DmPh.dll Sun Jan 06 03:33:52 2002 (3C380BF0)
    02a30000 02bd7000 Flash Flash.ocx Wed Jul 14 14:33:15 2004 (40F57C6B)
    035b0000 035e2000 ODBC32 ODBC32.dll Mon Oct 27 23:09:41 2003 (3F9DEC05)
    07240000 07247000 msdmo msdmo.dll Wed Dec 04 04:33:08 2002 (3DEDCBD4)
    07260000 07299000 wmasf wmasf.dll Wed Dec 11 20:23:47 2002 (3DF7E523)
    072b0000 073a6000 wmnetmgr wmnetmgr.dll Wed Dec 11 20:23:55 2002 (3DF7E52B)
    07db0000 07dd3000 devenum devenum.dll Sun Jun 01 20:38:45 2003 (3EDA9C95)
    07fd0000 0803a000 wmadmod wmadmod.dll Wed Dec 11 20:34:38 2002 (3DF7E7AE)
    08530000 0872d000 wmvcore wmvcore.dll Wed Dec 11 20:34:43 2002 (3DF7E7B3)
    08740000 08814000 wmvdmod wmvdmod.dll Wed Dec 11 20:34:44 2002 (3DF7E7B4)
    0ffd0000 0fff3000 RSAENH RSAENH.DLL Mon Apr 29 18:35:28 2002 (3CCDCAB0)
    10000000 1000b000 AcroIEHelper AcroIEHelper.dll Thu May 15 03:47:39 2003 (3EC3461B)
    1a400000 1a47a000 URLMON URLMON.DLL Wed Jan 21 19:20:36 2004 (400F1754)
    1f850000 1f866000 ODBCINT ODBCINT.DLL Fri Jul 13 12:30:45 2001 (3B4F2235)
    20b00000 20b37000 imon imon.dll Fri Dec 12 04:20:56 2003 (3FD98878)
    32520000 32532000 MSOHEV MSOHEV.DLL Mon Feb 12 20:42:31 2001 (3A889107)
    35500000 35708000 quartz quartz.dll Sun Jun 01 20:38:29 2003 (3EDA9C85)
    51000000 5104d000 ddraw ddraw.dll Wed Dec 04 04:21:42 2002 (3DEDC926)
    51080000 510da000 dsound dsound.dll Wed Dec 04 04:22:48 2002 (3DEDC968)
    52100000 5223e000 wmpcore wmpcore.dll Thu Sep 18 10:53:33 2003 (3F69C6ED)
    55650000 5567f000 WMP WMP.OCX Thu Aug 29 06:39:10 2002 (3D6DF9CE)
    556e0000 5571f000 WMPCD WMPCD.DLL Thu Aug 29 06:39:11 2002 (3D6DF9CF)
    59160000 592b9000 WMPUI WMPUI.DLL Thu Aug 29 06:39:30 2002 (3D6DF9E2)
    592e0000 594c8000 WMPLOC WMPLOC.DLL Thu Aug 29 06:39:32 2002 (3D6DF9E4)
    5ad70000 5ada4000 UXTHEME UXTHEME.DLL Thu Aug 29 06:39:22 2002 (3D6DF9DA)
    5c000000 5c0c8000 d3dim700 d3dim700.dll Fri May 30 17:39:16 2003 (3ED7CF84)
    5edd0000 5edea000 OLEPRO32 OLEPRO32.DLL Sat Aug 18 01:35:45 2001 (3B7DFEB1)
    5ef80000 5ef84000 ksuser ksuser.dll Wed Dec 04 04:33:42 2002 (3DEDCBF6)
    63000000 63096000 WININET WININET.DLL Fri Feb 06 21:05:03 2004 (402447CF)
    63580000 63832000 MSHTML MSHTML.DLL Wed Jul 07 21:37:07 2004 (40ECA543)
    65000000 65009000 ddrawex ddrawex.dll Wed Dec 04 04:22:41 2002 (3DEDC961)
    66880000 6688a000 IMGUTIL IMGUTIL.DLL Thu Aug 29 06:39:59 2002 (3D6DF9FF)
    66e50000 66e8b000 IEPEERS IEPEERS.DLL Thu Aug 29 06:40:05 2002 (3D6DFA05)
    68880000 688bf000 HNETCFG HNETCFG.DLL Thu Aug 29 06:39:52 2002 (3D6DF9F8)
    69710000 6980d000 ESENT ESENT.DLL Sat Aug 18 01:35:04 2001 (3B7DFE88)
    6bdd0000 6be03000 DXTRANS DXTRANS.DLL Thu Aug 29 06:39:55 2002 (3D6DF9FB)
    6be10000 6be65000 DXTMSFT DXTMSFT.DLL Thu Aug 29 06:39:55 2002 (3D6DF9FB)
    70a70000 70ad4000 SHLWAPI SHLWAPI.DLL Wed Jul 07 21:48:37 2004 (40ECA7F5)
    70b50000 70b98000 WZCSVC WZCSVC.DLL Mon Mar 10 15:25:46 2003 (3E6CF4CA)
    71500000 715fd000 BROWSEUI BROWSEUI.DLL Wed Jan 21 19:21:03 2004 (400F176F)
    71700000 71849000 SHDOCVW SHDOCVW.DLL Wed Jan 21 19:15:45 2004 (400F1631)
    71950000 71a34000 comctl32 comctl32.dll Fri Apr 16 20:56:03 2004 (408080A3)
    71a50000 71a8b000 MSWSOCK MSWSOCK.DLL Sat Aug 18 01:33:37 2001 (3B7DFE31)
    71a90000 71a98000 WSHTCPIP WSHTCPIP.DLL Sat Aug 18 01:33:39 2001 (3B7DFE33)
    71aa0000 71aa8000 WS2HELP WS2HELP.DLL Sat Aug 18 01:33:38 2001 (3B7DFE32)
    71ab0000 71ac5000 WS2_32 WS2_32.DLL Sat Aug 18 01:33:37 2001 (3B7DFE31)
    71ad0000 71ad8000 WSOCK32 WSOCK32.DLL Sat Aug 18 01:33:37 2001 (3B7DFE31)
    71b20000 71b31000 MPR MPR.DLL Sat Aug 18 01:33:37 2001 (3B7DFE31)
    71bf0000 71c01000 SAMLIB SAMLIB.DLL Thu Aug 29 06:40:06 2002 (3D6DFA06)
    71c10000 71c1d000 NTLANMAN NTLANMAN.DLL Thu Aug 29 06:40:06 2002 (3D6DFA06)
    71c20000 71c6e000 netapi32 netapi32.dll Tue Jun 08 18:02:21 2004 (40C6376D)
    71c80000 71c86000 NETRAP NETRAP.DLL Sat Aug 18 01:33:38 2001 (3B7DFE32)
    71c90000 71ccc000 NETUI1 NETUI1.DLL Sat Aug 18 01:33:37 2001 (3B7DFE31)
    71cd0000 71ce6000 NETUI0 NETUI0.DLL Sat Aug 18 01:33:37 2001 (3B7DFE31)
    722b0000 722b5000 SENSAPI SENSAPI.DLL Thu Aug 29 06:40:07 2002 (3D6DFA07)
    72430000 72442000 BROWSELC BROWSELC.DLL Thu Aug 29 06:40:08 2002 (3D6DFA08)
    72b20000 72b38000 PLUGIN PLUGIN.OCX Sat Aug 18 01:33:30 2001 (3B7DFE2A)
    72d10000 72d18000 MSACM32 MSACM32.DRV Sat Aug 18 01:33:30 2001 (3B7DFE2A)
    72d20000 72d29000 WDMAUD WDMAUD.DRV Sat Aug 18 01:33:30 2001 (3B7DFE2A)
    72e00000 72f15000 MSXML3 MSXML3.DLL Thu Aug 29 06:40:11 2002 (3D6DFA0B)
    73000000 73023000 WINSPOOL WINSPOOL.DRV Thu Aug 29 06:40:11 2002 (3D6DFA0B)
    73080000 7309c000 RSVPSP RSVPSP.DLL Sat Aug 18 01:33:29 2001 (3B7DFE29)
    73570000 735d2000 vbscript vbscript.dll Tue Jan 14 15:11:34 2003 (3E246EF6)
    73bc0000 73bc6000 DCIMAN32 DCIMAN32.DLL Sat Aug 18 01:33:25 2001 (3B7DFE25)
    73dd0000 73ec2000 MFC42 MFC42.DLL Sat Aug 18 01:33:24 2001 (3B7DFE24)
    74380000 7438f000 WDIGEST WDIGEST.DLL Sat Aug 18 01:33:22 2001 (3B7DFE22)
    746c0000 746e7000 MSLS31 MSLS31.DLL Sat Aug 18 01:33:22 2001 (3B7DFE22)
    746f0000 74716000 MSIMTF MSIMTF.DLL Thu Aug 29 06:40:16 2002 (3D6DFA10)
    74720000 74764000 MSCTF MSCTF.DLL Thu Aug 29 06:40:16 2002 (3D6DFA10)
    74770000 747ff000 MLANG MLANG.DLL Sat Aug 18 01:33:19 2001 (3B7DFE1F)
    74cb0000 74d1f000 MSHTMLED MSHTMLED.DLL Thu Aug 29 06:40:18 2002 (3D6DFA12)
    74ed0000 74edf000 WBEMSVC WBEMSVC.DLL Sat Aug 18 01:33:17 2001 (3B7DFE1D)
    74ef0000 74efa000 WBEMPROX WBEMPROX.DLL Thu Aug 29 06:40:20 2002 (3D6DFA14)
    75290000 752c8000 WBEMCOMN WBEMCOMN.DLL Thu Aug 29 06:40:21 2002 (3D6DFA15)
    75690000 7571d000 FASTPROX FASTPROX.DLL Thu Aug 29 06:40:23 2002 (3D6DFA17)
    75970000 75a62000 msgina msgina.dll Mon Mar 29 20:48:36 2004 (4068D1F4)
    75a70000 75b15000 USERENV USERENV.DLL Thu Aug 29 06:40:26 2002 (3D6DFA1A)
    75c30000 75c9a000 jscript jscript.dll Tue Jan 14 15:11:15 2003 (3E246EE3)
    75cf0000 75e83000 NETSHELL NETSHELL.DLL Mon Mar 10 15:25:44 2003 (3E6CF4C8)
    75e90000 75f38000 sxs sxs.dll Fri Apr 16 20:56:04 2004 (408080A4)
    75f40000 75f5f000 APPHELP APPHELP.DLL Thu Aug 29 06:40:27 2002 (3D6DFA1B)
    75f60000 75f66000 DRPROV DRPROV.DLL Sat Aug 18 01:33:11 2001 (3B7DFE17)
    75f70000 75f79000 DAVCLNT DAVCLNT.DLL Sat Aug 18 01:33:11 2001 (3B7DFE17)
    76170000 761f8000 SHDOCLC SHDOCLC.DLL Sat Aug 18 01:33:10 2001 (3B7DFE16)
    762a0000 762b0000 msasn1 msasn1.dll Mon Mar 29 20:48:36 2004 (4068D1F4)
    762c0000 76348000 CRYPT32 CRYPT32.DLL Thu Mar 20 19:18:09 2003 (3E7A5A41)
    76360000 7636f000 WINSTA WINSTA.DLL Thu Aug 29 06:40:29 2002 (3D6DFA1D)
    76390000 763ac000 IMM32 IMM32.DLL Thu Aug 29 06:40:29 2002 (3D6DFA1D)
    763b0000 763f5000 COMDLG32 COMDLG32.DLL Thu Aug 29 06:40:29 2002 (3D6DFA1D)
    76600000 7661b000 CSCDLL CSCDLL.DLL Sat Aug 18 01:33:09 2001 (3B7DFE15)
    76620000 7666e000 CSCUI CSCUI.DLL Thu Aug 29 06:40:30 2002 (3D6DFA1E)
    76670000 76757000 SETUPAPI SETUPAPI.DLL Thu Aug 29 06:40:30 2002 (3D6DFA1E)
    76b20000 76b35000 ATL ATL.DLL Thu Aug 29 06:40:32 2002 (3D6DFA20)
    76b40000 76b6c000 WINMM WINMM.DLL Thu Aug 29 06:40:32 2002 (3D6DFA20)
    76c00000 76c2d000 CREDUI CREDUI.DLL Thu Aug 29 06:40:33 2002 (3D6DFA21)
    76ce0000 76cff000 NTMARTA NTMARTA.DLL Thu Aug 29 06:40:33 2002 (3D6DFA21)
    76d10000 76d2d000 MSV1_0 MSV1_0.DLL Thu Aug 29 06:40:33 2002 (3D6DFA21)
    76d30000 76d34000 WMI WMI.DLL Sat Aug 18 01:33:06 2001 (3B7DFE12)
    76d40000 76d56000 MPRAPI MPRAPI.DLL Sat Aug 18 01:33:06 2001 (3B7DFE12)
    76d60000 76d77000 IPHLPAPI IPHLPAPI.DLL Thu Aug 29 06:40:33 2002 (3D6DFA21)
    76d80000 76d9b000 DHCPCSVC DHCPCSVC.DLL Thu Aug 29 06:40:33 2002 (3D6DFA21)
    76de0000 76e08000 NETMAN NETMAN.DLL Thu Aug 29 06:40:34 2002 (3D6DFA22)
    76e10000 76e35000 ADSLDPC ADSLDPC.DLL Thu Aug 29 06:40:34 2002 (3D6DFA22)
    76e40000 76e6f000 ACTIVEDS ACTIVEDS.DLL Sat Aug 18 01:33:05 2001 (3B7DFE11)
    76e80000 76e8d000 RTUTILS RTUTILS.DLL Sat Aug 18 01:33:05 2001 (3B7DFE11)
    76e90000 76ea1000 RASMAN RASMAN.DLL Thu Aug 29 06:40:34 2002 (3D6DFA22)
    76eb0000 76edb000 TAPI32 TAPI32.DLL Thu Aug 29 06:40:34 2002 (3D6DFA22)
    76ee0000 76f17000 RASAPI32 RASAPI32.DLL Thu Aug 29 06:40:34 2002 (3D6DFA22)
    76f20000 76f45000 DNSAPI DNSAPI.DLL Thu Aug 29 06:40:34 2002 (3D6DFA22)
    76f50000 76f58000 WTSAPI32 WTSAPI32.DLL Thu Aug 29 06:40:34 2002 (3D6DFA22)
    76f60000 76f8c000 WLDAP32 WLDAP32.DLL Thu Aug 29 06:40:34 2002 (3D6DFA22)
    76f90000 76fa0000 SECUR32 SECUR32.DLL Thu Aug 29 06:40:34 2002 (3D6DFA22)
    76fb0000 76fb7000 WINRNR WINRNR.DLL Sat Aug 18 01:33:05 2001 (3B7DFE11)
    76fc0000 76fc5000 RASADHLP RASADHLP.DLL Sat Aug 18 01:33:05 2001 (3B7DFE11)
    77050000 77115000 COMRES COMRES.DLL Sat Aug 18 01:33:04 2001 (3B7DFE10)
    77120000 771ab000 OLEAUT32 OLEAUT32.DLL Thu Aug 29 06:40:34 2002 (3D6DFA22)
    771b0000 772d4000 ole32 ole32.dll Fri Mar 05 21:16:11 2004 (4049346B)
    77340000 773cb000 COMCTL32_77340000 COMCTL32.DLL Thu Aug 29 06:40:42 2002 (3D6DFA2A)
    773d0000 77bca000 shell32 shell32.dll Thu Jun 10 15:51:26 2004 (40C8BBBE)
    77bd0000 77bd7000 MIDIMAP MIDIMAP.DLL Sat Aug 18 01:33:03 2001 (3B7DFE0F)
    77be0000 77bf4000 MSACM32_77be0000 MSACM32.DLL Sat Aug 18 01:33:03 2001 (3B7DFE0F)
    77c00000 77c07000 VERSION VERSION.DLL Sat Aug 18 01:33:03 2001 (3B7DFE0F)
    77c10000 77c63000 MSVCRT MSVCRT.DLL Thu Aug 29 06:40:39 2002 (3D6DFA27)
    77d40000 77dcc000 user32 user32.dll Thu Sep 25 12:49:01 2003 (3F731C7D)
    77dd0000 77e5d000 ADVAPI32 ADVAPI32.DLL Thu Aug 29 06:40:40 2002 (3D6DFA28)
    77e60000 77f46000 KERNEL32 KERNEL32.DLL Thu Aug 29 06:40:40 2002 (3D6DFA28)
    77f50000 77ff7000 ntdll ntdll.dll Thu May 01 19:56:10 2003 (3EB1B41A)
    78000000 78087000 rpcrt4 rpcrt4.dll Fri Mar 05 21:16:11 2004 (4049346B)
    7c890000 7c911000 clbcatq clbcatq.dll Fri Mar 05 21:16:11 2004 (4049346B)
    7e090000 7e0d1000 gdi32 gdi32.dll Mon Mar 29 20:48:36 2004 (4068D1F4)
    Closing open log file c:\debuglog.txt
     
  17. 2004/09/01
    JoeHobart

    JoeHobart Inactive Alumni

    Joined:
    2004/05/19
    Messages:
    919
    Likes Received:
    1
    ok, good job on that. thats exactly what we needed. The bad news is that you have struck upon an IE problem. No hotfix availible. Unfortunatly, there isnt a lot you can do about it besides keep sending in those error reports to raise visibility of the issue to microsoft. Sorry you went through all that just to run into a dead end. Glad to hear you learned a few things along the way!

    undo that regkey and keep sending in those dumps.
     
  18. 2004/09/01
    Jayt36

    Jayt36 Inactive Thread Starter

    Joined:
    2003/03/23
    Messages:
    112
    Likes Received:
    0
    Joe, thanks for all your help and thanks for sticking with me through all of this. I will do as you suggest and keep sending reports to MS. Btw. you might be interested to know that although I now live in PA I was born and raised in NC. :)
     
  19. 2004/09/02
    Newt

    Newt Inactive

    Joined:
    2002/01/07
    Messages:
    10,974
    Likes Received:
    2
    Good grief - you left sunny NC and moved north because ....???

    :D
     
  20. 2004/09/02
    Jayt36

    Jayt36 Inactive Thread Starter

    Joined:
    2003/03/23
    Messages:
    112
    Likes Received:
    0
    :) :) :) ha ha ha ha :) is insanity an acceptable plea?
     
  21. 2004/10/14
    graybeard

    graybeard Inactive

    Joined:
    2004/10/14
    Messages:
    1
    Likes Received:
    0
    I had the same problem. Do you have DAP 7.0 premeum. If you do, uninstall it. Beleive it or not, my problem went away. I reinstalled and unistalled DAP a number of times to verify it!
     
Thread Status:
Not open for further replies.

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.