Solved

Legacy App: Parsons Technology Address Book 7.0 - Associating a DLL w/an EXE file

Posted on 2007-11-26
12
3,507 Views
Last Modified: 2013-12-03
Hi guys,

Ran into an interesting problem with a client today. She had a windows installation that was pretty corrupted, so we backed up the data files and reinstalled from scratch.

One of her very important apps is an ancient program called Parsons Technology Address Book 7.0, which isn't running correctly as we didn't have the original installation discs.

When we try to run the application from it's directory, we get an error:

This application has failed to start because ptsaab99.dll was not found. Re-installing the application may fix this problem.

Well, we have the DLL. I just need to know how we can associate the DLL with the EXE file. I'm guessing a simple registry entry or two would do it, but I've never attempted that before.

Thanks!

Notes: Parsons Technology Address Book was later bought out by Broderbund, and then the product was rolled into Print Shop (version 22 I think). But the files aren't quite compatible. We've been unable to locate a copy of the program itself for purchase anywhere (Ebay, etc). It did seem to save the file into a .htm file, which I was able to open with Excel and export to CSV, but we had some problems importing the data back into the Windows Address Book due to the fields not mapping properly. I was hoping to work around this by just getting the original application running.
0
Comment
Question by:Dozer42
  • 6
  • 6
12 Comments
 
LVL 86

Expert Comment

by:jkr
ID: 20353079
>>I just need to know how we can associate the DLL with the EXE file.

Just place it in the directory where the executable resides, no additional action necessary. See also http://msdn2.microsoft.com/en-us/library/ms682586.aspx ("Dynamic-Link Library Search Order")
0
 
LVL 4

Author Comment

by:Dozer42
ID: 20354456
Hmmm, the DLL file already resides in the same exact directory as the EXE file.
0
 
LVL 86

Expert Comment

by:jkr
ID: 20354939
Try placing an "<appname>.exe.local" (just an empty text file) in the same dir to override the search order.
0
 
LVL 4

Author Comment

by:Dozer42
ID: 20355867
Ok, I made a mistake on my original assessment. The file it's erroring out on is actually a different filename than the one in the directory with the EXE file.

I went back to the customer's old hard drive, found the correct file in \windows\system32, made a backup of the DLL, dropped it onto the new \windows\system32 directory, tried the EXE again, and now I'm getting:

Microsoft Visual C++ Runtime Library
Runtime Error!
Program C:\Program Files\Parsons Technology\Address Book\7.0\Adbook.exe
abnormal program termination

Any ideas on how to get past this?

Thanks. =)
0
 
LVL 86

Accepted Solution

by:
jkr earned 250 total points
ID: 20361578
Hm, get the Dependency Walker (www.dependencywalker.com), use it to open the .exe and the select "Profile" - the log should shed in some light on that error.
0
 
LVL 4

Author Comment

by:Dozer42
ID: 20362924
Jesus, I'm only 38 years old and I need Depends?!?!
0
Threat Intelligence Starter Resources

Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.

 
LVL 4

Author Comment

by:Dozer42
ID: 20362938
Hmmm, not much luck with Depends. It found one missing file, msjava.dll, I downloaded that and added it to \windows\system ... same error...
0
 
LVL 86

Expert Comment

by:jkr
ID: 20362954
Well, I am of the same age and use it a lot ;o)

You will have to try "Profile" to catch the runtime errors (hint!)
0
 
LVL 4

Author Comment

by:Dozer42
ID: 20363327
Aye, I'm obviously not familiar with how to use Depends. ;)

Ok, turned on the profiler and got this:

LoadLibraryW("8") returned NULL. Error: The specified module could not be found (126).

About 20 variations on this:

GetProcAddress(0x00000000, "ImmSetHotKey") called from "MSCTF.DLL" at address 0x74723168 and returned NULL. Error: The specified procedure could not be found (127).

And finally:

Second chance exception 0xE06D7363 (Microsoft C++ Exception) occurred in "KERNEL32.DLL" at address 0x7C812A5B.

I'm guessing the 20 errors under MSCTF.DLL would be the culprit, but don't know how to go about resolving them. Maybe look for another copy of MSCTF.DLL? I do still have (limited) access to the original drive this program was running on (it's not Drive D in her computer, it had problems years ago and was replaced by someone else, then I reinstalled Windows back to HP factory condition on the 'new' drive C)
0
 
LVL 86

Expert Comment

by:jkr
ID: 20363337
Ah, the error 0xE06D7363 points to a COM DLL not being found (or registered) - anything more in that log?
0
 
LVL 4

Author Comment

by:Dozer42
ID: 20363471
Here's the entire log. I could simply .rar up the directory in it's entirety and drop it on one of my sites for perusal. ;)

DllMain(0x08370000, DLL_PROCESS_ATTACH, 0x00000000) in "DEPENDS.DLL" returned 1 (0x1).
Loaded "WINMM.DLL" at address 0x76B40000.  Successfully hooked module.
Loaded "USER32.DLL" at address 0x7E410000.  Successfully hooked module.
Loaded "GDI32.DLL" at address 0x77F10000.  Successfully hooked module.
Loaded "ADVAPI32.DLL" at address 0x77DD0000.  Successfully hooked module.
Loaded "RPCRT4.DLL" at address 0x77E70000.  Successfully hooked module.
Loaded "SECUR32.DLL" at address 0x77FE0000.  Successfully hooked module.
Loaded "PTSACX40.DLL" at address 0x10000000.  Successfully hooked module.
Loaded "PTSAAB99.DLL" at address 0x00260000.  Successfully hooked module.
Loaded "WINSPOOL.DRV" at address 0x73000000.  Successfully hooked module.
Loaded "MSVCRT.DLL" at address 0x77C10000.  Successfully hooked module.
Loaded "COMCTL32.DLL" at address 0x5D090000.  Successfully hooked module.
Loaded "OLE32.DLL" at address 0x774E0000.  Successfully hooked module.
Loaded "OLEAUT32.DLL" at address 0x77120000.  Successfully hooked module.
Loaded "COMDLG32.DLL" at address 0x763B0000.  Successfully hooked module.
Loaded "SHLWAPI.DLL" at address 0x77F60000.  Successfully hooked module.
Loaded "SHELL32.DLL" at address 0x7C9C0000.  Successfully hooked module.
Loaded "OLEDLG.DLL" at address 0x7DF70000.  Successfully hooked module.
Loaded "OLEPRO32.DLL" at address 0x5EDD0000.  Successfully hooked module.
Loaded "WSOCK32.DLL" at address 0x71AD0000.  Successfully hooked module.
Loaded "WS2_32.DLL" at address 0x71AB0000.  Successfully hooked module.
Loaded "WS2HELP.DLL" at address 0x71AA0000.  Successfully hooked module.
Entrypoint reached. All implicit modules have been loaded.
DllMain(0x77F10000, DLL_PROCESS_ATTACH, 0x0006FD30) in "GDI32.DLL" called.
DllMain(0x77F10000, DLL_PROCESS_ATTACH, 0x0006FD30) in "GDI32.DLL" returned 1 (0x1).
DllMain(0x7E410000, DLL_PROCESS_ATTACH, 0x0006FD30) in "USER32.DLL" called.
LoadLibraryW("8") called from "USER32.DLL" at address 0x7E44541A.
LoadLibraryW("8") returned NULL. Error: The specified module could not be found (126).
DllMain(0x7E410000, DLL_PROCESS_ATTACH, 0x0006FD30) in "USER32.DLL" returned 1 (0x1).
DllMain(0x77FE0000, DLL_PROCESS_ATTACH, 0x0006FD30) in "SECUR32.DLL" called.
DllMain(0x77FE0000, DLL_PROCESS_ATTACH, 0x0006FD30) in "SECUR32.DLL" returned 1 (0x1).
DllMain(0x77E70000, DLL_PROCESS_ATTACH, 0x0006FD30) in "RPCRT4.DLL" called.
DllMain(0x77E70000, DLL_PROCESS_ATTACH, 0x0006FD30) in "RPCRT4.DLL" returned 1 (0x1).
DllMain(0x77DD0000, DLL_PROCESS_ATTACH, 0x0006FD30) in "ADVAPI32.DLL" called.
DllMain(0x77DD0000, DLL_PROCESS_ATTACH, 0x0006FD30) in "ADVAPI32.DLL" returned 1 (0x1).
DllMain(0x76B40000, DLL_PROCESS_ATTACH, 0x0006FD30) in "WINMM.DLL" called.
DllMain(0x76B40000, DLL_PROCESS_ATTACH, 0x0006FD30) in "WINMM.DLL" returned 1 (0x1).
DllMain(0x10000000, DLL_PROCESS_ATTACH, 0x0006FD30) in "PTSACX40.DLL" called.
GetProcAddress(0x7C800000 [KERNEL32.DLL], "IsProcessorFeaturePresent") called from "PTSACX40.DLL" at address 0x1001C924 and returned 0x7C80AE2A.
DllMain(0x10000000, DLL_PROCESS_ATTACH, 0x0006FD30) in "PTSACX40.DLL" returned 1 (0x1).
DllMain(0x77C10000, DLL_PROCESS_ATTACH, 0x0006FD30) in "MSVCRT.DLL" called.
GetProcAddress(0x7C800000 [KERNEL32.DLL], "InitializeCriticalSectionAndSpinCount") called from "MSVCRT.DLL" at address 0x77C379C2 and returned 0x7C80B829.
DllMain(0x77C10000, DLL_PROCESS_ATTACH, 0x0006FD30) in "MSVCRT.DLL" returned 1 (0x1).
DllMain(0x73000000, DLL_PROCESS_ATTACH, 0x0006FD30) in "WINSPOOL.DRV" called.
DllMain(0x73000000, DLL_PROCESS_ATTACH, 0x0006FD30) in "WINSPOOL.DRV" returned 1 (0x1).
DllMain(0x5D090000, DLL_PROCESS_ATTACH, 0x0006FD30) in "COMCTL32.DLL" called.
GetProcAddress(0x7C800000 [KERNEL32.DLL], "InitializeCriticalSectionAndSpinCount") called from "COMCTL32.DLL" at address 0x5D095338 and returned 0x7C80B829.
GetProcAddress(0x7C800000 [KERNEL32.DLL], "CreateActCtxW") called from "COMCTL32.DLL" at address 0x5D0FF198 and returned 0x7C81545C.
GetProcAddress(0x7C800000 [KERNEL32.DLL], "ProcessIdToSessionId") called from "COMCTL32.DLL" at address 0x5D0954D8 and returned 0x7C812F89.
GetProcAddress(0x7E410000 [USER32.DLL], "GetSystemMetrics") called from "COMCTL32.DLL" at address 0x5D0955CE and returned 0x7E418F9C.
GetProcAddress(0x7E410000 [USER32.DLL], "MonitorFromWindow") called from "COMCTL32.DLL" at address 0x5D0955E3 and returned 0x7E41CE61.
GetProcAddress(0x7E410000 [USER32.DLL], "MonitorFromRect") called from "COMCTL32.DLL" at address 0x5D0955F8 and returned 0x7E41E9F3.
GetProcAddress(0x7E410000 [USER32.DLL], "MonitorFromPoint") called from "COMCTL32.DLL" at address 0x5D09560D and returned 0x7E41F4ED.
GetProcAddress(0x7E410000 [USER32.DLL], "EnumDisplayMonitors") called from "COMCTL32.DLL" at address 0x5D095622 and returned 0x7E41CF63.
GetProcAddress(0x7E410000 [USER32.DLL], "EnumDisplayDevicesW") called from "COMCTL32.DLL" at address 0x5D095637 and returned 0x7E427128.
GetProcAddress(0x7E410000 [USER32.DLL], "GetMonitorInfoW") called from "COMCTL32.DLL" at address 0x5D095654 and returned 0x7E41CEC1.
GetProcAddress(0x7C800000 [KERNEL32.DLL], "ActivateActCtx") called from "COMCTL32.DLL" at address 0x5D0FF24A and returned 0x7C80A644.
GetProcAddress(0x7C800000 [KERNEL32.DLL], "DeactivateActCtx") called from "COMCTL32.DLL" at address 0x5D0FF2AF and returned 0x7C80A675.
DllMain(0x5D090000, DLL_PROCESS_ATTACH, 0x0006FD30) in "COMCTL32.DLL" returned 1 (0x1).
DllMain(0x774E0000, DLL_PROCESS_ATTACH, 0x0006FD30) in "OLE32.DLL" called.
DllMain(0x774E0000, DLL_PROCESS_ATTACH, 0x0006FD30) in "OLE32.DLL" returned 1 (0x1).
DllMain(0x77120000, DLL_PROCESS_ATTACH, 0x0006FD30) in "OLEAUT32.DLL" called.
DllMain(0x77120000, DLL_PROCESS_ATTACH, 0x0006FD30) in "OLEAUT32.DLL" returned 1 (0x1).
DllMain(0x00260000, DLL_PROCESS_ATTACH, 0x0006FD30) in "PTSAAB99.DLL" called.
GetProcAddress(0x7C800000 [KERNEL32.DLL], "IsProcessorFeaturePresent") called from "PTSAAB99.DLL" at address 0x002760EA and returned 0x7C80AE2A.
DllMain(0x00260000, DLL_PROCESS_ATTACH, 0x0006FD30) in "PTSAAB99.DLL" returned 1 (0x1).
DllMain(0x77F60000, DLL_PROCESS_ATTACH, 0x0006FD30) in "SHLWAPI.DLL" called.
GetProcAddress(0x7C800000 [KERNEL32.DLL], "CreateTimerQueue") called from "SHLWAPI.DLL" at address 0x77F65CA1 and returned 0x7C82BFD6.
GetProcAddress(0x7C800000 [KERNEL32.DLL], "DeleteTimerQueue") called from "SHLWAPI.DLL" at address 0x77F65CB0 and returned 0x7C862D8B.
GetProcAddress(0x7C800000 [KERNEL32.DLL], "CreateTimerQueueTimer") called from "SHLWAPI.DLL" at address 0x77F65CBF and returned 0x7C82117D.
GetProcAddress(0x7C800000 [KERNEL32.DLL], "ChangeTimerQueueTimer") called from "SHLWAPI.DLL" at address 0x77F65CCF and returned 0x7C812723.
GetProcAddress(0x7C800000 [KERNEL32.DLL], "DeleteTimerQueueTimer") called from "SHLWAPI.DLL" at address 0x77F65CDD and returned 0x7C821130.
DllMain(0x77F60000, DLL_PROCESS_ATTACH, 0x0006FD30) in "SHLWAPI.DLL" returned 1 (0x1).
DllMain(0x7C9C0000, DLL_PROCESS_ATTACH, 0x0006FD30) in "SHELL32.DLL" called.
GetProcAddress(0x7C800000 [KERNEL32.DLL], "CreateActCtxW") called from "SHELL32.DLL" at address 0x7CA27816 and returned 0x7C81545C.
GetProcAddress(0x7C800000 [KERNEL32.DLL], "ActivateActCtx") called from "SHELL32.DLL" at address 0x7C9E7639 and returned 0x7C80A644.
LoadLibraryW("comctl32.dll") called from "SHELL32.DLL" at address 0x7CA2744C.
Loaded "COMCTL32.DLL" at address 0x773D0000.  Successfully hooked module.
DllMain(0x773D0000, DLL_PROCESS_ATTACH, 0x00000000) in "COMCTL32.DLL" called.
GetProcAddress(0x7C800000 [KERNEL32.DLL], "GetSystemWindowsDirectoryW") called from "COMCTL32.DLL" at address 0x7745B739 and returned 0x7C80AD29.
GetProcAddress(0x7C800000 [KERNEL32.DLL], "CreateActCtxW") called from "COMCTL32.DLL" at address 0x7745B5BC and returned 0x7C81545C.
GetProcAddress(0x7C800000 [KERNEL32.DLL], "ActivateActCtx") called from "COMCTL32.DLL" at address 0x7745B64E and returned 0x7C80A644.
GetProcAddress(0x7C800000 [KERNEL32.DLL], "DeactivateActCtx") called from "COMCTL32.DLL" at address 0x7745B6A4 and returned 0x7C80A675.
DllMain(0x773D0000, DLL_PROCESS_ATTACH, 0x00000000) in "COMCTL32.DLL" returned 1 (0x1).
LoadLibraryW("comctl32.dll") returned 0x773D0000.
GetProcAddress(0x7C800000 [KERNEL32.DLL], "DeactivateActCtx") called from "SHELL32.DLL" at address 0x7C9E76A4 and returned 0x7C80A675.
LoadLibraryW("comctl32.dll") called from "SHELL32.DLL" at address 0x7CA2757E.
LoadLibraryW("comctl32.dll") returned 0x5D090000.
GetProcAddress(0x5D090000 [COMCTL32.DLL], "InitCommonControlsEx") called from "SHELL32.DLL" at address 0x7CA2758E and returned 0x5D093619.
DllMain(0x7C9C0000, DLL_PROCESS_ATTACH, 0x0006FD30) in "SHELL32.DLL" returned 1 (0x1).
DllMain(0x763B0000, DLL_PROCESS_ATTACH, 0x0006FD30) in "COMDLG32.DLL" called.
DllMain(0x763B0000, DLL_PROCESS_ATTACH, 0x0006FD30) in "COMDLG32.DLL" returned 1 (0x1).
DllMain(0x7DF70000, DLL_PROCESS_ATTACH, 0x0006FD30) in "OLEDLG.DLL" called.
DllMain(0x7DF70000, DLL_PROCESS_ATTACH, 0x0006FD30) in "OLEDLG.DLL" returned 1 (0x1).
DllMain(0x5EDD0000, DLL_PROCESS_ATTACH, 0x0006FD30) in "OLEPRO32.DLL" called.
GetProcAddress(0x77120000 [OLEAUT32.DLL], "OleIconToCursor") called from "OLEPRO32.DLL" at address 0x5EDD1F8D and returned 0x771852F8.
GetProcAddress(0x77120000 [OLEAUT32.DLL], "OleCreateFontIndirect") called from "OLEPRO32.DLL" at address 0x5EDD1F8D and returned 0x77144BC4.
GetProcAddress(0x77120000 [OLEAUT32.DLL], "OleCreatePictureIndirect") called from "OLEPRO32.DLL" at address 0x5EDD1F8D and returned 0x771446BA.
GetProcAddress(0x77120000 [OLEAUT32.DLL], "OleLoadPicture") called from "OLEPRO32.DLL" at address 0x5EDD1F8D and returned 0x77185F81.
GetProcAddress(0x77120000 [OLEAUT32.DLL], "OleTranslateColor") called from "OLEPRO32.DLL" at address 0x5EDD1F8D and returned 0x77143648.
GetProcAddress(0x77120000 [OLEAUT32.DLL], "OleCreatePropertyFrame") called from "OLEPRO32.DLL" at address 0x5EDD1F8D and returned 0x77187976.
GetProcAddress(0x77120000 [OLEAUT32.DLL], "OleCreatePropertyFrameIndirect") called from "OLEPRO32.DLL" at address 0x5EDD1F8D and returned 0x77187928.
DllMain(0x5EDD0000, DLL_PROCESS_ATTACH, 0x0006FD30) in "OLEPRO32.DLL" returned 1 (0x1).
DllMain(0x71AA0000, DLL_PROCESS_ATTACH, 0x0006FD30) in "WS2HELP.DLL" called.
DllMain(0x71AA0000, DLL_PROCESS_ATTACH, 0x0006FD30) in "WS2HELP.DLL" returned 1 (0x1).
DllMain(0x71AB0000, DLL_PROCESS_ATTACH, 0x0006FD30) in "WS2_32.DLL" called.
DllMain(0x71AB0000, DLL_PROCESS_ATTACH, 0x0006FD30) in "WS2_32.DLL" returned 1 (0x1).
DllMain(0x71AD0000, DLL_PROCESS_ATTACH, 0x0006FD30) in "WSOCK32.DLL" called.
DllMain(0x71AD0000, DLL_PROCESS_ATTACH, 0x0006FD30) in "WSOCK32.DLL" returned 1 (0x1).
GetProcAddress(0x7C800000 [KERNEL32.DLL], "IsProcessorFeaturePresent") called from "ADBOOK.EXE" at address 0x00580B13 and returned 0x7C80AE2A.
LoadLibraryA("TAPI32.DLL") called from "ADBOOK.EXE" at address 0x0044F3F5.
Loaded "TAPI32.DLL" at address 0x76EB0000.  Successfully hooked module.
Loaded "RTUTILS.DLL" at address 0x76E80000.  Successfully hooked module.
DllMain(0x76E80000, DLL_PROCESS_ATTACH, 0x00000000) in "RTUTILS.DLL" called.
DllMain(0x76E80000, DLL_PROCESS_ATTACH, 0x00000000) in "RTUTILS.DLL" returned 1 (0x1).
DllMain(0x76EB0000, DLL_PROCESS_ATTACH, 0x00000000) in "TAPI32.DLL" called.
GetProcAddress(0x7C800000 [KERNEL32.DLL], "CreateActCtxW") called from "TAPI32.DLL" at address 0x76EB1558 and returned 0x7C81545C.
GetProcAddress(0x7C800000 [KERNEL32.DLL], "ActivateActCtx") called from "TAPI32.DLL" at address 0x76EB1B3C and returned 0x7C80A644.
LoadLibraryW("comctl32.dll") called from "TAPI32.DLL" at address 0x76EB186D.
LoadLibraryW("comctl32.dll") returned 0x773D0000.
GetProcAddress(0x7C800000 [KERNEL32.DLL], "DeactivateActCtx") called from "TAPI32.DLL" at address 0x76EB18EB and returned 0x7C80A675.
DllMain(0x76EB0000, DLL_PROCESS_ATTACH, 0x00000000) in "TAPI32.DLL" returned 1 (0x1).
LoadLibraryA("TAPI32.DLL") returned 0x76EB0000.
GetProcAddress(0x76EB0000 [TAPI32.DLL], "lineMakeCall") called from "ADBOOK.EXE" at address 0x0044F419 and returned 0x76EBA23C.
GetProcAddress(0x76EB0000 [TAPI32.DLL], "lineTranslateAddress") called from "ADBOOK.EXE" at address 0x0044F451 and returned 0x76ED0D53.
GetProcAddress(0x76EB0000 [TAPI32.DLL], "lineOpen") called from "ADBOOK.EXE" at address 0x0044F489 and returned 0x76EBA75A.
GetProcAddress(0x76EB0000 [TAPI32.DLL], "lineGetDevCaps") called from "ADBOOK.EXE" at address 0x0044F4C1 and returned 0x76EB8DEB.
GetProcAddress(0x76EB0000 [TAPI32.DLL], "lineNegotiateAPIVersion") called from "ADBOOK.EXE" at address 0x0044F4F9 and returned 0x76EBA378.
GetProcAddress(0x76EB0000 [TAPI32.DLL], "lineShutdown") called from "ADBOOK.EXE" at address 0x0044F531 and returned 0x76EC013F.
GetProcAddress(0x76EB0000 [TAPI32.DLL], "lineInitialize") called from "ADBOOK.EXE" at address 0x0044F569 and returned 0x76EBFF3D.
GetProcAddress(0x76EB0000 [TAPI32.DLL], "lineClose") called from "ADBOOK.EXE" at address 0x0044F5A1 and returned 0x76EB665A.
GetProcAddress(0x76EB0000 [TAPI32.DLL], "lineDeallocateCall") called from "ADBOOK.EXE" at address 0x0044F5D9 and returned 0x76EB6CC9.
GetProcAddress(0x76EB0000 [TAPI32.DLL], "lineDrop") called from "ADBOOK.EXE" at address 0x0044F611 and returned 0x76EB70FE.
GetProcAddress(0x76EB0000 [TAPI32.DLL], "tapiGetLocationInfo") called from "ADBOOK.EXE" at address 0x0044F649 and returned 0x76ED0ABB.
GetProcAddress(0x76EB0000 [TAPI32.DLL], "lineSetTollList") called from "ADBOOK.EXE" at address 0x0044F681 and returned 0x76ED0E4F.
GetProcAddress(0x76EB0000 [TAPI32.DLL], "lineConfigDialog") called from "ADBOOK.EXE" at address 0x0044F6B6 and returned 0x76EBFD40.
GetProcAddress(0x76EB0000 [TAPI32.DLL], "lineTranslateDialog") called from "ADBOOK.EXE" at address 0x0044F6EB and returned 0x76ECFA8B.
LoadLibraryExW("C:\WINDOWS\system32\uxtheme.dll", 0x00000000, LOAD_WITH_ALTERED_SEARCH_PATH) called from "USER32.DLL" at address 0x7E42DBFB.
Loaded "UXTHEME.DLL" at address 0x5AD70000.  Successfully hooked module.
DllMain(0x5AD70000, DLL_PROCESS_ATTACH, 0x00000000) in "UXTHEME.DLL" called.
DllMain(0x5AD70000, DLL_PROCESS_ATTACH, 0x00000000) in "UXTHEME.DLL" returned 1 (0x1).
LoadLibraryExW("C:\WINDOWS\system32\uxtheme.dll", 0x00000000, LOAD_WITH_ALTERED_SEARCH_PATH) returned 0x5AD70000.
LoadLibraryW("uxtheme.dll") called from "UXTHEME.DLL" at address 0x5AD7B2C4.
LoadLibraryW("uxtheme.dll") returned 0x5AD70000.
LoadLibraryExW("C:\WINDOWS\system32\uxtheme.dll", 0x00000000, LOAD_WITH_ALTERED_SEARCH_PATH) called from "USER32.DLL" at address 0x7E42DBFB.
LoadLibraryExW("C:\WINDOWS\system32\uxtheme.dll", 0x00000000, LOAD_WITH_ALTERED_SEARCH_PATH) returned 0x5AD70000.
LoadLibraryExW("C:\WINDOWS\system32\uxtheme.dll", 0x00000000, LOAD_WITH_ALTERED_SEARCH_PATH) called from "USER32.DLL" at address 0x7E42DBFB.
LoadLibraryExW("C:\WINDOWS\system32\uxtheme.dll", 0x00000000, LOAD_WITH_ALTERED_SEARCH_PATH) returned 0x5AD70000.
LoadLibraryExW("C:\WINDOWS\system32\uxtheme.dll", 0x00000000, LOAD_WITH_ALTERED_SEARCH_PATH) called from "USER32.DLL" at address 0x7E42DBFB.
LoadLibraryExW("C:\WINDOWS\system32\uxtheme.dll", 0x00000000, LOAD_WITH_ALTERED_SEARCH_PATH) returned 0x5AD70000.
LoadLibraryExW("C:\WINDOWS\system32\MSCTF.dll", 0x00000000, LOAD_WITH_ALTERED_SEARCH_PATH) called from "USER32.DLL" at address 0x7E42DBFB.
Loaded "MSCTF.DLL" at address 0x74720000.  Successfully hooked module.
DllMain(0x74720000, DLL_PROCESS_ATTACH, 0x00000000) in "MSCTF.DLL" called.
GetProcAddress(0x7C900000 [NTDLL.DLL], "NtQueryInformationProcess") called from "MSCTF.DLL" at address 0x74723B62 and returned 0x7C90E01B.
GetProcAddress(0x00000000, "CtfImmCoUninitialize") called from "MSCTF.DLL" at address 0x7472279F and returned NULL. Error: The specified procedure could not be found (127).
GetProcAddress(0x00000000, "CtfImmLastEnabledWndDestroy") called from "MSCTF.DLL" at address 0x747227DC and returned NULL. Error: The specified procedure could not be found (127).
GetProcAddress(0x00000000, "CtfImmSetCiceroStartInThread") called from "MSCTF.DLL" at address 0x7472281F and returned NULL. Error: The specified procedure could not be found (127).
GetProcAddress(0x00000000, "CtfImmIsCiceroStartedInThread") called from "MSCTF.DLL" at address 0x74722864 and returned NULL. Error: The specified procedure could not be found (127).
GetProcAddress(0x00000000, "CtfImmIsCiceroEnabled") called from "MSCTF.DLL" at address 0x747228A9 and returned NULL. Error: The specified procedure could not be found (127).
GetProcAddress(0x00000000, "CtfImmIsTextFrameServiceDisabled") called from "MSCTF.DLL" at address 0x747228E5 and returned NULL. Error: The specified procedure could not be found (127).
GetProcAddress(0x00000000, "CtfImmEnterCoInitCountSkipMode") called from "MSCTF.DLL" at address 0x7472292C and returned NULL. Error: The specified procedure could not be found (127).
GetProcAddress(0x00000000, "CtfImmLeaveCoInitCountSkipMode") called from "MSCTF.DLL" at address 0x74722972 and returned NULL. Error: The specified procedure could not be found (127).
GetProcAddress(0x00000000, "ImmGetDefaultIMEWnd") called from "MSCTF.DLL" at address 0x747229B6 and returned NULL. Error: The specified procedure could not be found (127).
GetProcAddress(0x00000000, "ImmReleaseContext") called from "MSCTF.DLL" at address 0x747229EF and returned NULL. Error: The specified procedure could not be found (127).
GetProcAddress(0x00000000, "ImmNotifyIME") called from "MSCTF.DLL" at address 0x74722A29 and returned NULL. Error: The specified procedure could not be found (127).
GetProcAddress(0x00000000, "ImmSetConversionStatus") called from "MSCTF.DLL" at address 0x74722A5C and returned NULL. Error: The specified procedure could not be found (127).
GetProcAddress(0x00000000, "ImmGetConversionStatus") called from "MSCTF.DLL" at address 0x74722A9A and returned NULL. Error: The specified procedure could not be found (127).
GetProcAddress(0x00000000, "ImmGetProperty") called from "MSCTF.DLL" at address 0x74722AD6 and returned NULL. Error: The specified procedure could not be found (127).
GetProcAddress(0x00000000, "ImmGetOpenStatus") called from "MSCTF.DLL" at address 0x74722B0A and returned NULL. Error: The specified procedure could not be found (127).
GetProcAddress(0x00000000, "ImmGetContext") called from "MSCTF.DLL" at address 0x74722B40 and returned NULL. Error: The specified procedure could not be found (127).
GetProcAddress(0x00000000, "ImmSetOpenStatus") called from "MSCTF.DLL" at address 0x74722B75 and returned NULL. Error: The specified procedure could not be found (127).
GetProcAddress(0x00000000, "ImmInstallIMEA") called from "MSCTF.DLL" at address 0x74722BAC and returned NULL. Error: The specified procedure could not be found (127).
GetProcAddress(0x00000000, "ImmGetDescriptionA") called from "MSCTF.DLL" at address 0x74722BE2 and returned NULL. Error: The specified procedure could not be found (127).
GetProcAddress(0x00000000, "ImmGetDescriptionW") called from "MSCTF.DLL" at address 0x74722C1A and returned NULL. Error: The specified procedure could not be found (127).
GetProcAddress(0x00000000, "ImmGetIMEFileNameA") called from "MSCTF.DLL" at address 0x74722C52 and returned NULL. Error: The specified procedure could not be found (127).
GetProcAddress(0x00000000, "ImmGetIMEFileNameW") called from "MSCTF.DLL" at address 0x74722C8A and returned NULL. Error: The specified procedure could not be found (127).
GetProcAddress(0x00000000, "ImmSetHotKey") called from "MSCTF.DLL" at address 0x74723168 and returned NULL. Error: The specified procedure could not be found (127).
GetProcAddress(0x7C800000 [KERNEL32.DLL], "GetUserDefaultUILanguage") called from "MSCTF.DLL" at address 0x74722D2B and returned 0x7C813070.
DllMain(0x74720000, DLL_PROCESS_ATTACH, 0x00000000) in "MSCTF.DLL" returned 1 (0x1).
LoadLibraryExW("C:\WINDOWS\system32\MSCTF.dll", 0x00000000, LOAD_WITH_ALTERED_SEARCH_PATH) returned 0x74720000.
LoadLibraryA("COMCTL32.DLL") called from "ADBOOK.EXE" at address 0x00593C21.
LoadLibraryA("COMCTL32.DLL") returned 0x5D090000.
GetProcAddress(0x5D090000 [COMCTL32.DLL], "InitCommonControlsEx") called from "ADBOOK.EXE" at address 0x00593C35 and returned 0x5D093619.
LoadLibraryA("COMCTL32.DLL") called from "ADBOOK.EXE" at address 0x00593C21.
LoadLibraryA("COMCTL32.DLL") returned 0x5D090000.
GetProcAddress(0x5D090000 [COMCTL32.DLL], "InitCommonControlsEx") called from "ADBOOK.EXE" at address 0x00593C35 and returned 0x5D093619.
LoadLibraryA("COMCTL32.DLL") called from "ADBOOK.EXE" at address 0x00593C21.
LoadLibraryA("COMCTL32.DLL") returned 0x5D090000.
GetProcAddress(0x5D090000 [COMCTL32.DLL], "InitCommonControlsEx") called from "ADBOOK.EXE" at address 0x00593C35 and returned 0x5D093619.
LoadLibraryA("COMCTL32.DLL") called from "ADBOOK.EXE" at address 0x00593C21.
LoadLibraryA("COMCTL32.DLL") returned 0x5D090000.
GetProcAddress(0x5D090000 [COMCTL32.DLL], "InitCommonControlsEx") called from "ADBOOK.EXE" at address 0x00593C35 and returned 0x5D093619.
LoadLibraryA("COMCTL32.DLL") called from "ADBOOK.EXE" at address 0x00593C21.
LoadLibraryA("COMCTL32.DLL") returned 0x5D090000.
GetProcAddress(0x5D090000 [COMCTL32.DLL], "InitCommonControlsEx") called from "ADBOOK.EXE" at address 0x00593C35 and returned 0x5D093619.
GetProcAddress(0x774E0000 [OLE32.DLL], "CoCreateInstanceEx") called from "OLEAUT32.DLL" at address 0x77125702 and returned 0x774FFA6B.
LoadLibraryA("oleaut32.dll") called from "OLE32.DLL" at address 0x77502B33.
LoadLibraryA("oleaut32.dll") returned 0x77120000.
LoadLibraryA("CLBCATQ.DLL") called from "OLE32.DLL" at address 0x7752F0F5.
Loaded "CLBCATQ.DLL" at address 0x76FD0000.  Successfully hooked module.
Loaded "COMRES.DLL" at address 0x77050000.  Successfully hooked module.
Loaded "VERSION.DLL" at address 0x77C00000.  Successfully hooked module.
DllMain(0x77050000, DLL_PROCESS_ATTACH, 0x00000000) in "COMRES.DLL" called.
DllMain(0x77050000, DLL_PROCESS_ATTACH, 0x00000000) in "COMRES.DLL" returned 1 (0x1).
DllMain(0x77C00000, DLL_PROCESS_ATTACH, 0x00000000) in "VERSION.DLL" called.
DllMain(0x77C00000, DLL_PROCESS_ATTACH, 0x00000000) in "VERSION.DLL" returned 1 (0x1).
DllMain(0x76FD0000, DLL_PROCESS_ATTACH, 0x00000000) in "CLBCATQ.DLL" called.
GetProcAddress(0x7C800000 [KERNEL32.DLL], "InitializeCriticalSectionAndSpinCount") called from "CLBCATQ.DLL" at address 0x76FD4C76 and returned 0x7C80B829.
DllMain(0x76FD0000, DLL_PROCESS_ATTACH, 0x00000000) in "CLBCATQ.DLL" returned 1 (0x1).
LoadLibraryA("CLBCATQ.DLL") returned 0x76FD0000.
GetProcAddress(0x76FD0000 [CLBCATQ.DLL], "GetCatalogObject") called from "OLE32.DLL" at address 0x7752F10A and returned 0x76FD4018.
LoadLibraryA("CLBCATQ.DLL") called from "OLE32.DLL" at address 0x7752F8D1.
LoadLibraryA("CLBCATQ.DLL") returned 0x76FD0000.
GetProcAddress(0x76FD0000 [CLBCATQ.DLL], "GetCatalogObject2") called from "OLE32.DLL" at address 0x7752F8E4 and returned 0x76FD40B7.
GetProcAddress(0x774E0000 [OLE32.DLL], "CLSIDFromOle1Class") called from "OLE32.DLL" at address 0x7752FA8D and returned 0x77524393.
GetProcAddress(0x7C800000 [KERNEL32.DLL], "InitializeCriticalSectionAndSpinCount") called from "CLBCATQ.DLL" at address 0x76FD66ED and returned 0x7C80B829.
Second chance exception 0xE06D7363 (Microsoft C++ Exception) occurred in "KERNEL32.DLL" at address 0x7C812A5B.
Exited "ADBOOK.EXE" (process 0xB50) with code -529697949 (0xE06D7363).
0
 
LVL 86

Expert Comment

by:jkr
ID: 20368987
Hmm, 0xE06D7363 is a COM exception - is there any chance another component is missing or not registered?
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

This article shows how to make a Windows 7 gadget that accepts files dropped from the Windows Explorer.  It also illustrates how to give your gadget a non-rectangular shape and how to add some nifty visual effects to text displayed in a your gadget.…
A theme is a collection of property settings that allow you to define the look of pages and controls, and then apply the look consistently across pages in an application. Themes can be made up of a set of elements: skins, style sheets, images, and o…
This is Part 3 in a 3-part series on Experts Exchange to discuss error handling in VBA code written for Excel. Part 1 of this series discussed basic error handling code using VBA. http://www.experts-exchange.com/videos/1478/Excel-Error-Handlin…
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now