Notes 8.5 on Vista Chrash when trying to view attachments

Looks like I have a problem with the viewers. Every time a try to view an attachment Notes crashes.

Subject: Same here. Also reported in Design Partner forum

Subject: solved, had to run as admin

Subject: d

Hi

Can you post the FATAL THREAD section of the NSD files with the few lines under it

For example:

############################################################

FATAL THREAD 1/2 [ domdsm:107a8:67076]

FP=0x0012a34c, PC=0x60069a86, SP=0x0012a2f0, stksize=92

EAX=0x01a3088c, EBX=0x01a48650, ECX=0x0000bffe, EDX=0x01a325e6

ESI=0x00004000, EDI=0x0032ff78, CS=0x0000001b, SS=0x00000023

DS=0x00000023, ES=0x00000023, FS=0x0000003b, GS=0x00000000 Flags=0x00010206

Exception code: c0000005 (ACCESS_VIOLATION)

############################################################

@[ 1] 0x60069a86 nnotes._fdDelete@4+118 (4000,12a368,608770ef,4000)

@[ 2] 0x60069a0c nnotes._OSFileClose@4+12 (4000,12adc0,12a380,60872ea7)

@[ 3] 0x608770ef nnotes._sqloclose+15 (4000,12b59c,5010,0)

@[ 4] 0x60872ea7 nnotes._sqlpgclf+71 (12adc0,1aaa2cb,70,1aaa2f3)

@[ 5] 0x60885458 nnotes._sqlpgfdl+616 (12b9a4,1aaa2cb,41,12be44)

@[ 6] 0x60876a6f nnotes._sqlpgcdl+927 (12bf44,12b9a4,0,12be44).

Date

Topic

Frequently asked question - How to analyze Notes/Domino NSDs? (Jean-Yves Riverin)

JYR

Subject: old reply, but still valid for beta 2, it still happens, and I think it is related to the Quickr connector…

############################################################### FATAL THREAD 1/19 [ NLNOTES: 0600: 14f8]

FP=0x0012cc44, PC=0x76c69b30, SP=0x0012cc3c

stkbase=00130000, total stksize=212992, used stksize=13252

EAX=0x001366f0, EBX=0x00000000, ECX=0x000009bc, EDX=0x00000000

ESI=0x00134000, EDI=0x0c6e0a2c, CS=0x0000001b, SS=0x00000023

DS=0x00000023, ES=0x00000023, FS=0x0000003b, GS=0x00000000 Flags=0x00010202

Exception code: c0000005 (ACCESS_VIOLATION)

############################################################

[ 1] 0x76c69b30 msvcrt.memcpy+592 (c6d973c,12cd10,99e0,0)

[ 2] 0x73df1c02 msacm32.wodMessage+2288 (0,0,12ccd4,99e0)

[ 3] 0x73df138b msacm32.wodMessage+121 (0,5,12ccd4,12ccbc)

[ 4] 0x74c34ce3 WINMM.waveOutOpen+320 (dd4ef34,306338,12cd10,0)

############################################################

PASS 2 : FATAL THREAD with STACK FRAMES 1/19 [ NLNOTES: 0600: 14f8]

FP=0012cc44, PC=76c69b30, SP=0012cc3c

stkbase=00130000, total stksize=212992, used stksize=13252

Exception code: c0000005 (ACCESS_VIOLATION)

############################################################

Disassembly of c. 10 instructions before and after faulting address 76c69b30:



    76c69b1a 884703           mov     [edi+0x3],al                    ds:0fbbb222=??

    76c69b1d 8a4602           mov     al,[esi+0x2]                    ds:0360e7f6=00

    76c69b20 884702           mov     [edi+0x2],al                    ds:0fbbb222=??

    76c69b23 8a4601           mov     al,[esi+0x1]                    ds:0360e7f6=00

    76c69b26 884701           mov     [edi+0x1],al                    ds:0fbbb222=??

    76c69b29 8b4508           mov     eax,[ebp+0x8]             ss:0360743a=000003a8

    76c69b2c 5e               pop     esi

    76c69b2d 5f               pop     edi

    76c69b2e c9               leave

    76c69b2f c3               ret

FAULT ->76c69b30 f3a5 rep movsd ds:00134000=??? es:0c6e0a2c=00000000

    76c69b32 ff24958899c676   jmp    dword ptr [76c69988+edx*4] ds:00000000=????????

    76c69b39 8a06             mov     al,[esi]                        ds:00134000=??

    76c69b3b 8807             mov     [edi],al                        ds:0c6e0a2c=00

    76c69b3d 8a4601           mov     al,[esi+0x1]                    ds:0360e7f6=00

    76c69b40 884701           mov     [edi+0x1],al                    ds:0fbbb222=??

    76c69b43 8b4508           mov     eax,[ebp+0x8]             ss:0360743a=000003a8

    76c69b46 5e               pop     esi

    76c69b47 5f               pop     edi

    76c69b48 c9               leave

    76c69b49 c3               ret

    76c69b4a 8b448ef4         mov     eax,[esi+ecx*4+0xf4]      ds:034db1b3=00000000

[ 1] 0x76c69b30 msvcrt.memcpy+592 (c6d973c,12cd10,99e0,0)

        0012cc44 70CC1200 021CDF73 3C976D0C 10CD1200 | p... ...s <.m. .... |

        0012cc54 E0990000 00000000 28842C00 A64AD875 | .... .... (.,. .J.u |

        0012cc64 00000000 7CCC1200 10CD1200          | .... |... ....      |

[ 2] 0x73df1c02 msacm32.wodMessage+2288 (0,0,12ccd4,99e0)