Word 2000 crashes when clicking on inserted image

D

developmental2

Hi all..

Word 2000 crashes when clicking on inserted image

I have a problem that's recurring in clockwork reliability:
I scanned 4 full page images with HP OfficeJet. (150 DPI 24 bit)
saved them with the scanner's own program to JPG (each is between
150-200kb)

Inserted them into a new word 2000 document. Made them floating objects
and tight frames.

Then started to move them around the page, when clicking on one of them
(sometimes first click, sometimes several clicks later)
Word crashes,
Application exception occurred:
App: (pid=1868)
When: 02/10/2005 @ 10:55:00.098
Exception number: c0000005 (access violation)

I have a 512MB 80GB, FAT32 Win2k Pentium III 1GHz; lots of free disk
space & 2GB swapfile permanent.

Fully windows updated (SP4); office updated (SP3)

Thank you for any help



P.S.
This happens also on a second computer with nearly identical software
configuration. (Pentium 4 1.7Ghz)

DrWatson log:

Application exception occurred:
App: (pid=1868)
When: 02/10/2005 @ 10:55:00.098
Exception number: c0000005 (access violation)

*----> System Information <----*
Computer Name: PENTIUM6
User Name: Administrator
Number of Processors: 1
Processor Type: x86 Family 6 Model 8 Stepping 10
Windows 2000 Version: 5.0
Current Build: 2195
Service Pack: 4
Current Type: Uniprocessor Free
Registered Organization:
Registered Owner: ilan

*----> Task List <----*
0 Idle.exe
8 System.exe
172 smss.exe
200 csrss.exe
220 winlogon.exe
248 services.exe
260 lsass.exe
420 svchost.exe
448 spoolsv.exe
476 ccEvtMgr.exe
492 NISUM.exe
612 mainserv.exe
628 ccPxySvc.exe
648 svchost.exe
676 GHOSTS~2.exe
716 navapsvc.exe
772 NPROTECT.exe
872 regsvc.exe
908 MSTask.exe
932 nopdb.exe
1044 WinMgmt.exe
1108 mspmspsv.exe
1120 svchost.exe
1268 Explorer.exe
1312 SymTray.exe
1372 directcd.exe
1388 hpcdtray.exe
1396 MWProEng.exe
1416 qttask.exe
1444 hpoopm07.exe
1456 3cmlink.exe
1468 ccApp.exe
1360 3cshtdwn.exe
1504 3cmlink.exe
1536 internat.exe
1620 swdoctor.exe
1628 hpodev07.exe
1544 apcsystray.exe
640 hpoevm07.exe
1832 hpoipm07.exe
1164 HPOSTS07.exe
2000 HPOFXM07.exe
1004 msimn.exe
1868 WINWORD.exe
1036 drwtsn32.exe
0 _Total.exe

(30000000 - 30872000)
(77F80000 - 77FFC000)
(7C2D0000 - 7C335000)
(7C570000 - 7C623000)
(77D30000 - 77DA8000)
(77F40000 - 77F7F000)
(77E10000 - 77E79000)
(308C0000 - 30E1D000)
(7CE20000 - 7CF21000)
(7CF30000 - 7D186000)
(71710000 - 71794000)
(70A70000 - 70AD6000)
(78000000 - 78045000)
(77800000 - 7781E000)
(76620000 - 76631000)
(75E60000 - 75E7A000)
(6CA60000 - 6CA68000)
(66650000 - 666A4000)
(5A000000 - 5A018000)
(779B0000 - 77A4B000)
(00CC0000 - 00CD8000)
(6E420000 - 6E426000)
(745E0000 - 748A6000)
(38080000 - 380C2000)
(38880000 - 38895000)
(7C950000 - 7C9E0000)
(10000000 - 1000C000)
(76930000 - 7695B000)
(7C740000 - 7C7CC000)
(77430000 - 77441000)
(77920000 - 77943000)
(7CA00000 - 7CA23000)
(7C0F0000 - 7C154000)
(7C340000 - 7C34F000)
(7CDC0000 - 7CE13000)
(77980000 - 779A4000)
(75050000 - 75058000)
(75030000 - 75044000)
(75020000 - 75028000)
(751C0000 - 751C6000)
(77BF0000 - 77C01000)
(77950000 - 7797B000)
(75150000 - 75160000)
(7C700000 - 7C713000)
(690A0000 - 690AB000)
(75AB0000 - 75AB5000)
(4FF90000 - 4FFE4000)
(65000000 - 65264000)
(65300000 - 65327000)
(3F000000 - 3F012000)
(772B0000 - 7731C000)
(507C0000 - 50844000)
(04360000 - 04375000)
(04390000 - 043FB000)
(76B30000 - 76B6E000)
(75AC0000 - 75AE8000)
(50880000 - 50A59000)
(76DF0000 - 76E01000)
(051C0000 - 0530A000)
(76FA0000 - 76FAF000)
(773E0000 - 773F5000)
(75160000 - 7516C000)
(75210000 - 75225000)
(751D0000 - 75208000)
(76710000 - 76719000)

State Dump for Thread Id 0x840

eax=00000018 ebx=00000000 ecx=00000000 edx=00000001 esi=0012ee78
edi=00000001
eip=30151fa4 esp=0012edf4 ebp=0012ee04 iopl=0 nv up ei pl zr na
po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000
efl=00000246


function: <nosymbols>
30151f8a 51 push ecx
30151f8b 56 push esi
30151f8c 8d45f8 lea eax,[ebp+0xf8]
ss:012c8cea=????????
30151f8f 57 push edi
30151f90 50 push eax
30151f91 ff750c push dword ptr [ebp+0xc]
ss:012c8cea=????????
30151f94 ff7508 push dword ptr [ebp+0x8]
ss:012c8cea=????????
30151f97 e8f55afdff call 30127a91
30151f9c a178437d30 mov eax,[307d4378]
ds:307d4378=00000018
30151fa1 8b7514 mov esi,[ebp+0x14]
ss:012c8cea=????????
FAULT ->30151fa4 8b08 mov ecx,[eax]
ds:00000018=????????
30151fa6 a174437d30 mov eax,[307d4374]
ds:307d4374=00ed0744
30151fab 8b10 mov edx,[eax]
ds:00000018=????????
30151fad 8b81a6000000 mov eax,[ecx+0xa6]
ds:000000a6=????????
30151fb3 8b89aa000000 mov ecx,[ecx+0xaa]
ds:000000aa=????????
30151fb9 034220 add eax,[edx+0x20]
ds:01199ee7=????????
30151fbc 034a24 add ecx,[edx+0x24]
ds:01199ee7=????????
30151fbf 8b5510 mov edx,[ebp+0x10]
ss:012c8cea=????????
30151fc2 0345f8 add eax,[ebp+0xf8]
ss:012c8cea=????????
30151fc5 034dfc add ecx,[ebp+0xfc]
ss:012c8cea=????????
30151fc8 8b3a mov edi,[edx]
ds:00000001=????????
30151fca 2bf8 sub edi,eax

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0012EE04 3060B68C 00ED0744 FFFFFFFF 0012EE28 0012EE78 !<nosymbols>
0012EECC 650A6227 051B5E80 0012EF58 00000000 00000000
!wdGetApplicationObject
0012EFEC 779D7D5D 001328D0 00000000 00000000 0012EFF8 Vbe6!rtcDoEvents
0012F004 650C1285 00000000 001A8D62 00000004 00000000
oleaut32!DispCallFunc
0012F960 6505F975 00000000 001A8D24 60000000 00000001 Vbe6!rtcSendKeys
0012F994 305DC533 00218540 60000000 3013A8F8 00000000 Vbe6!rtcFreeFile
0012FA08 30D185FA 307B61F0 01F59D94 01F59D04 00000000
!wdCommandDispatch
0012FA44 30D11133 0012FD40 01F59D04 006F004E 006D0072 !MsoTouchCtlPIP
0012FC64 3096271C 30D84A64 01F59D04 01F59D08 0012FCD0 !MsoFFindBtnFace
0012FCC4 30902338 01F50010 00000001 30D6C098 01F59D04
!MsoFPitbsFromHwnd
0012FDB4 308F4246 01F505DC 00050280 00000202 00000000
!MsoFGetEnvelopeClsid
0012FE2C 77E4158F 00050280 00000202 00000000 000602B9 !MsoRegEnumKeyExW

0012FE4C 77E41DC9 308F3FB7 00050280 00000202 00000000
user32!GetTopWindow
0012FED8 77E27ED6 307D4780 00000001 3013C034 307D4780
user32!GetWindowLongW
307D4780 00000202 00000000 000602B9 0111F508 000002B9
user32!DispatchMessageA

*----> Raw Stack Dump <----*
0012edf4 01 00 00 00 fc 30 4b 02 - 00 00 00 00 00 00 00 00
......0K.........
0012ee04 cc ee 12 00 8c b6 60 30 - 44 07 ed 00 ff ff ff ff
.......`0D.......
0012ee14 28 ee 12 00 78 ee 12 00 - 90 00 00 00 15 5c eb 01
(...x........\..
0012ee24 05 00 00 00 e6 00 00 00 - 3e 01 00 00 62 02 00 00
.........>...b...
0012ee34 58 02 00 00 80 5e 1b 05 - 88 5e 1b 05 00 00 00 00
X....^...^......
0012ee44 7c 5e 1b 05 68 ee 12 00 - 88 5e 1b 05 00 00 00 00
|^..h....^......
0012ee54 48 78 0a 30 7c 5e 1b 05 - 68 5e 1b 05 5c ef 12 00
Hx.0|^..h^..\...
0012ee64 8c 03 b8 02 c4 ee 12 00 - dd a6 60 30 00 00 00 00
...........`0....
0012ee74 28 db 08 30 5c ef 12 00 - 10 61 0a 30 ff ff ff ff
(..0\....a.0....
0012ee84 68 5e 1b 05 8c 03 b8 02 - 30 00 00 00 00 00 00 00
h^......0.......
0012ee94 14 a6 60 30 18 5e 1b 05 - 00 00 00 00 00 00 00 00
...`0.^..........
0012eea4 0d 5c eb 01 fc 30 4b 02 - 02 00 00 00 00 00 00 00
..\...0K.........
0012eeb4 01 00 00 00 02 00 00 00 - 58 85 7c 03 01 00 00 00
.........X.|.....
0012eec4 44 07 ed 00 44 71 4b 02 - ec ef 12 00 27 62 0a 65
D...DqK.....'b.e
0012eed4 80 5e 1b 05 58 ef 12 00 - 00 00 00 00 00 00 00 00
..^..X...........
0012eee4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0012eef4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0012ef04 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0012ef14 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
0012ef24 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................

State Dump for Thread Id 0x72c

eax=77d4aefc ebx=00151440 ecx=0012e154 edx=00000000 esi=00151918
edi=00000100
eip=77f88b37 esp=0164fe28 ebp=0164ff74 iopl=0 nv up ei pl nz na
po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000
efl=00000206


function: ZwReplyWaitReceivePortEx
77f88b2c b8ac000000 mov eax,0xac
77f88b31 8d542404 lea edx,[esp+0x4]
ss:027e9d0f=????????
77f88b35 cd2e int 2e
77f88b37 c21400 ret 0x14
77f88b3a 8bff mov edi,edi

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0164FF74 77D4E0C0 77D4E003 00151918 77D4F701 00130000
ntdll!ZwReplyWaitReceivePortEx
0164FFA8 77D4AF16 00159D80 0164FFEC 7C57B388 00151440 rpcrt4!UuidCreate

0164FFB4 7C57B388 00151440 77D4F701 00130000 00151440
rpcrt4!RpcMgmtSetCancelTimeout
0164FFEC 00000000 00000000 00000000 00000000 00000000
kernel32!lstrcmpiW

State Dump for Thread Id 0x2c4

eax=7ce57f6f ebx=00000102 ecx=00000256 edx=00000000 esi=77f88398
edi=0174ff74
eip=77f883a3 esp=0174ff60 ebp=0174ff7c iopl=0 nv up ei pl nz na
po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000
efl=00000206


function: NtDelayExecution
77f88398 b832000000 mov eax,0x32
77f8839d 8d542404 lea edx,[esp+0x4]
ss:028e9e47=????????
77f883a1 cd2e int 2e
77f883a3 c20800 ret 0x8
77f883a6 8bff mov edi,edi

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0174FF7C 7C59A25A 0000EA60 00000000 7CE75D45 0000EA60
ntdll!NtDelayExecution
00007530 00000000 00000000 00000000 00000000 00000000 kernel32!Sleep

*----> Raw Stack Dump <----*
0174ff60 8f a2 59 7c 00 00 00 00 - 74 ff 74 01 bf 9f 59 7c
...Y|....t.t...Y|
0174ff70 d0 18 17 00 00 ba 3c dc - ff ff ff ff 30 75 00 00
.......<.....0u..
0174ff80 5a a2 59 7c 60 ea 00 00 - 00 00 00 00 45 5d e7 7c
Z.Y|`.......E].|
0174ff90 60 ea 00 00 2c 7f e5 7c - 00 00 00 00 00 00 e2 7c
`...,..|.......|
0174ffa0 d0 18 17 00 ec ff 74 01 - d0 18 17 00 8b 7f e5 7c
.......t........|
0174ffb0 26 37 e5 7c 89 b4 e6 7c - 88 b3 57 7c d0 18 17 00
&7.|...|..W|....
0174ffc0 26 37 e5 7c 89 b4 e6 7c - d0 18 17 00 00 c0 fd 7f
&7.|...|........
0174ffd0 56 02 00 00 c0 ff 74 01 - 56 02 00 00 ff ff ff ff
V.....t.V.......
0174ffe0 54 1f 5c 7c 08 2b 57 7c - 00 00 00 00 00 00 00 00
T.\|.+W|........
0174fff0 00 00 00 00 6f 7f e5 7c - d0 18 17 00 00 00 00 00
.....o..|........
01750000 c8 00 00 00 00 01 00 00 - ff ee ff ee 02 10 00 00
.................
01750010 00 00 00 00 00 fe 00 00 - 00 00 10 00 00 20 00 00
.............. ..
01750020 00 02 00 00 00 20 00 00 - 2f 02 00 00 ff ef fd 7f .....
.../.......
01750030 08 00 08 06 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
01750040 00 00 00 00 98 05 75 01 - 0f 00 00 00 f8 ff ff ff
.......u.........
01750050 50 00 75 01 50 00 75 01 - 40 06 75 01 00 00 00 00
[email protected].....
01750060 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
01750070 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
01750080 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
01750090 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................

State Dump for Thread Id 0x6ac

eax=000000c0 ebx=0000003f ecx=01aaef4c edx=00000000 esi=01aaebfc
edi=00000001
eip=77f88f03 esp=01aaebe4 ebp=01aaffb4 iopl=0 nv up ei pl zr na
po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000
efl=00000246


function: NtWaitForMultipleObjects
77f88ef8 b8e9000000 mov eax,0xe9
77f88efd 8d542404 lea edx,[esp+0x4]
ss:02c48acb=????????
77f88f01 cd2e int 2e
77f88f03 c21400 ret 0x14
77f88f06 8bff mov edi,edi

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
01AAFFB4 7C57B388 0012DC40 77FB7E64 77F812E8 0012DC40
ntdll!NtWaitForMultipleObjects
01AAFFEC 00000000 00000000 00000000 00000000 00000000
kernel32!lstrcmpiW

*----> Raw Stack Dump <----*
01aaebe4 f5 0f fa 77 14 00 00 00 - 18 ec aa 01 01 00 00 00
....w............
01aaebf4 01 00 00 00 00 00 00 00 - 08 09 fd 77 08 09 fd 77
............w...w
01aaec04 08 02 00 00 ac 06 00 00 - 14 00 00 00 14 00 00 00
.................
01aaec14 13 00 00 00 0c 02 00 00 - d4 01 00 00 44 02 00 00
.............D...
01aaec24 58 02 00 00 7c 02 00 00 - 90 02 00 00 a4 02 00 00
X...|...........
01aaec34 dc 02 00 00 e8 02 00 00 - f8 02 00 00 14 03 00 00
.................
01aaec44 24 03 00 00 38 03 00 00 - 4c 03 00 00 64 03 00 00
$...8...L...d...
01aaec54 74 03 00 00 88 03 00 00 - 9c 03 00 00 b4 03 00 00
t...............
01aaec64 c4 03 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
01aaec74 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
01aaec84 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
01aaec94 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
01aaeca4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
01aaecb4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
01aaecc4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
01aaecd4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
01aaece4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
01aaecf4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
01aaed04 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
.................
01aaed14 00 00 00 00 00 00 00 00 - 18 6c 1b 00 e8 ce 1f 00
..........l......

State Dump for Thread Id 0x578

eax=7c0f6a2c ebx=00000003 ecx=002e0076 edx=00000000 esi=77f88ef8
edi=00000003
eip=77f88f03 esp=01baff20 ebp=01baff6c iopl=0 nv up ei pl zr na
po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000
efl=00000246


function: NtWaitForMultipleObjects
77f88ef8 b8e9000000 mov eax,0xe9
77f88efd 8d542404 lea edx,[esp+0x4]
ss:02d49e07=????????
77f88f01 cd2e int 2e
77f88f03 c21400 ret 0x14
77f88f06 8bff mov edi,edi

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
01BAFF6C 7C59A10E 01BAFF44 00000001 00000000 00000000
ntdll!NtWaitForMultipleObjects
00000000 00000000 00000000 00000000 00000000 00000000
kernel32!WaitForMultipleObjects

State Dump for Thread Id 0x89c

eax=6504ce6c ebx=00000000 ecx=00000000 edx=00000000 esi=77f88398
edi=031aff90
eip=77f883a3 esp=031aff7c ebp=031aff98 iopl=0 nv up ei pl nz na
po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000
efl=00000206


function: NtDelayExecution
77f88398 b832000000 mov eax,0x32
77f8839d 8d542404 lea edx,[esp+0x4]
ss:04349e63=????????
77f883a1 cd2e int 2e
77f883a3 c20800 ret 0x8
77f883a6 8bff mov edi,edi

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
031AFF98 7C59A25A 000000C8 00000000 6504CE7C 000000C8
ntdll!NtDelayExecution
031AFFEC 00000000 00000000 00000000 00000000 00000000 kernel32!Sleep
 
M

Mike

Whenever I have to look at someone's computer with any of the
following symptoms : slow, crashes, strange error messages. I always

1) carryout a full virus scan,
2) load and run Spybot Search & Destroy,
(http://www.safer-networking.org/en/)
3) load and run CCleaner. (http://www.ccleaner.com/)
4) defrag the hard disc.

Its also possible Word does not like the JPG format of the images.
(edit them using Paint Shop Pro)

Regards

Mike
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top