If you use the Dr. Watson tool as the default debugger tool on the server, you may notice a call stack in the Drwtsn32.log file or in the User.dmp file. This call stack resembles the following call stack:
(1320.1324): Access violation - code c0000005 (first/second chance not available)
eax=8004010f ebx=8004010f ecx=00000000 edx=00000000 esi=000c2e30 edi=000004e4
eip=77e6b2ad esp=000afbb4 ebp=000afbc4 iopl=0 nv up ei pl zr na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00010246
kernel32!NlsStrLenW+0x4:
77e6b2ad 663908 cmp word ptr [eax],cx ds:0023:8004010f=????
0:000> kbL
ChildEBP RetAddr Args to Child
000afbb0 77e6b361 00000000 000afc14 77e6dc10 kernel32!NlsStrLenW+0x4
000afbc4 002a80ff 000004e4 00000000 8004010f kernel32!WideCharToMultiByte+0x227
000afbfc 1001ed98 8004010f 000004e4 0153806c lscps!String::putsW+0x31
000afc34 1001ef2e 8004010f 80040700 00000000 lsmexif!IsUnmappable+0x30
000afdb8 10026361 00d42ea0 1003715c 01537fc8 lsmexif!MEXMapExToProxy+0x14e
000afe40 10026b99 00d42ea0 00000001 016b3ef4 lsmexif!mapAllAddresses+0x321
000afe8c 10026ee2 00d42ea0 016b49d4 00000001 lsmexif!processOutboundMail+0x11f
000afec4 10026f7d 00000001 00000002 00000000 lsmexif!MEXOutProcessOutbound+0x9e
000afee8 0029f651 001063e0 00403150 00000000 lsmexif!MEXLSIHandleInQItem+0x6d
000aff08 00401d2b 001063e0 00000000 00000000 lscps!EventManager::process+0x53
000aff3c 00401eba 000affc0 0040250f 00000004 lsmexout!runApp+0x501
000aff44 0040250f 00000004 005f4de0 005f2978 lsmexout!main+0x19
000affc0 77e523cd 00000000 00000000 bd5d9000 lsmexout!mainCRTStartup+0x12f
000afff0 00000000 004023e0 00000000 78746341 kernel32!BaseProcessStart+0x23
eax=8004010f ebx=8004010f ecx=00000000 edx=00000000 esi=000c2e30 edi=000004e4
eip=77e6b2ad esp=000afbb4 ebp=000afbc4 iopl=0 nv up ei pl zr na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00010246
kernel32!NlsStrLenW+0x4:
77e6b2ad 663908 cmp word ptr [eax],cx ds:0023:8004010f=????
0:000> kbL
ChildEBP RetAddr Args to Child
000afbb0 77e6b361 00000000 000afc14 77e6dc10 kernel32!NlsStrLenW+0x4
000afbc4 002a80ff 000004e4 00000000 8004010f kernel32!WideCharToMultiByte+0x227
000afbfc 1001ed98 8004010f 000004e4 0153806c lscps!String::putsW+0x31
000afc34 1001ef2e 8004010f 80040700 00000000 lsmexif!IsUnmappable+0x30
000afdb8 10026361 00d42ea0 1003715c 01537fc8 lsmexif!MEXMapExToProxy+0x14e
000afe40 10026b99 00d42ea0 00000001 016b3ef4 lsmexif!mapAllAddresses+0x321
000afe8c 10026ee2 00d42ea0 016b49d4 00000001 lsmexif!processOutboundMail+0x11f
000afec4 10026f7d 00000001 00000002 00000000 lsmexif!MEXOutProcessOutbound+0x9e
000afee8 0029f651 001063e0 00403150 00000000 lsmexif!MEXLSIHandleInQItem+0x6d
000aff08 00401d2b 001063e0 00000000 00000000 lscps!EventManager::process+0x53
000aff3c 00401eba 000affc0 0040250f 00000004 lsmexout!runApp+0x501
000aff44 0040250f 00000004 005f4de0 005f2978 lsmexout!main+0x19
000affc0 77e523cd 00000000 00000000 bd5d9000 lsmexout!mainCRTStartup+0x12f
000afff0 00000000 004023e0 00000000 78746341 kernel32!BaseProcessStart+0x23