× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



Here's the Dr Watson on the latest dump:

Application exception occurred:
        App:  (pid=1548)
        When: 08/03/04 @ 10:26:42.671
        Exception number: c0000005 (access violation)

*----> System Information <----*
        Computer Name: MIS-MANAGER
        User Name:
        Number of Processors: 1
        Processor Type: x86 Family 15 Model 2 Stepping 7
        Windows 2000 Version: 5.0
        Current Build: 2195
        Service Pack: 4
        Current Type: Uniprocessor Free
        Registered Organization:
        Registered Owner: MIS Manager

*----> Task List <----*
   0 Idle.exe
   8 System.exe
 168 smss.exe
 192 csrss.exe
 188 winlogon.exe
 240 services.exe
 260 lsass.exe
 448 svchost.exe
 484 spoolsv.exe
 512 nhksrv.exe
 560 Avsynmgr.exe
 604 awhost32.exe
 624 cisvc.exe
 636 DKService.exe
 652 svchost.exe
 692 GEARSEC.exe
 720 VsStat.exe
 768 Vshwin32.exe
 800 hidserv.exe
 832 pa.exe
 880 regsvc.exe
 908 MSTask.exe
 928 Avconsol.exe
 960 tcpsvcs.exe
 988 snmp.exe
1032 STService.exe
1104 mspmspsv.exe
1112 svchost.exe
1236 Launcher.exe
1240 Explorer.exe
1436 point32.exe
1500 igfxtray.exe
1512 httpdl.exe
1532 evfctcpd.exe
1548 EVFWLX40.exe
1560 imnsvdem.exe
1536 DrgToDsc.exe
1572 hkcmd.exe
1580 realsched.exe
1588 RuLaunch.exe
1260 webshots.scr.exe
1180 hdi.exe
1708 pastatus.exe
1732 Mcshield.exe
1856 RXAPI.exe
1348 taskmgr.exe
1268 pcsws.exe
1360 PCSCM.exe
1916 pcsws.exe
2000 pcsws.exe
2112 pcsws.exe
2156 pcsws.exe
2192 pcsws.exe
 596 outlook.exe
1604 MAPISP32.exe
 724 Netscp.exe
2292 drwtsn32.exe
   0 _Total.exe

(00400000 - 00460000)
(77F80000 - 77FFD000)
(7C570000 - 7C628000)
(00460000 - 00600000)
(50000000 - 50100000)
(7C2D0000 - 7C332000)
(77D30000 - 77DA1000)
(77E10000 - 77E75000)
(77F40000 - 77F7E000)
(51000000 - 51260000)
(71710000 - 71794000)
(782F0000 - 78538000)
(70A70000 - 70AD5000)
(78000000 - 78045000)
(76B30000 - 76B6E000)
(77A50000 - 77B3F000)
(00600000 - 00680000)
(77800000 - 7781E000)
(76620000 - 76630000)
(10000000 - 1009F000)
(00C20000 - 00C38000)
(719B0000 - 719B8000)
(01470000 - 014A0000)
(01520000 - 015C0000)
(015C0000 - 016A0000)
(01820000 - 018C0000)
(018C0000 - 01970000)
(01970000 - 01A10000)
(01A10000 - 01AB0000)
(01AB0000 - 01BF0000)
(01BF0000 - 01C29000)
(01C30000 - 01C69000)
(01C70000 - 01CE0000)
(01CE0000 - 01D80000)
(01D80000 - 01E30000)
(01E30000 - 01F50000)
(01F50000 - 02030000)
(02030000 - 020B0000)
(020B0000 - 02120000)
(02120000 - 021A0000)
(021A0000 - 02220000)
(61220000 - 61232000)
(02560000 - 025D0000)
(025D0000 - 02670000)
(75050000 - 75058000)
(75030000 - 75044000)
(75020000 - 75028000)
(74FD0000 - 74FEE000)
(77980000 - 779A4000)
(77340000 - 77353000)
(77520000 - 77525000)
(77320000 - 77337000)
(75150000 - 7515F000)
(75170000 - 751BF000)
(7C340000 - 7C34F000)
(751C0000 - 751C6000)
(77950000 - 7797A000)
(779B0000 - 77A4B000)
(773B0000 - 773DF000)
(77380000 - 773A3000)
(77830000 - 7783E000)
(77880000 - 7790E000)
(7C0F0000 - 7C151000)
(774E0000 - 77513000)
(774C0000 - 774D1000)
(77530000 - 77552000)
(77360000 - 77379000)
(777F0000 - 777F5000)
(03190000 - 031AD000)
(75010000 - 75017000)
(035C0000 - 03620000)

State Dump for Thread Id 0x610

eax=00000001 ebx=00000000 ecx=01010101 edx=00000000 esi=77f82865
edi=000000a4
eip=77f82870 esp=0012a1c8 ebp=0012a1ec iopl=0         nv up ei pl zr na po
nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000
efl=00000246


function: NtWaitForSingleObject
        77f82865 b8ea000000       mov     eax,0xea
        77f8286a 8d542404         lea     edx,[esp+0x4]
ss:00ba40af=????????
        77f8286e cd2e             int     2e
        77f82870 c20c00           ret     0xc

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name
0012A1EC 7C573B50 000000A4 FFFFFFFF 00000000 500116D2
ntdll!NtWaitForSingleObject
0012A240 500119F4 0012A2A4 FFFFFFFF 00746734 00000001
kernel32!WaitForSingleObject
0012A274 510736A2 002A2928 000092E2 000000D7 00746734 !Ordinal607
0012A2B8 5107375F 00746870 00007FC8 00746870 02460020 !Ordinal988
0012A30C 0053D252 00746734 000003E8 00007FC8 00746870 !Ordinal989
0012A364 510BCD94 00747460 00000000 00000000 0012A494
!_ct__11ILpexWindowFUlP7IWindowT2P10IPopUpMenuP8IMenuBarP6ITitleiP10IScroll
BarT8P11IStaticTextRC10IRectangleRCQ2_7ICanvas5Style
0012A3B0 77E11EF0 00000000 00000113 00007FC8 00883449 !Ordinal973
0012A3D0 77E120D5 510BCCC8 00000000 00000113 00007FC8
user32!MsgWaitForMultipleObjects
0012A45C 77E15F69 0012A494 00000001 5101B81F 0012A494
user32!TranslateMessageEx
0012A4E8 004F6422 004F6415 0012A5A4 0012A5C7 0012A5BE
user32!DispatchMessageA
0012A530 004F62C7 00570020 00000001 00000000 0012A5A4 !lxsshow
0012A588 00473A32 02461290 00000020 454E4F4E 4E595320 !lxsshow
0012AA34 004C51AE 02461290 0012AEA0 0012A598 004C5182 !lexcall
0012AEE0 004C53F5 0012AA5C 02461290 01803684 024FBEEC !lxlxr2
0012AF64 0053E292 00746710 0012AFB8 4D425553 4E205449 !lxlxr
0012AFE8 00472740 00746710 0012B018 00000000 01850BE8
!_ct__11ILpexWindowFUlP7IWindowT2P10IPopUpMenuP8IMenuBarP6ITitleiP10IScroll
BarT8P11IStaticTextRC10IRectangleRCQ2_7ICanvas5Style
0012B01C 0183F603 024FCAA0 0183F5DD 0012D110 024FBFEC !EditInvokeCommand
0012D618 01847850 0012EE4C 0012D6F4 0012EEF0 00572030 !<nosymbols>
0012ED70 0049ECBE 0012EE4C 00120002 01803684 0012EEF0 !<nosymbols>
0012EED8 004C5234 0012F32C 0012EEF0 02461290 01803684 !loxecmd2
0012F36C 004C53F5 0012EEF0 02461290 01803684 024F7F6A !lxlxr2
0012F808 0054BC1D 02461290 024F7F3C 00000000 0012F9D4 !lxlxr
0012F96C 51028B95 02462FF0 0000000C 0012FE00 0180FAC0
!set__9LPEXValueFPCcT1
0012FA04 5101EE53 0246301C 0012FE10 0012FE00 0180FAC0 !Ordinal137
0012FC48 5102084F 0180FAC0 0012FE10 0012FF2C 0012FF24 !Ordinal1609
0012FE40 77E11EF0 000B00EE 00000111 000014B5 00000000 !Ordinal1614
0012FE60 77E1204C 510201C1 000B00EE 00000111 000014B5
user32!MsgWaitForMultipleObjects
0012FEEC 77E15F69 0012FF24 00000001 5101B81F 0012FF24
user32!TranslateMessageEx
0012FF78 510149F7 51174E00 00745110 004AD8DD 00000002
user32!DispatchMessageA
0012FFC0 7C581AF6 00000030 0000000C 7FFDF000 0012CA58 !Ordinal390
0012FFF0 00000000 00410070 00000000 000000C8 00000100 kernel32!OpenEventA

*----> Raw Stack Dump <----*
0012a1c8  28 3b 57 7c a4 00 00 00 - 00 00 00 00 00 00 00 00
(;W|............
0012a1d8  00 00 00 00 c8 7f 00 00 - a4 00 00 00 ff ff ff ff
................
0012a1e8  ff ff ff ff 40 a2 12 00 - 50 3b 57 7c a4 00 00 00
....@...P;W|....
0012a1f8  ff ff ff ff 00 00 00 00 - d2 16 01 50 a4 00 00 00
...........P....
0012a208  ff ff ff ff 62 68 0f 41 - 50 46 00 00 6c a2 12 00
....bh.APF..l...
0012a218  94 57 30 00 50 46 00 00 - d2 84 00 00 01 00 00 00
.W0.PF..........
0012a228  01 00 00 00 d7 00 00 00 - 10 a3 12 00 76 d4 28 00
............v.(.
0012a238  a4 a2 12 00 a4 a2 12 00 - 74 a2 12 00 f4 19 01 50
........t......P
0012a248  a4 a2 12 00 ff ff ff ff - 34 67 74 00 01 00 00 00
........4gt.....
0012a258  00 00 00 00 9c 45 07 50 - a4 a2 12 00 00 00 00 00
.....E.P........
0012a268  e0 ff ff ff b0 a2 12 00 - 00 4f 04 50 b8 a2 12 00
.........O.P....
0012a278  a2 36 07 51 28 29 2a 00 - e2 92 00 00 d7 00 00 00
.6.Q()*.........
0012a288  34 67 74 00 e8 03 00 00 - 00 00 00 00 10 a3 12 00
4gt.............
0012a298  a4 98 1a 51 2a 00 00 00 - c0 5c 74 00 e0 b8 07 50
...Q*....\t....P
0012a2a8  64 2f 23 51 d8 ff ff ff - 04 a3 12 00 00 4e 17 51
d/#Q.........N.Q
0012a2b8  0c a3 12 00 5f 37 07 51 - 70 68 74 00 c8 7f 00 00
...._7.Qpht.....
0012a2c8  70 68 74 00 20 00 46 02 - 00 00 00 00 1a 00 00 00  pht.
.F.........
0012a2d8  60 98 1a 51 03 00 00 00 - 07 00 00 00 68 00 00 00
`..Q........h...
0012a2e8  02 00 00 00 d7 00 00 00 - 02 00 00 00 e2 92 00 00
................
0012a2f8  a2 a0 0f 41 e2 92 00 00 - c4 ff ff ff 5c a3 12 00
...A........\...

State Dump for Thread Id 0x584

eax=00744820 ebx=00744820 ecx=000000c0 edx=00000000 esi=77f82826
edi=017ffee0
eip=77f82831 esp=017ffecc ebp=017ffee8 iopl=0         nv up ei pl nz na pe
nc
cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000
efl=00000202


function: NtDelayExecution
        77f82826 b832000000       mov     eax,0x32
        77f8282b 8d542404         lea     edx,[esp+0x4]
ss:02279db3=????????
        77f8282f cd2e             int     2e
        77f82831 c20800           ret     0x8
        77f82834 53               push    ebx
        77f82835 51               push    ecx
        77f82836 6a00             push    0x0
        77f82838 c70701000000     mov     dword ptr [edi],0x1
ds:017ffee0=ff676980
        77f8283e ff750c           push    dword ptr [ebp+0xc]
ss:02279dce=????????
        77f82841 50               push    eax
        77f82842 e879fdffff       call    RtlMultiByteToUnicodeN (77f825c0)
        77f82847 e928fcffff       jmp  RtlConsoleMultiByteToUnicodeN+0x333
(77f82474)

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name
017FFEE8 7C573A22 000003E8 00000000 510B9704 000003E8
ntdll!NtDelayExecution
017FFF58 510BBD8F 017FFF8C 510BBB86 00744820 0000001E kernel32!Sleep
017FFF8C 0024035F 00746920 0074FAC0 510B9C94 00746920 !Ordinal1447
017FFFB4 7C57438B 00744980 0074FAC0 00000000 00744980 <nosymbols>
017FFFEC 00000000 002402F0 00744980 00000000 0000BEEF kernel32!TlsSetValue

*----> Raw Stack Dump <----*
017ffecc  4e 3a 57 7c 00 00 00 00 - e0 fe 7f 01 30 ff 7f 01
N:W|........0...
017ffedc  00 00 00 00 80 69 67 ff - ff ff ff ff 58 ff 7f 01
.....ig.....X...
017ffeec  22 3a 57 7c e8 03 00 00 - 00 00 00 00 04 97 0b 51
":W|...........Q
017ffefc  e8 03 00 00 5c f9 1c 51 - 35 e5 53 00 58 ff 7f 01
....\..Q5.S.X...
017fff0c  23 e5 53 00 00 00 00 00 - d0 fb 74 00 20 69 74 00  #.S.......t.
it.
017fff1c  00 00 00 00 10 ff 7f 01 - 0c 5f 58 00 00 00 00 00
........._X.....
017fff2c  99 39 e1 77 00 00 00 00 - 20 48 74 00 00 00 00 00  .9.w....
Ht.....
017fff3c  00 00 00 00 00 00 00 00 - 00 00 00 00 10 67 74 00
.............gt.
017fff4c  c4 ff ff ff ac ff 7f 01 - 40 6d 56 00 8c ff 7f 01
........@xxxxxxx
017fff5c  8f bd 0b 51 8c ff 7f 01 - 86 bb 0b 51 20 48 74 00  ...Q.......Q
Ht.
017fff6c  1e 00 00 00 8d 05 24 00 - 60 01 00 00 84 05 00 00
......$.`.......
017fff7c  84 05 00 00 60 01 00 00 - 84 05 00 00 80 49 74 00
....`........It.
017fff8c  b4 ff 7f 01 5f 03 24 00 - 20 69 74 00 c0 fa 74 00  ...._.$.
it...t.
017fff9c  94 9c 0b 51 20 69 74 00 - 4c 01 00 00 00 00 00 00  ...Q
it.L.......
017fffac  dc ff 7f 01 e0 43 25 00 - ec ff 7f 01 8b 43 57 7c
.....C%......CW|
017fffbc  80 49 74 00 c0 fa 74 00 - 00 00 00 00 80 49 74 00
.It...t......It.
017fffcc  00 d0 fd 7f a0 fa 74 00 - c0 ff 7f 01 a0 fa 74 00
......t.......t.
017fffdc  ff ff ff ff 97 e5 57 7c - a8 a0 57 7c 00 00 00 00
......W|..W|....
017fffec  00 00 00 00 00 00 00 00 - f0 02 24 00 80 49 74 00
..........$..It.
017ffffc  00 00 00 00 ef be 00 00 - f0 ff 00 00 00 01 74 00
..............t.

State Dump for Thread Id 0x244

eax=0314f2d0 ebx=00000004 ecx=0314f558 edx=00000000 esi=77f82873
edi=00000004
eip=77f8287e esp=0314fd24 ebp=0314fd70 iopl=0         nv up ei pl zr na po
nc
cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000
efl=00000246


function: NtWaitForMultipleObjects
        77f82873 b8e9000000       mov     eax,0xe9
        77f82878 8d542404         lea     edx,[esp+0x4]
ss:03bc9c0b=????????
        77f8287c cd2e             int     2e
        77f8287e c21400           ret     0x14

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name
0314FD70 7C578F0D 0314FD48 00000001 00000000 00000000
ntdll!NtWaitForMultipleObjects
0314FFB4 7C57438B 00000005 0014CA90 00130178 00181B60
kernel32!WaitForMultipleObjects
0314FFEC 00000000 778321FE 00181B60 00000000 000000C8 kernel32!TlsSetValue

*----> Raw Stack Dump <----*
0314fd24  23 3c 57 7c 04 00 00 00 - 48 fd 14 03 01 00 00 00
#<W|....H.......
0314fd34  00 00 00 00 00 00 00 00 - 01 00 00 00 60 1b 18 00
............`...
0314fd44  01 00 00 00 08 02 00 00 - 0c 02 00 00 1c 02 00 00
................
0314fd54  8c 02 00 00 01 00 00 00 - 00 00 10 00 14 00 00 00
................
0314fd64  70 9a b1 85 00 00 00 00 - 20 20 8d 84 b4 ff 14 03  p.......
......
0314fd74  0d 8f 57 7c 48 fd 14 03 - 01 00 00 00 00 00 00 00
..W|H...........
0314fd84  00 00 00 00 00 00 00 00 - b2 22 83 77 04 00 00 00
.........".w....
0314fd94  b0 fe 14 03 00 00 00 00 - ff ff ff ff 60 1b 18 00
............`...
0314fda4  78 01 13 00 90 ca 14 00 - fb 12 43 80 a8 ff 28 84
x.........C...(.
0314fdb4  68 ff 28 84 00 00 00 00 - 01 00 00 00 38 00 00 00
h.(.........8...
0314fdc4  23 00 00 00 23 00 00 00 - 90 ca 14 00 78 01 13 00
#...#.......x...
0314fdd4  60 1b 18 00 90 ca 14 00 - 88 ca 14 00 fe 21 83 77
`............!.w
0314fde4  90 ca 14 00 33 43 57 7c - 1b 00 00 00 00 02 00 00
....3CW|........
0314fdf4  fc ff 14 03 23 00 00 00 - 70 20 e9 85 20 00 00 00  ....#...p ..
...
0314fe04  70 cf 01 85 03 00 10 00 - 70 cf 01 85 00 00 00 00
p.......p.......
0314fe14  68 4b 4b b7 00 00 00 00 - d8 71 56 e3 2c 4b 4b b7
hKK......qV.,KK.
0314fe24  54 20 8d 84 dd c4 01 00 - b8 04 14 86 00 07 00 00  T
..............
0314fe34  47 d6 44 80 dd c4 01 00 - b8 04 14 86 dd c4 01 00
G.D.............
0314fe44  b8 04 14 86 01 02 fa 7f - 39 07 00 00 ec df 44 80
........9.....D.
0314fe54  39 07 00 00 90 95 ab 85 - 00 00 fa 7f fc 07 30 c0
9.............0.

State Dump for Thread Id 0x8d0

eax=00000000 ebx=0371b1c4 ecx=00000002 edx=00166978 esi=00166960
edi=00000000
eip=75031733 esp=0371b184 ebp=0371b194 iopl=0         nv up ei ng nz na po
cy
cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000
efl=00000287


function: WSASend
        75031716 57               push    edi
        75031717 8d4618           lea     eax,[esi+0x18]
ds:00be0846=00000000
        7503171a c7450c26270000   mov dword ptr [ebp+0xc],0x2726
ss:0419507a=????????
        75031721 50               push    eax
        75031722 8945fc           mov     [ebp+0xfc],eax
ss:0419507a=????????
        75031725 ff1580100375
ds:75031080=77f82060
                                  call    dword ptr [Ordinal99+0x1080
(75031080)]
        7503172b 8b06             mov     eax,[esi]
ds:00166960=0014ba60
        7503172d 3bc6             cmp     eax,esi
        7503172f 7426             jz      recvfrom+0x6b (7503a257)
        75031731 8bf8             mov     edi,eax
FAULT ->75031733 8b00             mov     eax,[eax]
ds:00000000=????????
        75031735 8b4f34           mov     ecx,[edi+0x34]
ds:00a79ee6=????????
        75031738 3b4d08           cmp     ecx,[ebp+0x8]
ss:0419507a=????????
        7503173b 75f0             jnz     WSAGetQOSByName+0x13 (75039b2d)
        7503173d 837f0c00         cmp    dword ptr [edi+0xc],0x0
ds:00a79ee6=????????
        75031741 0f848e460000     je      WSAUnhookBlockingHook+0x5a9
(75035dd5)
        75031747 8d4708           lea     eax,[edi+0x8]
ds:00a79ee6=????????
        7503174a 50               push    eax
        7503174b ff1584100375
ds:75031084=7c5737d1
                                  call    dword ptr [Ordinal99+0x1084
(75031084)]
        75031751 83650c00         and    dword ptr [ebp+0xc],0x0
ss:0419507a=????????
        75031755 893b             mov     [ebx],edi
ds:0371b1c4=00000000
        75031757 ff75fc           push    dword ptr [ebp+0xfc]
ss:0419507a=????????

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name
0371B194 7503CAC1 000005A4 00002726 0371B4D4 0019638C ws2_32!WSASend
0371B1BC 03199F3C 00000000 0019638C 0371B4D4 0014BA70 ws2_32!WSAAccept
0371B488 75031958 00000002 00000001 00000000 0014BA70 !GdLsp_Uninstall
0371B50C 75033580 00000002 00000001 00000000 00000000 ws2_32!WSASocketW
0371B534 0269020E 00000002 00000001 00000000 00000000 ws2_32!socket
0371B814 01B232B7 024FF40C 024FF3C4 5001211B 0000C001 <nosymbols>
0371B82C 01AD1FB4 024FF3A0 0371BBAC 0371211B 0000C001
!convertToIntFromHex__15SecurityManagerF7IString
0371BBD0 01AD8D53 024FF3A0 024FF37C 00000001 50026890
!WVCC_Shutdown_Server_TCP
0371BC10 01ACD7EC 024FC590 0371BCDC 0000C001 0057202D
!WVCC_Get_Last_Error_Text
0371BCF0 01B36814 01D30099 024FA56C 0371BE88 0000C001
!WVCC_Get_TCP_Server_List
0371BE64 01EB7049 01D30099 024FA56C 0371BE88 0000C001 !WVCC_Run_Host_Cmd
0371C074 01E62536 024FCBC4 00000000 01D30030 024FCBC4 !signon
0371C0BC 01E595F4 024FCBC4 024FF001 00000000 0000C001 !AdeBatchSTRCODE
0371E1DC 01849D24 024FCBC4 024FCBCD 024FCAC0 0000C001 !VDEGetFile
0371F940 0049ECBE 0371FA1C 01800002 01803684 0371FACC !<nosymbols>
0371FAA8 004F65B0 0371FAE0 0371FACC 02461290 01803684 !loxecmd2
0371FF1C 004F6C02 00000020 024FBEEC 02461290 01803684 !lxsshow
0371FF58 510BBD8F 0371FF8C 510BBB86 00744820 0000001E !lxsshow
0371FF8C 0024035F 024FC7C0 0012972C 510B9C94 024FC7C0 !Ordinal1447
0371FFB4 7C57438B 024FEF00 0012972C 51174E00 024FEF00 <nosymbols>
0371FFEC 00000000 002402F0 024FEF00 00000000 000001CC kernel32!TlsSetValue

*----> Raw Stack Dump <----*
0371b184  d4 b4 71 03 8c 63 19 00 - 90 14 18 00 78 69 16 00
..q..c......xi..
0371b194  bc b1 71 03 c1 ca 03 75 - a4 05 00 00 26 27 00 00
..q....u....&'..
0371b1a4  d4 b4 71 03 8c 63 19 00 - 08 a0 14 00 ff ff ff ff
..q..c..........
0371b1b4  58 1b 1a 03 ff ff ff ff - 88 b4 71 03 3c 9f 19 03
X.........q.<...
0371b1c4  00 00 00 00 8c 63 19 00 - d4 b4 71 03 70 ba 14 00
.....c....q.p...
0371b1d4  00 00 00 00 c4 cb 4f 02 - 6f 00 6d 00 00 00 00 00
......O.o.m.....
0371b1e4  01 00 00 00 66 00 02 00 - 00 00 00 00 00 00 00 00
....f...........
0371b1f4  00 00 00 00 08 00 00 00 - a0 1a 0f e7 8b ab cf 11
................
0371b204  8c a3 00 80 5f 48 a1 92 - 2a 05 00 00 01 00 00 00
...._H..*.......
0371b214  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
0371b224  00 00 00 00 00 00 00 00 - 00 00 00 00 02 00 00 00
................
0371b234  02 00 00 00 10 00 00 00 - 10 00 00 00 01 00 00 00
................
0371b244  06 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
0371b254  00 00 00 00 00 00 00 00 - 4d 00 53 00 41 00 46 00
........M.S.A.F.
0371b264  44 00 20 00 54 00 63 00 - 70 00 69 00 70 00 20 00  D. .T.c.p.i.p.
.
0371b274  5b 00 54 00 43 00 50 00 - 2f 00 49 00 50 00 5d 00
[.T.C.P./.I.P.].
0371b284  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
0371b294  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
0371b2a4  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
0371b2b4  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................




As an Amazon Associate we earn from qualifying purchases.

This thread ...


Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.