Details
-
Bug
-
Resolution: Incomplete
-
Trivial
-
None
-
None
-
None
Description
ReactOS 0.4.15-x86-dev DrWtsn32
Application exception occurred:
App: explorer.exe (pid=516, tid=0x25c)
When: 7/3/2023 @ 11:16:18.852
First chance: 0
Exception number: 0xc0000005 (EXCEPTION_ACCESS_VIOLATION)
Exception flags: 0x00000000
Exception address: 7AE20503
Exception parameters: 2
Parameter 0: 0x00000000
Parameter 1: 0x027A0DA8
---> System Information <---
Computer Name: REACTOS-R7NG6IJ
User Name: Administrator
BIOS Vendor: innotek GmbH
BIOS Version: VirtualBox
BIOS Date: 12/01/2006
System Manufacturer: innotek GmbH
System Family: Virtual Machine
System Model: VirtualBox
System Version: 1.2
Baseboard Manufacturer: Oracle Corporation
Baseboard Model: VirtualBox
Baseboard Version: 1.2
Number of Processors: 1
Processor Type: x86 Family 23 Model 104 Stepping 1
ReactOS Version: 5.2
BuildLab: 20230306-unknown-revision.GNU_8.4.0
Service Pack: Service Pack 3
Current Type: Uniprocessor Checked
Registered Organization:
Registered Owner: Besitzer
---> Task List <---
0: [System Process]
4: System
116: smss.exe
164: csrss.exe
184: winlogon.exe
208: services.exe
216: lsass.exe
252: VBoxService.exe
268: svchost.exe
284: eventlog.exe
428: rpcss.exe
492: svchost.exe
516: explorer.exe
548: svchost.exe
568: wlansvc.exe
648: spoolsv.exe
676: audiosrv.exe
792: VBoxTray.exe
800: kbswitch.exe
1780: CCleaner.exe
1844: iexplore.exe
1024: notepad.exe
1160: drwtsn32.exe
---> Module List <---
(00000000 - 001A0000) C:\ReactOS\explorer.exe
(005A0000 - 0069F000) C:\ReactOS\system32\comdlg32.dll
(01250000 - 01263000) C:\Programme\7-Zip\7-zip.dll
(10000000 - 10050000) C:\ReactOS\System32\VBoxMRXNP.dll
(6F200000 - 6F32E000) C:\ReactOS\System32\zipfldr.dll
(6FC00000 - 6FDAA000) C:\ReactOS\System32\wdmaud.drv
(707E0000 - 7085F000) C:\ReactOS\System32\stobject.dll
(70A60000 - 70C6F000) C:\ReactOS\System32\shellbtrfs.dll
(70CA0000 - 70CD9000) C:\ReactOS\System32\shdocvw.dll
(71D00000 - 71D0C000) C:\ReactOS\system32\ntdll_vista.dll
(71D80000 - 71D96000) C:\ReactOS\System32\nfs41_np.dll
(71E10000 - 71EBD000) C:\ReactOS\System32\netshell.dll
(72B40000 - 72B60000) C:\ReactOS\System32\msrle32.dll
(73490000 - 734AD000) C:\ReactOS\System32\msacm32.drv
(736F0000 - 73707000) C:\ReactOS\System32\midimap.dll
(73AA0000 - 73AB6000) C:\ReactOS\System32\lpk.dll
(742F0000 - 74300000) C:\ReactOS\System32\ksuser.dll
(74320000 - 7432B000) C:\ReactOS\system32\kernel32_vista.dll
(77A20000 - 77BA9000) C:\ReactOS\system32\user32.dll
(78970000 - 78B44000) C:\ReactOS\System32\browseui.dll
(78B90000 - 78BA1000) C:\ReactOS\System32\beepmidi.dll
(78E50000 - 78E84000) C:\ReactOS\system32\apphelp.dll
(78F40000 - 78F4E000) C:\ReactOS\system32\advapi32_vista.dll
(78F60000 - 791FD000) C:\ReactOS\System32\actxprxy.dll
(79260000 - 792AF000) C:\ReactOS\System32\acppage.dll
(79420000 - 7948B000) C:\ReactOS\system32\usp10.dll
(79560000 - 79570000) C:\ReactOS\System32\sfc_os.dll
(79C00000 - 79C4C000) C:\ReactOS\System32\uxtheme.dll
(79C70000 - 79CAE000) C:\ReactOS\System32\userenv.DLL
(7A220000 - 7A23B000) C:\ReactOS\System32\powrprof.dll
(7A2F0000 - 7A321000) C:\ReactOS\System32\msacm32.dll
(7A4F0000 - 7A525000) C:\ReactOS\System32\msvfw32.dll
(7A540000 - 7A58F000) C:\ReactOS\system32\imm32.dll
(7A590000 - 7A5A6000) C:\ReactOS\system32\psapi.dll
(7A900000 - 7A930000) C:\ReactOS\system32\mpr.dll
(7A950000 - 7AABC000) C:\ReactOS\system32\setupapi.dll
(7AAE0000 - 7ACC9000) C:\ReactOS\system32\oleaut32.dll
(7AD00000 - 7AD1D000) C:\ReactOS\system32\version.dll
(7AD60000 - 7B75A000) C:\ReactOS\system32\shell32.dll
(7B840000 - 7B8E6000) C:\ReactOS\System32\winmm.dll
(7B900000 - 7B95D000) C:\ReactOS\system32\winspool.drv
(7BA30000 - 7BC48000) C:\ReactOS\system32\ole32.dll
(7BC80000 - 7BE72000) C:\ReactOS\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.2600.2982_none_deadbeef\comctl32.dll
(7BEB0000 - 7BF81000) C:\ReactOS\system32\rpcrt4.dll
(7BFA0000 - 7C042000) C:\ReactOS\system32\shlwapi.dll
(7C060000 - 7C073000) C:\ReactOS\system32\ws2help.dll
(7C090000 - 7C0C7000) C:\ReactOS\system32\ws2_32.dll
(7C0E0000 - 7C118000) C:\ReactOS\System32\iphlpapi.dll
(7C1C0000 - 7C1FF000) C:\ReactOS\System32\dhcpcsvc.dll
(7C210000 - 7C2A7000) C:\ReactOS\system32\gdi32.dll
(7C470000 - 7C519000) C:\ReactOS\system32\advapi32.dll
(7C530000 - 7C5F2000) C:\ReactOS\system32\msvcrt.dll
(7C620000 - 7C8FD000) C:\ReactOS\system32\kernel32.dll
(7C920000 - 7CA4D000) C:\ReactOS\System32\ntdll.dll
State Dump for Thread Id 0x25c (CRASH)
eax:0000AE10 ebx:00000000 ecx:027A0DA8 edx:00004830 esi:02795F98 edi:04A1F37C
eip:7AE20503 esp:04A1F294 ebp:04A1F2BC
dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000
---> Stack Back Trace <---
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
04A1F2BC 7AE20503 02795F98 7AE21476 02795F98 02EFBF68 shell32!ILGetSize +0x2a
04A1F2F4 7AE20583 02795F98 02E1CEF0 04A1F324 77A5518E shell32!ILClone +0x1c
04A1F344 7AE21652 02795F98 789DF320 04A1F38C 04A1F37C shell32!SHBindToParent +0x14d
04A1F5C4 789AC3A3 02053F20 02795F98 04A1F5E8 00000003 browseui!CShellBrowser::BrowseToPath +0x639
04A1F604 789AC5E6 02795F98 00000003 02EFBF38 80004001 browseui!CShellBrowser::BrowseToPIDL +0x4a
04A1F61C 789AC823 02E1CEC0 02795F98 00000000 02795F98 browseui!CShellBrowser::BrowseObject +0x27
04A1F65C 7898AAE1 02EFBF38 00000000 04A1F694 789B8BD6 browseui!CAddressEditBox::Execute +0xd3
04A1F66C 789880A2 00000000 04A1FC34 04A1F688 00000000 browseui!CAddressBand::OnNotifyClick +0x26
04A1F694 789B8BD6 00180190 0000004E 00000000 04A1FC34 browseui!CAddressBand::ProcessWindowMessage +0xa7
04A1F6F4 789C2F08 002B8EB0 0000004E 00000000 04A1FC34 browseui!CWindowImplBaseT<ATL::CWindow, ATL::CWinTraits<1442840576, 0> >::WindowProc +0x7c
04A1F724 77A8ABDE 018F0000 00180190 0000004E 00000000 user32!CALL_EXTERN_WNDPROC +0x1a
04A1F894 77A7EECC 00368440 00180190 0000004E 00000000 user32!IntCallWindowProcW +0x1857
04A1F8C4 77A7F476 018F0000 00180190 0000004E 00000000 user32!CallWindowProcW +0x51
04A1F91C 789C31FF 02EFBF80 0000004E 00000000 04A1FC34 browseui!CContainedWindowT<ATL::CWindow, ATL::CWinTraits<1442840576, 0> >::WindowProc +0xb7
04A1F94C 77A8ABDE 01B70000 00180190 0000004E 00000000 user32!CALL_EXTERN_WNDPROC +0x1a
04A1FABC 77A7EECC 00368440 00180190 0000004E 00000000 user32!IntCallWindowProcW +0x1857
04A1FB0C 77A7F2E6 00368440 00180190 0000004E 00000000 user32!IntCallMessageProc +0x22d
04A1FB84 77A7FEDF 00180190 0000004E 00000000 04A1FC34 user32!SendMessageW +0x150
04A1FBC4 7BD09DDE 000E0328 04A1FC14 00000001 000E0328 comctl32!TOOLBAR_SendNotify +0xce
04A1FCD4 7BD1510F 000E0328 00000202 00000000 00150044 comctl32!ToolbarWindowProc +0x2a7d
04A1FCF4 7BD16160 000E0328 00000202 00000000 00150044 comctl32!ToolbarV6WindowProc +0x2f
04A1FD24 77A8ABDE 7BD16131 000E0328 00000202 00000000 user32!CALL_EXTERN_WNDPROC +0x1a
04A1FE94 77A7EECC 0036D710 000E0328 00000202 00000000 user32!IntCallWindowProcW +0x1857
04A1FEE4 77A7F2E6 0036D710 000E0328 00000202 00000000 user32!IntCallMessageProc +0x22d
04A1FF4C 77A7FA57 04A1FF78 04A1FF78 00000000 00000000 user32!DispatchMessageW +0x24d
04A1FFA4 7899C496 002CFEE8 00000000 FFFFFFFF 7C673917 browseui!BrowserThreadProc +0x18e
04A1FFEC 7C63C920 7899C2FC 002CFEE8 00000000 00000000 kernel32!BaseThreadStartup +0x47
---> Raw Stack Dump <---
04A1FFF4 fc c2 99 78 e8 fe 2c 00 - 00 00 00 00 00 00 00 00 ...x..,.........
04A20004 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
04A20014 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
04A20024 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
04A20034 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
04A20044 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
04A20054 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
04A20064 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
04A20074 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
04A20084 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
State Dump for Thread Id 0x20c
eax:000011CB ebx:0000007F ecx:8009C000 edx:00000000 esi:00000001 edi:002001AC
eip:7C92F48A esp:0022F5B8 ebp:0022F638
dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000
---> Stack Back Trace <---
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0022F638 7C92F48A 002001AC 0000007F 00000002 00000000 ntdll!KiFastSystemCallRet +0x0
0022F8A0 0042A458 020B5AE4 00000000 00000000 00000000 explorer!_ZN14CTaskSwitchWnd20UpdateTaskItemButtonEP10_TASK_ITEM +0x104
0022F930 0042999F 000200D0 0000C01D 00000004 00000000 explorer!CTaskSwitchWnd::ProcessWindowMessage +0x238b
0022F990 00432476 00277FE0 0000C01D 00000004 002001AC explorer!CWindowImplBaseT<ATL::CWindow, ATL::CWinTraits<1442840576, 0> >::WindowProc +0x82
0022F9C0 77A8ABDE 00AA0000 000200D0 0000C01D 00000004 user32!CALL_EXTERN_WNDPROC +0x1a
0022FB30 77A7EECC 00363B20 000200D0 0000C01D 00000004 user32!IntCallWindowProcW +0x1857
0022FB80 77A7F2E6 00363B20 000200D0 0000C01D 00000004 user32!IntCallMessageProc +0x22d
0022FBE8 77A7FA57 0022FC04 0022FC04 00000000 00000000 user32!DispatchMessageW +0x24d
0022FC28 00413AD7 002726DC 0043CAEC 00447074 7C944A19 explorer!TrayMessageLoop +0x1f
0022FE58 004028FB 00000003 0043B018 0043CA2B 0043CF18 explorer!StartWithDesktop +0x109
0022FED0 00402AF7 00400000 00000000 00238C86 00000001 explorer!wWinMain +0xf7
0022FEE8 00416E69 00000001 0023A898 00237FE0 00000000 explorer!wmain +0x2d
0022FF98 00416383 0022FFF0 7C631AF6 FFFFFFFE 00000009 explorer!__tmainCRTStartup +0x30e
0022FFA0 004163D8 FFFFFFFE 00000009 0022FFF8 00000004 explorer!wWinMainCRTStartup +0x17
0022FFF0 7C631AF6 004163C1 00000000 75010175 00000000 kernel32!BaseProcessStartup +0x47
---> Raw Stack Dump <---
0022FFF8 c1 63 41 00 00 00 00 00 - 75 01 01 75 00 00 00 00 .cA.....u..u....
00230008 ee ff ee ff 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00230018 00 00 23 00 00 00 23 00 - 00 01 00 00 a8 0b 23 00 ..#...#.......#.
00230028 00 00 33 00 13 00 00 00 - 13 00 00 00 00 00 00 00 ..3.............
00230038 a8 06 91 01 f0 7b 91 01 - 02 00 00 00 00 00 00 00 .....{..........
00230048 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00230058 00 00 00 00 00 00 00 00 - 00 fe 00 00 ff ee ef 0e ................
00230068 00 00 00 02 00 20 00 00 - 00 02 00 00 00 20 00 00 ..... ....... ..
00230078 10 ed 09 00 ff ef fd 7f - 01 00 a8 0b 00 00 00 00 ................
00230088 00 00 00 00 00 00 00 00 - c0 86 91 01 d8 8f 91 01 ................
State Dump for Thread Id 0x2ac
eax:00000119 ebx:7C966BCF ecx:8009C000 edx:00000000 esi:00000000 edi:00000200
eip:7C92F48A esp:0481FC7C ebp:0481FCDC
dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000
---> Stack Back Trace <---
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0481FCDC 7C92F48A 00000200 FFFFFFFF 00000000 0000000E ntdll!KiFastSystemCallRet +0x0
0481FCF4 7C636B06 00000200 FFFFFFFF 00000000 00000000 kernel32!WaitForSingleObject +0x20
0481FD3C 7BEE9901 002ACFF0 0481FD7C 00000010 7C9467CD rpcrt4!rpcrt4_conn_np_read +0xc9
0481FD9C 7BEDB041 002ACFF0 7C97D578 002F3F98 0149F564 rpcrt4!RPCRT4_receive_fragment +0x61
0481FE0C 7BEDB394 002ACFF0 0481FE38 0149F564 00000000 rpcrt4!RPCRT4_ReceiveWithAuth +0x6e
0481FE4C 7BEDC1EB 0149F564 02D69000 02D69970 01000000 rpcrt4!I_RpcReceive +0x67
0481FE84 7BEDC693 0149F564 0481FEB4 00000000 0481FEBC rpcrt4!I_RpcSendReceive +0x77
0481FEB4 7BA7302B 00296FC4 00000000 02D69978 00000000 ole32!rpc_sendreceive_thread +0x14
0481FF24 7C964884 00000000 00000000 02D69978 0481FF80 ntdll!RtlpExecuteWorkItem +0xac
0481FFA4 7C96416D 0149F3D8 00000000 FFFFFFFF 7C673917 ntdll!RtlpWorkerThreadProc +0xa5
0481FFEC 7C63C920 7C9640C8 0149F3D8 00000000 00000000 kernel32!BaseThreadStartup +0x47
State Dump for Thread Id 0x2d0
eax:000000C6 ebx:00000102 ecx:8009C000 edx:00000000 esi:0461FF80 edi:0461FF8C
eip:7C92F48A esp:0461FF24 ebp:0461FFA4
dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000
---> Stack Back Trace <---
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0461FFA4 7C92F48A 0149F418 00000000 FFFFFFFF 7C673917 ntdll!KiFastSystemCallRet +0x0
0461FFEC 7C63C920 7C9640C8 0149F418 00000000 00000000 kernel32!BaseThreadStartup +0x47
State Dump for Thread Id 0x2d8
eax:000000C6 ebx:00000102 ecx:8009C000 edx:00000000 esi:0441FF80 edi:0441FF8C
eip:7C92F48A esp:0441FF24 ebp:0441FFA4
dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000
---> Stack Back Trace <---
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0441FFA4 7C92F48A 0149F418 00000000 FFFFFFFF 7C673917 ntdll!KiFastSystemCallRet +0x0
0441FFEC 7C63C920 7C9640C8 0149F418 00000000 00000000 kernel32!BaseThreadStartup +0x47
State Dump for Thread Id 0x2e4
eax:00000118 ebx:7C966BC0 ecx:8009C000 edx:00000000 esi:00D1FB3C edi:00000008
eip:7C92F48A esp:00D1FAEC ebp:00D1FB74
dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000
---> Stack Back Trace <---
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
00D1FB74 7C92F48A 00000008 002CFD80 00000000 FFFFFFFF ntdll!KiFastSystemCallRet +0x0
00D1FB94 7C636D59 00000008 002CFD80 00000000 FFFFFFFF kernel32!WaitForMultipleObjects +0x2e
00D1FFA4 0040AEF2 00279738 00000000 FFFFFFFF 7C673917 explorer!CIconWatcher::WatcherThread +0xa6
00D1FFEC 7C63C920 0040AE40 00279738 00000000 4E9F000D kernel32!BaseThreadStartup +0x47
---> Raw Stack Dump <---
00D1FFF4 40 ae 40 00 38 97 27 00 - 00 00 00 00 0d 00 9f 4e @.@.8.'........N
00D20004 01 00 3f 00 3f 00 3f 00 - 3f 00 00 00 00 00 00 00 ..?.?.?.?.......
00D20014 00 00 00 00 00 00 03 01 - 00 00 01 00 02 00 03 00 ................
00D20024 04 00 05 00 06 00 07 00 - 08 00 09 00 0a 00 0b 00 ................
00D20034 0c 00 0d 00 0e 00 0f 00 - 10 00 11 00 12 00 13 00 ................
00D20044 14 00 15 00 16 00 17 00 - 18 00 19 00 1a 00 1b 00 ................
00D20054 1c 00 1d 00 1e 00 1f 00 - 20 00 21 00 22 00 23 00 ........ .!.".#.
00D20064 24 00 25 00 26 00 27 00 - 28 00 29 00 2a 00 2b 00 $.%.&.'.(.).*.+.
00D20074 2c 00 2d 00 2e 00 2f 00 - 30 00 31 00 32 00 33 00 ,.-.../.0.1.2.3.
00D20084 34 00 35 00 36 00 37 00 - 38 00 39 00 3a 00 3b 00 4.5.6.7.8.9.:.;.
State Dump for Thread Id 0x308
eax:000011CB ebx:000700B2 ecx:8009C000 edx:00000000 esi:0000004A edi:B0EEFE10
eip:7C92F48A esp:0118ECAC ebp:0118ED24
dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000
---> Stack Back Trace <---
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0118ED24 7C92F48A 000700B2 0000004A 00020108 0118ED54 ntdll!KiFastSystemCallRet +0x0
0118F134 7ADF6993 00000001 0118F164 000700B2 0000004A shell32!Shell_NotifyIconW +0x101
0118F88C 71E18611 00000000 00290D78 00000000 00000000 netshell!UpdateLanStatus +0x4d5
0118F8AC 71E18DF5 00020108 00000113 0000FABC 00000000 netshell!LANStatusDlg +0xa9
0118F8DC 77A8ABDE 71E18D42 00020108 00000113 0000FABC user32!CALL_EXTERN_WNDPROC +0x1a
0118FA4C 77A7EF2C 003651B8 00020108 00000113 0000FABC user32!IntCallWindowProcW +0x18b7
0118FA7C 77A7F476 71E18D42 00020108 00000113 0000FABC user32!CallWindowProcW +0x51
0118FAAC 77A67E72 00020108 00000113 0000FABC 00000000 user32!DefDlgProcW +0x7e
0118FADC 77A8ABDE 77A67DF4 00020108 00000113 0000FABC user32!CALL_EXTERN_WNDPROC +0x1a
0118FC4C 77A7EF2C 003651B8 00020108 00000113 0000FABC user32!IntCallWindowProcW +0x18b7
0118FC9C 77A7F2E6 003651B8 00020108 00000113 0000FABC user32!IntCallMessageProc +0x22d
0118FD04 77A7FA57 0118FD20 00000000 00000000 00000000 user32!DispatchMessageW +0x24d
0118FD44 707E1A0A 00000188 0000C09A 00000000 86400000 stobject!CSysTray::SysTrayMessageLoop +0x3d
0118FF9C 707E1C12 0118FFEC 7C63C920 0027B0B8 00000000 stobject!CSysTray::SysTrayThreadProc +0x1ea
0118FFA4 707E1C41 0027B0B8 00000000 FFFFFFFF 7C673917 stobject!CSysTray::s_SysTrayThreadProc +0x8
0118FFEC 7C63C920 707E1C36 0027B0B8 00000000 00000010 kernel32!BaseThreadStartup +0x47
---> Raw Stack Dump <---
0118FFF4 36 1c 7e 70 b8 b0 27 00 - 00 00 00 00 10 00 00 00 6.~p..'.........
01190004 03 00 00 00 01 00 00 00 - 01 00 00 00 10 00 00 00 ................
01190014 10 00 00 00 10 00 00 00 - 01 00 00 00 00 00 00 00 ................
01190024 00 00 00 00 00 00 00 00 - 00 00 00 00 10 00 00 00 ................
01190034 02 00 00 00 00 00 00 00 - 00 00 00 00 80 07 00 00 ................
01190044 9e 03 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
01190054 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
01190064 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
01190074 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
01190084 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
State Dump for Thread Id 0x30c
eax:00000118 ebx:7C966BC0 ecx:8009C000 edx:00000000 esi:0149F31C edi:00000002
eip:7C92F48A esp:0149F2CC ebp:0149F354
dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000
---> Stack Back Trace <---
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0149F354 7C92F48A 00000002 01FD9A48 00000000 FFFFFFFF ntdll!KiFastSystemCallRet +0x0
0149F38C 77A7D180 00000001 00296FE4 FFFFFFFF 00000160 user32!RealMsgWaitForMultipleObjectsEx +0x100
0149F3AC 77A811D8 00000001 00296FE4 FFFFFFFF 00000160 user32!MsgWaitForMultipleObjectsEx +0x65
0149F43C 7BA45B43 00000000 FFFFFFFF 00000001 00296FE4 ole32!CoWaitForMultipleHandles +0x116
0149F4B4 7BA751B4 002E47E0 0149F564 0149F4E0 00000000 ole32!ClientRpcChannelBuffer_SendReceive +0x4a6
0149F4EC 7BEB1E8A 0318A814 0149F594 7BB00E4C 7BAFFDA0 rpcrt4!NdrProxySendReceive +0x57
0149F684 7BAC6C01 0318A814 0149F904 0149F8F8 7AE3641E ole32!IDataObject_RemoteGetData_Proxy +0x100
0149F6C4 7BA96020 0318A814 0149F904 0149F8F8 7AE7DA70 ole32!IDataObject_GetData_Proxy +0x2b
0149F93C 7ADCEE8A 02F2EFC8 0318A814 00000001 0000011B shell32!CFSDropTarget::DragEnter +0x16d
0149F9A4 7ADF18BD 00000001 0000011B 000002AB 002EB234 shell32!CDefView::drag_notify_subitem +0x2c4
0149F9E4 7ADF1D28 0028EC38 0318A814 00000001 0000011B shell32!CDefView::DragEnter +0x56
0149FA0C 7BA68763 00294C20 0318A814 00000001 0000011B ole32!DropTargetWrapper_DragEnter +0x5d
0149FB6C 7BAD9566 0028FF90 0028E360 002DEE38 0149FBD0 ole32!IDropTarget_DragEnter_Stub +0x1d5
0149FBE4 7BEB3B38 0028FF90 002DEE38 0028E360 7AE5299C rpcrt4!CStdStubBuffer_Invoke +0xdc
0149FC9C 7BA75EAC 002CC868 77A7EEEF 7BCD4B5E 000200FE ole32!RPC_ExecuteCall +0x33b
0149FCB4 7BA3E890 000200FC 00000400 00000000 002CC868 ole32!apartment_wndproc +0x44
0149FCE4 77A8ABDE 7BA3E84C 000200FC 00000400 00000000 user32!CALL_EXTERN_WNDPROC +0x1a
0149FE54 77A7EECC 00364D30 000200FC 00000400 00000000 user32!IntCallWindowProcW +0x1857
0149FEA4 77A7F2E6 00364D30 000200FC 00000400 00000000 user32!IntCallMessageProc +0x22d
0149FF0C 77A7FA57 0149FF30 0149FF30 00000000 00000000 user32!DispatchMessageW +0x24d
0149FF54 7AD77739 00294BC1 000000C9 0149FF9C 0040213D shell32!SHDesktopMessageLoop +0x84
0149FF64 004035F1 00294BC1 00445098 0149FF88 00000000 explorer!_SHDesktopMessageLoop +0x6f
0149FF9C 0040213D 0149FFEC 7C63C920 00297FB8 00000000 explorer!CDesktopThread::DesktopThreadProc +0x120
0149FFA4 00402153 00297FB8 00000000 FFFFFFFF 7C673917 explorer!CDesktopThread::s_DesktopThreadProc +0x8
0149FFEC 7C63C920 00402148 00297FB8 00000000 00000000 kernel32!BaseThreadStartup +0x47
State Dump for Thread Id 0x310
eax:00000118 ebx:7C966BC0 ecx:8009C000 edx:00000000 esi:0169FEEC edi:00000006
eip:7C92F48A esp:0169FE9C ebp:0169FF24
dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000
---> Stack Back Trace <---
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0169FF24 7C92F48A 00000006 002B7520 00000000 FFFFFFFF ntdll!KiFastSystemCallRet +0x0
0169FF5C 7BEEBB13 00294EF8 00000006 002B7520 00000000 rpcrt4!rpcrt4_protseq_np_wait_for_new_connection +0x3b
0169FFA4 7BEDF556 00294EF8 00000000 FFFFFFFF 7C673917 rpcrt4!RPCRT4_server_thread +0x25f
0169FFEC 7C63C920 7BEDF2F7 00294EF8 00000000 00000000 kernel32!BaseThreadStartup +0x47
State Dump for Thread Id 0x314
eax:000011CB ebx:00030110 ecx:8009C000 edx:00000000 esi:00000403 edi:B0CEC758
eip:7C92F48A esp:0189EFD4 ebp:0189F04C
dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000
---> Stack Back Trace <---
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0189F04C 7C92F48A 00030110 00000403 0000041C 00000204 ntdll!KiFastSystemCallRet +0x0
0189F0AC 7AD7EC86 00000000 000DF333 002DB220 000001BB shell32!CreateNotificationParamAndSend +0x16c
0189F58C 7AD7FDD6 80000002 00001005 0189F7BC 00000000 shell32!SHChangeNotify +0x575
0189FBDC 7AD782BF 0030A928 0189FF24 7C673917 0189FBE8 shell32!CDirectoryWatcher::ProcessNotification +0x455
0189FC04 7AD78571 00000000 0000004C 0189FC24 7C9433C1 shell32!CDirectoryWatcher::ReadCompletion +0x14d
0189FC24 7AD7859B 00000000 0000004C 00293EFC 7C966BCF shell32!_NotificationCompletion +0x1e
0189FC44 7C6482D3 7AD78576 00293EFC 00000000 00010017 kernel32!BasepIoCompletionSimple +0x2f
0189FF8C 7C92F36A FFFFFFFE FFFFFFFF 00000001 00000000 ntdll!KiUserApcDispatcher +0x25
0189FFA4 7AD77B9A 00000000 00000000 FFFFFFFF 7C673917 shell32!DirectoryWatcherThreadFuncAPC +0x23
0189FFEC 7C63C920 7AD77B6E 00000000 00000000 042444C7 kernel32!BaseThreadStartup +0x47
---> Raw Stack Dump <---
0189FFF4 6e 7b d7 7a 00 00 00 00 - 00 00 00 00 c7 44 24 04 n{.z.........D$.
018A0004 4c cf e1 02 e9 73 2e 12 - 77 00 00 00 00 00 00 00 L....s..w.......
018A0014 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
018A0024 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
018A0034 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
018A0044 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
018A0054 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
018A0064 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
018A0074 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
018A0084 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
State Dump for Thread Id 0x358
eax:00000119 ebx:7C966BCF ecx:8009C000 edx:00000000 esi:00000000 edi:0000026C
eip:7C92F48A esp:0421FCFC ebp:0421FD5C
dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000
---> Stack Back Trace <---
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0421FD5C 7C92F48A 0000026C FFFFFFFF 00000000 00000000 ntdll!KiFastSystemCallRet +0x0
0421FD74 7C636B06 0000026C FFFFFFFF 00000000 002CC868 kernel32!WaitForSingleObject +0x20
0421FDD4 7BA7691C 002DEE38 002D5BF8 00000004 00000004 ole32!dispatch_rpc +0x3e8
0421FE6C 7BEDFE78 0421FF54 7C97250B 0421FE74 7C97D578 rpcrt4!process_request_packet +0x35b
0421FEB4 7BEE0FB5 002CA3E0 00000000 02008450 00000000 rpcrt4!RPCRT4_worker_thread +0x188
0421FF24 7C964884 00000000 00000000 02008450 0421FF80 ntdll!RtlpExecuteWorkItem +0xac
0421FFA4 7C96416D 0401FEF8 00000000 FFFFFFFF 7C673917 ntdll!RtlpWorkerThreadProc +0xa5
0421FFEC 7C63C920 7C9640C8 0401FEF8 00000000 00000000 kernel32!BaseThreadStartup +0x47
State Dump for Thread Id 0x36c
eax:00000119 ebx:7C966BCF ecx:8009C000 edx:00000000 esi:00000000 edi:00000230
eip:7C92F48A esp:0401FDCC ebp:0401FE2C
dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000
---> Stack Back Trace <---
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0401FE2C 7C92F48A 00000230 FFFFFFFF 00000000 00000000 ntdll!KiFastSystemCallRet +0x0
0401FE44 7C636B06 00000230 FFFFFFFF 00000000 00000000 kernel32!WaitForSingleObject +0x20
0401FE8C 7BEE9901 02690EE8 0401FECC 00000010 00000007 rpcrt4!rpcrt4_conn_np_read +0xc9
0401FEEC 7BEDB041 02690EE8 00000001 FFFFD8F0 FFFFFFFF rpcrt4!RPCRT4_receive_fragment +0x61
0401FF5C 7BEDB394 02690EE8 0401FF90 002B9758 0401FF8C rpcrt4!RPCRT4_ReceiveWithAuth +0x6e
0401FFA4 7BEE0AAF 02690EE8 00000000 FFFFFFFF 7C673917 rpcrt4!RPCRT4_io_thread +0x19b
0401FFEC 7C63C920 7BEE0914 02690EE8 00000000 00000000 kernel32!BaseThreadStartup +0x47
State Dump for Thread Id 0x370
eax:000000C6 ebx:00000102 ecx:8009C000 edx:00000000 esi:01EBFF80 edi:01EBFF8C
eip:7C92F48A esp:01EBFF24 ebp:01EBFFA4
dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000
---> Stack Back Trace <---
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
01EBFFA4 7C92F48A 01B2FEF8 00000000 FFFFFFFF 7C673917 ntdll!KiFastSystemCallRet +0x0
01EBFFEC 7C63C920 7C9640C8 01B2FEF8 00000000 00000000 kernel32!BaseThreadStartup +0x47
State Dump for Thread Id 0x374
eax:00000119 ebx:7C966BCF ecx:8009C000 edx:00000000 esi:00000000 edi:000002BC
eip:7C92F48A esp:01B2FDCC ebp:01B2FE2C
dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000
---> Stack Back Trace <---
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
01B2FE2C 7C92F48A 000002BC FFFFFFFF 00000000 00000000 ntdll!KiFastSystemCallRet +0x0
01B2FE44 7C636B06 000002BC FFFFFFFF 00000000 00000000 kernel32!WaitForSingleObject +0x20
01B2FE8C 7BEE9901 0256BF50 01B2FECC 00000010 00000007 rpcrt4!rpcrt4_conn_np_read +0xc9
01B2FEEC 7BEDB041 0256BF50 00000001 FFFFD8F0 FFFFFFFF rpcrt4!RPCRT4_receive_fragment +0x61
01B2FF5C 7BEDB394 0256BF50 01B2FF90 002BFF08 01B2FF8C rpcrt4!RPCRT4_ReceiveWithAuth +0x6e
01B2FFA4 7BEE0AAF 0256BF50 00000000 FFFFFFFF 7C673917 rpcrt4!RPCRT4_io_thread +0x19b
01B2FFEC 7C63C920 7BEE0914 0256BF50 00000000 00000000 kernel32!BaseThreadStartup +0x47
---> Raw Stack Dump <---
01B2FFF4 14 09 ee 7b 50 bf 56 02 - 00 00 00 00 00 00 00 00 ...{P.V.........
01B30004 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
01B30014 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
01B30024 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
01B30034 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
01B30044 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
01B30054 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
01B30064 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
01B30074 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
01B30084 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
State Dump for Thread Id 0x41c
eax:7FFDD000 ebx:00000001 ecx:00000002 edx:00000003 esi:00000004 edi:00000005
eip:7C965663 esp:01C0FFE8 ebp:01C0FFF4
dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000
---> Stack Back Trace <---
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
01C0FFF4 7C965663 00000000 042444C7 02020350 66024BE9 ntdll!DbgBreakPoint +0x1
---> Raw Stack Dump <---
01C0FFFC 00 00 00 00 c7 44 24 04 - 50 03 02 02 e9 4b 02 66 .....D$.P....K.f
01C1000C 77 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 w...............
01C1001C 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
01C1002C 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
01C1003C 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
01C1004C 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
01C1005C 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
01C1006C 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
01C1007C 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
01C1008C 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................