Uploaded image for project: 'Core ReactOS'
  1. Core ReactOS
  2. CORE-18864

Explorer crashes

    XMLWordPrintable

Details

    • Bug
    • Resolution: Incomplete
    • Trivial
    • None
    • None
    • None

    Description

      ReactOS 0.4.15-x86-dev DrWtsn32

      Application exception occurred:
      App: explorer.exe (pid=516, tid=0x25c)
      When: 7/3/2023 @ 11:16:18.852
      First chance: 0
      Exception number: 0xc0000005 (EXCEPTION_ACCESS_VIOLATION)
      Exception flags: 0x00000000
      Exception address: 7AE20503
      Exception parameters: 2
      Parameter 0: 0x00000000
      Parameter 1: 0x027A0DA8

      ---> System Information <---

      Computer Name: REACTOS-R7NG6IJ
      User Name: Administrator
      BIOS Vendor: innotek GmbH
      BIOS Version: VirtualBox
      BIOS Date: 12/01/2006
      System Manufacturer: innotek GmbH
      System Family: Virtual Machine
      System Model: VirtualBox
      System Version: 1.2
      Baseboard Manufacturer: Oracle Corporation
      Baseboard Model: VirtualBox
      Baseboard Version: 1.2
      Number of Processors: 1
      Processor Type: x86 Family 23 Model 104 Stepping 1
      ReactOS Version: 5.2
      BuildLab: 20230306-unknown-revision.GNU_8.4.0
      Service Pack: Service Pack 3
      Current Type: Uniprocessor Checked
      Registered Organization:
      Registered Owner: Besitzer

      ---> Task List <---

      0: [System Process]
      4: System
      116: smss.exe
      164: csrss.exe
      184: winlogon.exe
      208: services.exe
      216: lsass.exe
      252: VBoxService.exe
      268: svchost.exe
      284: eventlog.exe
      428: rpcss.exe
      492: svchost.exe
      516: explorer.exe
      548: svchost.exe
      568: wlansvc.exe
      648: spoolsv.exe
      676: audiosrv.exe
      792: VBoxTray.exe
      800: kbswitch.exe
      1780: CCleaner.exe
      1844: iexplore.exe
      1024: notepad.exe
      1160: drwtsn32.exe

      ---> Module List <---

      (00000000 - 001A0000) C:\ReactOS\explorer.exe
      (005A0000 - 0069F000) C:\ReactOS\system32\comdlg32.dll
      (01250000 - 01263000) C:\Programme\7-Zip\7-zip.dll
      (10000000 - 10050000) C:\ReactOS\System32\VBoxMRXNP.dll
      (6F200000 - 6F32E000) C:\ReactOS\System32\zipfldr.dll
      (6FC00000 - 6FDAA000) C:\ReactOS\System32\wdmaud.drv
      (707E0000 - 7085F000) C:\ReactOS\System32\stobject.dll
      (70A60000 - 70C6F000) C:\ReactOS\System32\shellbtrfs.dll
      (70CA0000 - 70CD9000) C:\ReactOS\System32\shdocvw.dll
      (71D00000 - 71D0C000) C:\ReactOS\system32\ntdll_vista.dll
      (71D80000 - 71D96000) C:\ReactOS\System32\nfs41_np.dll
      (71E10000 - 71EBD000) C:\ReactOS\System32\netshell.dll
      (72B40000 - 72B60000) C:\ReactOS\System32\msrle32.dll
      (73490000 - 734AD000) C:\ReactOS\System32\msacm32.drv
      (736F0000 - 73707000) C:\ReactOS\System32\midimap.dll
      (73AA0000 - 73AB6000) C:\ReactOS\System32\lpk.dll
      (742F0000 - 74300000) C:\ReactOS\System32\ksuser.dll
      (74320000 - 7432B000) C:\ReactOS\system32\kernel32_vista.dll
      (77A20000 - 77BA9000) C:\ReactOS\system32\user32.dll
      (78970000 - 78B44000) C:\ReactOS\System32\browseui.dll
      (78B90000 - 78BA1000) C:\ReactOS\System32\beepmidi.dll
      (78E50000 - 78E84000) C:\ReactOS\system32\apphelp.dll
      (78F40000 - 78F4E000) C:\ReactOS\system32\advapi32_vista.dll
      (78F60000 - 791FD000) C:\ReactOS\System32\actxprxy.dll
      (79260000 - 792AF000) C:\ReactOS\System32\acppage.dll
      (79420000 - 7948B000) C:\ReactOS\system32\usp10.dll
      (79560000 - 79570000) C:\ReactOS\System32\sfc_os.dll
      (79C00000 - 79C4C000) C:\ReactOS\System32\uxtheme.dll
      (79C70000 - 79CAE000) C:\ReactOS\System32\userenv.DLL
      (7A220000 - 7A23B000) C:\ReactOS\System32\powrprof.dll
      (7A2F0000 - 7A321000) C:\ReactOS\System32\msacm32.dll
      (7A4F0000 - 7A525000) C:\ReactOS\System32\msvfw32.dll
      (7A540000 - 7A58F000) C:\ReactOS\system32\imm32.dll
      (7A590000 - 7A5A6000) C:\ReactOS\system32\psapi.dll
      (7A900000 - 7A930000) C:\ReactOS\system32\mpr.dll
      (7A950000 - 7AABC000) C:\ReactOS\system32\setupapi.dll
      (7AAE0000 - 7ACC9000) C:\ReactOS\system32\oleaut32.dll
      (7AD00000 - 7AD1D000) C:\ReactOS\system32\version.dll
      (7AD60000 - 7B75A000) C:\ReactOS\system32\shell32.dll
      (7B840000 - 7B8E6000) C:\ReactOS\System32\winmm.dll
      (7B900000 - 7B95D000) C:\ReactOS\system32\winspool.drv
      (7BA30000 - 7BC48000) C:\ReactOS\system32\ole32.dll
      (7BC80000 - 7BE72000) C:\ReactOS\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.2600.2982_none_deadbeef\comctl32.dll
      (7BEB0000 - 7BF81000) C:\ReactOS\system32\rpcrt4.dll
      (7BFA0000 - 7C042000) C:\ReactOS\system32\shlwapi.dll
      (7C060000 - 7C073000) C:\ReactOS\system32\ws2help.dll
      (7C090000 - 7C0C7000) C:\ReactOS\system32\ws2_32.dll
      (7C0E0000 - 7C118000) C:\ReactOS\System32\iphlpapi.dll
      (7C1C0000 - 7C1FF000) C:\ReactOS\System32\dhcpcsvc.dll
      (7C210000 - 7C2A7000) C:\ReactOS\system32\gdi32.dll
      (7C470000 - 7C519000) C:\ReactOS\system32\advapi32.dll
      (7C530000 - 7C5F2000) C:\ReactOS\system32\msvcrt.dll
      (7C620000 - 7C8FD000) C:\ReactOS\system32\kernel32.dll
      (7C920000 - 7CA4D000) C:\ReactOS\System32\ntdll.dll

      State Dump for Thread Id 0x25c (CRASH)

      eax:0000AE10 ebx:00000000 ecx:027A0DA8 edx:00004830 esi:02795F98 edi:04A1F37C
      eip:7AE20503 esp:04A1F294 ebp:04A1F2BC
      dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000

      ---> Stack Back Trace <---

      FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
      04A1F2BC 7AE20503 02795F98 7AE21476 02795F98 02EFBF68 shell32!ILGetSize +0x2a
      04A1F2F4 7AE20583 02795F98 02E1CEF0 04A1F324 77A5518E shell32!ILClone +0x1c
      04A1F344 7AE21652 02795F98 789DF320 04A1F38C 04A1F37C shell32!SHBindToParent +0x14d
      04A1F5C4 789AC3A3 02053F20 02795F98 04A1F5E8 00000003 browseui!CShellBrowser::BrowseToPath +0x639
      04A1F604 789AC5E6 02795F98 00000003 02EFBF38 80004001 browseui!CShellBrowser::BrowseToPIDL +0x4a
      04A1F61C 789AC823 02E1CEC0 02795F98 00000000 02795F98 browseui!CShellBrowser::BrowseObject +0x27
      04A1F65C 7898AAE1 02EFBF38 00000000 04A1F694 789B8BD6 browseui!CAddressEditBox::Execute +0xd3
      04A1F66C 789880A2 00000000 04A1FC34 04A1F688 00000000 browseui!CAddressBand::OnNotifyClick +0x26
      04A1F694 789B8BD6 00180190 0000004E 00000000 04A1FC34 browseui!CAddressBand::ProcessWindowMessage +0xa7
      04A1F6F4 789C2F08 002B8EB0 0000004E 00000000 04A1FC34 browseui!CWindowImplBaseT<ATL::CWindow, ATL::CWinTraits<1442840576, 0> >::WindowProc +0x7c
      04A1F724 77A8ABDE 018F0000 00180190 0000004E 00000000 user32!CALL_EXTERN_WNDPROC +0x1a
      04A1F894 77A7EECC 00368440 00180190 0000004E 00000000 user32!IntCallWindowProcW +0x1857
      04A1F8C4 77A7F476 018F0000 00180190 0000004E 00000000 user32!CallWindowProcW +0x51
      04A1F91C 789C31FF 02EFBF80 0000004E 00000000 04A1FC34 browseui!CContainedWindowT<ATL::CWindow, ATL::CWinTraits<1442840576, 0> >::WindowProc +0xb7
      04A1F94C 77A8ABDE 01B70000 00180190 0000004E 00000000 user32!CALL_EXTERN_WNDPROC +0x1a
      04A1FABC 77A7EECC 00368440 00180190 0000004E 00000000 user32!IntCallWindowProcW +0x1857
      04A1FB0C 77A7F2E6 00368440 00180190 0000004E 00000000 user32!IntCallMessageProc +0x22d
      04A1FB84 77A7FEDF 00180190 0000004E 00000000 04A1FC34 user32!SendMessageW +0x150
      04A1FBC4 7BD09DDE 000E0328 04A1FC14 00000001 000E0328 comctl32!TOOLBAR_SendNotify +0xce
      04A1FCD4 7BD1510F 000E0328 00000202 00000000 00150044 comctl32!ToolbarWindowProc +0x2a7d
      04A1FCF4 7BD16160 000E0328 00000202 00000000 00150044 comctl32!ToolbarV6WindowProc +0x2f
      04A1FD24 77A8ABDE 7BD16131 000E0328 00000202 00000000 user32!CALL_EXTERN_WNDPROC +0x1a
      04A1FE94 77A7EECC 0036D710 000E0328 00000202 00000000 user32!IntCallWindowProcW +0x1857
      04A1FEE4 77A7F2E6 0036D710 000E0328 00000202 00000000 user32!IntCallMessageProc +0x22d
      04A1FF4C 77A7FA57 04A1FF78 04A1FF78 00000000 00000000 user32!DispatchMessageW +0x24d
      04A1FFA4 7899C496 002CFEE8 00000000 FFFFFFFF 7C673917 browseui!BrowserThreadProc +0x18e
      04A1FFEC 7C63C920 7899C2FC 002CFEE8 00000000 00000000 kernel32!BaseThreadStartup +0x47

      ---> Raw Stack Dump <---

      04A1FFF4 fc c2 99 78 e8 fe 2c 00 - 00 00 00 00 00 00 00 00 ...x..,.........
      04A20004 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
      04A20014 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
      04A20024 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
      04A20034 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
      04A20044 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
      04A20054 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
      04A20064 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
      04A20074 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
      04A20084 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

      State Dump for Thread Id 0x20c

      eax:000011CB ebx:0000007F ecx:8009C000 edx:00000000 esi:00000001 edi:002001AC
      eip:7C92F48A esp:0022F5B8 ebp:0022F638
      dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000

      ---> Stack Back Trace <---

      FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
      0022F638 7C92F48A 002001AC 0000007F 00000002 00000000 ntdll!KiFastSystemCallRet +0x0
      0022F8A0 0042A458 020B5AE4 00000000 00000000 00000000 explorer!_ZN14CTaskSwitchWnd20UpdateTaskItemButtonEP10_TASK_ITEM +0x104
      0022F930 0042999F 000200D0 0000C01D 00000004 00000000 explorer!CTaskSwitchWnd::ProcessWindowMessage +0x238b
      0022F990 00432476 00277FE0 0000C01D 00000004 002001AC explorer!CWindowImplBaseT<ATL::CWindow, ATL::CWinTraits<1442840576, 0> >::WindowProc +0x82
      0022F9C0 77A8ABDE 00AA0000 000200D0 0000C01D 00000004 user32!CALL_EXTERN_WNDPROC +0x1a
      0022FB30 77A7EECC 00363B20 000200D0 0000C01D 00000004 user32!IntCallWindowProcW +0x1857
      0022FB80 77A7F2E6 00363B20 000200D0 0000C01D 00000004 user32!IntCallMessageProc +0x22d
      0022FBE8 77A7FA57 0022FC04 0022FC04 00000000 00000000 user32!DispatchMessageW +0x24d
      0022FC28 00413AD7 002726DC 0043CAEC 00447074 7C944A19 explorer!TrayMessageLoop +0x1f
      0022FE58 004028FB 00000003 0043B018 0043CA2B 0043CF18 explorer!StartWithDesktop +0x109
      0022FED0 00402AF7 00400000 00000000 00238C86 00000001 explorer!wWinMain +0xf7
      0022FEE8 00416E69 00000001 0023A898 00237FE0 00000000 explorer!wmain +0x2d
      0022FF98 00416383 0022FFF0 7C631AF6 FFFFFFFE 00000009 explorer!__tmainCRTStartup +0x30e
      0022FFA0 004163D8 FFFFFFFE 00000009 0022FFF8 00000004 explorer!wWinMainCRTStartup +0x17
      0022FFF0 7C631AF6 004163C1 00000000 75010175 00000000 kernel32!BaseProcessStartup +0x47

      ---> Raw Stack Dump <---

      0022FFF8 c1 63 41 00 00 00 00 00 - 75 01 01 75 00 00 00 00 .cA.....u..u....
      00230008 ee ff ee ff 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
      00230018 00 00 23 00 00 00 23 00 - 00 01 00 00 a8 0b 23 00 ..#...#.......#.
      00230028 00 00 33 00 13 00 00 00 - 13 00 00 00 00 00 00 00 ..3.............
      00230038 a8 06 91 01 f0 7b 91 01 - 02 00 00 00 00 00 00 00 .....{..........
      00230048 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
      00230058 00 00 00 00 00 00 00 00 - 00 fe 00 00 ff ee ef 0e ................
      00230068 00 00 00 02 00 20 00 00 - 00 02 00 00 00 20 00 00 ..... ....... ..
      00230078 10 ed 09 00 ff ef fd 7f - 01 00 a8 0b 00 00 00 00 ................
      00230088 00 00 00 00 00 00 00 00 - c0 86 91 01 d8 8f 91 01 ................

      State Dump for Thread Id 0x2ac

      eax:00000119 ebx:7C966BCF ecx:8009C000 edx:00000000 esi:00000000 edi:00000200
      eip:7C92F48A esp:0481FC7C ebp:0481FCDC
      dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000

      ---> Stack Back Trace <---

      FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
      0481FCDC 7C92F48A 00000200 FFFFFFFF 00000000 0000000E ntdll!KiFastSystemCallRet +0x0
      0481FCF4 7C636B06 00000200 FFFFFFFF 00000000 00000000 kernel32!WaitForSingleObject +0x20
      0481FD3C 7BEE9901 002ACFF0 0481FD7C 00000010 7C9467CD rpcrt4!rpcrt4_conn_np_read +0xc9
      0481FD9C 7BEDB041 002ACFF0 7C97D578 002F3F98 0149F564 rpcrt4!RPCRT4_receive_fragment +0x61
      0481FE0C 7BEDB394 002ACFF0 0481FE38 0149F564 00000000 rpcrt4!RPCRT4_ReceiveWithAuth +0x6e
      0481FE4C 7BEDC1EB 0149F564 02D69000 02D69970 01000000 rpcrt4!I_RpcReceive +0x67
      0481FE84 7BEDC693 0149F564 0481FEB4 00000000 0481FEBC rpcrt4!I_RpcSendReceive +0x77
      0481FEB4 7BA7302B 00296FC4 00000000 02D69978 00000000 ole32!rpc_sendreceive_thread +0x14
      0481FF24 7C964884 00000000 00000000 02D69978 0481FF80 ntdll!RtlpExecuteWorkItem +0xac
      0481FFA4 7C96416D 0149F3D8 00000000 FFFFFFFF 7C673917 ntdll!RtlpWorkerThreadProc +0xa5
      0481FFEC 7C63C920 7C9640C8 0149F3D8 00000000 00000000 kernel32!BaseThreadStartup +0x47

      State Dump for Thread Id 0x2d0

      eax:000000C6 ebx:00000102 ecx:8009C000 edx:00000000 esi:0461FF80 edi:0461FF8C
      eip:7C92F48A esp:0461FF24 ebp:0461FFA4
      dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000

      ---> Stack Back Trace <---

      FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
      0461FFA4 7C92F48A 0149F418 00000000 FFFFFFFF 7C673917 ntdll!KiFastSystemCallRet +0x0
      0461FFEC 7C63C920 7C9640C8 0149F418 00000000 00000000 kernel32!BaseThreadStartup +0x47

      State Dump for Thread Id 0x2d8

      eax:000000C6 ebx:00000102 ecx:8009C000 edx:00000000 esi:0441FF80 edi:0441FF8C
      eip:7C92F48A esp:0441FF24 ebp:0441FFA4
      dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000

      ---> Stack Back Trace <---

      FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
      0441FFA4 7C92F48A 0149F418 00000000 FFFFFFFF 7C673917 ntdll!KiFastSystemCallRet +0x0
      0441FFEC 7C63C920 7C9640C8 0149F418 00000000 00000000 kernel32!BaseThreadStartup +0x47

      State Dump for Thread Id 0x2e4

      eax:00000118 ebx:7C966BC0 ecx:8009C000 edx:00000000 esi:00D1FB3C edi:00000008
      eip:7C92F48A esp:00D1FAEC ebp:00D1FB74
      dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000

      ---> Stack Back Trace <---

      FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
      00D1FB74 7C92F48A 00000008 002CFD80 00000000 FFFFFFFF ntdll!KiFastSystemCallRet +0x0
      00D1FB94 7C636D59 00000008 002CFD80 00000000 FFFFFFFF kernel32!WaitForMultipleObjects +0x2e
      00D1FFA4 0040AEF2 00279738 00000000 FFFFFFFF 7C673917 explorer!CIconWatcher::WatcherThread +0xa6
      00D1FFEC 7C63C920 0040AE40 00279738 00000000 4E9F000D kernel32!BaseThreadStartup +0x47

      ---> Raw Stack Dump <---

      00D1FFF4 40 ae 40 00 38 97 27 00 - 00 00 00 00 0d 00 9f 4e @.@.8.'........N
      00D20004 01 00 3f 00 3f 00 3f 00 - 3f 00 00 00 00 00 00 00 ..?.?.?.?.......
      00D20014 00 00 00 00 00 00 03 01 - 00 00 01 00 02 00 03 00 ................
      00D20024 04 00 05 00 06 00 07 00 - 08 00 09 00 0a 00 0b 00 ................
      00D20034 0c 00 0d 00 0e 00 0f 00 - 10 00 11 00 12 00 13 00 ................
      00D20044 14 00 15 00 16 00 17 00 - 18 00 19 00 1a 00 1b 00 ................
      00D20054 1c 00 1d 00 1e 00 1f 00 - 20 00 21 00 22 00 23 00 ........ .!.".#.
      00D20064 24 00 25 00 26 00 27 00 - 28 00 29 00 2a 00 2b 00 $.%.&.'.(.).*.+.
      00D20074 2c 00 2d 00 2e 00 2f 00 - 30 00 31 00 32 00 33 00 ,.-.../.0.1.2.3.
      00D20084 34 00 35 00 36 00 37 00 - 38 00 39 00 3a 00 3b 00 4.5.6.7.8.9.:.;.

      State Dump for Thread Id 0x308

      eax:000011CB ebx:000700B2 ecx:8009C000 edx:00000000 esi:0000004A edi:B0EEFE10
      eip:7C92F48A esp:0118ECAC ebp:0118ED24
      dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000

      ---> Stack Back Trace <---

      FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
      0118ED24 7C92F48A 000700B2 0000004A 00020108 0118ED54 ntdll!KiFastSystemCallRet +0x0
      0118F134 7ADF6993 00000001 0118F164 000700B2 0000004A shell32!Shell_NotifyIconW +0x101
      0118F88C 71E18611 00000000 00290D78 00000000 00000000 netshell!UpdateLanStatus +0x4d5
      0118F8AC 71E18DF5 00020108 00000113 0000FABC 00000000 netshell!LANStatusDlg +0xa9
      0118F8DC 77A8ABDE 71E18D42 00020108 00000113 0000FABC user32!CALL_EXTERN_WNDPROC +0x1a
      0118FA4C 77A7EF2C 003651B8 00020108 00000113 0000FABC user32!IntCallWindowProcW +0x18b7
      0118FA7C 77A7F476 71E18D42 00020108 00000113 0000FABC user32!CallWindowProcW +0x51
      0118FAAC 77A67E72 00020108 00000113 0000FABC 00000000 user32!DefDlgProcW +0x7e
      0118FADC 77A8ABDE 77A67DF4 00020108 00000113 0000FABC user32!CALL_EXTERN_WNDPROC +0x1a
      0118FC4C 77A7EF2C 003651B8 00020108 00000113 0000FABC user32!IntCallWindowProcW +0x18b7
      0118FC9C 77A7F2E6 003651B8 00020108 00000113 0000FABC user32!IntCallMessageProc +0x22d
      0118FD04 77A7FA57 0118FD20 00000000 00000000 00000000 user32!DispatchMessageW +0x24d
      0118FD44 707E1A0A 00000188 0000C09A 00000000 86400000 stobject!CSysTray::SysTrayMessageLoop +0x3d
      0118FF9C 707E1C12 0118FFEC 7C63C920 0027B0B8 00000000 stobject!CSysTray::SysTrayThreadProc +0x1ea
      0118FFA4 707E1C41 0027B0B8 00000000 FFFFFFFF 7C673917 stobject!CSysTray::s_SysTrayThreadProc +0x8
      0118FFEC 7C63C920 707E1C36 0027B0B8 00000000 00000010 kernel32!BaseThreadStartup +0x47

      ---> Raw Stack Dump <---

      0118FFF4 36 1c 7e 70 b8 b0 27 00 - 00 00 00 00 10 00 00 00 6.~p..'.........
      01190004 03 00 00 00 01 00 00 00 - 01 00 00 00 10 00 00 00 ................
      01190014 10 00 00 00 10 00 00 00 - 01 00 00 00 00 00 00 00 ................
      01190024 00 00 00 00 00 00 00 00 - 00 00 00 00 10 00 00 00 ................
      01190034 02 00 00 00 00 00 00 00 - 00 00 00 00 80 07 00 00 ................
      01190044 9e 03 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
      01190054 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
      01190064 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
      01190074 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
      01190084 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

      State Dump for Thread Id 0x30c

      eax:00000118 ebx:7C966BC0 ecx:8009C000 edx:00000000 esi:0149F31C edi:00000002
      eip:7C92F48A esp:0149F2CC ebp:0149F354
      dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000

      ---> Stack Back Trace <---

      FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
      0149F354 7C92F48A 00000002 01FD9A48 00000000 FFFFFFFF ntdll!KiFastSystemCallRet +0x0
      0149F38C 77A7D180 00000001 00296FE4 FFFFFFFF 00000160 user32!RealMsgWaitForMultipleObjectsEx +0x100
      0149F3AC 77A811D8 00000001 00296FE4 FFFFFFFF 00000160 user32!MsgWaitForMultipleObjectsEx +0x65
      0149F43C 7BA45B43 00000000 FFFFFFFF 00000001 00296FE4 ole32!CoWaitForMultipleHandles +0x116
      0149F4B4 7BA751B4 002E47E0 0149F564 0149F4E0 00000000 ole32!ClientRpcChannelBuffer_SendReceive +0x4a6
      0149F4EC 7BEB1E8A 0318A814 0149F594 7BB00E4C 7BAFFDA0 rpcrt4!NdrProxySendReceive +0x57
      0149F684 7BAC6C01 0318A814 0149F904 0149F8F8 7AE3641E ole32!IDataObject_RemoteGetData_Proxy +0x100
      0149F6C4 7BA96020 0318A814 0149F904 0149F8F8 7AE7DA70 ole32!IDataObject_GetData_Proxy +0x2b
      0149F93C 7ADCEE8A 02F2EFC8 0318A814 00000001 0000011B shell32!CFSDropTarget::DragEnter +0x16d
      0149F9A4 7ADF18BD 00000001 0000011B 000002AB 002EB234 shell32!CDefView::drag_notify_subitem +0x2c4
      0149F9E4 7ADF1D28 0028EC38 0318A814 00000001 0000011B shell32!CDefView::DragEnter +0x56
      0149FA0C 7BA68763 00294C20 0318A814 00000001 0000011B ole32!DropTargetWrapper_DragEnter +0x5d
      0149FB6C 7BAD9566 0028FF90 0028E360 002DEE38 0149FBD0 ole32!IDropTarget_DragEnter_Stub +0x1d5
      0149FBE4 7BEB3B38 0028FF90 002DEE38 0028E360 7AE5299C rpcrt4!CStdStubBuffer_Invoke +0xdc
      0149FC9C 7BA75EAC 002CC868 77A7EEEF 7BCD4B5E 000200FE ole32!RPC_ExecuteCall +0x33b
      0149FCB4 7BA3E890 000200FC 00000400 00000000 002CC868 ole32!apartment_wndproc +0x44
      0149FCE4 77A8ABDE 7BA3E84C 000200FC 00000400 00000000 user32!CALL_EXTERN_WNDPROC +0x1a
      0149FE54 77A7EECC 00364D30 000200FC 00000400 00000000 user32!IntCallWindowProcW +0x1857
      0149FEA4 77A7F2E6 00364D30 000200FC 00000400 00000000 user32!IntCallMessageProc +0x22d
      0149FF0C 77A7FA57 0149FF30 0149FF30 00000000 00000000 user32!DispatchMessageW +0x24d
      0149FF54 7AD77739 00294BC1 000000C9 0149FF9C 0040213D shell32!SHDesktopMessageLoop +0x84
      0149FF64 004035F1 00294BC1 00445098 0149FF88 00000000 explorer!_SHDesktopMessageLoop +0x6f
      0149FF9C 0040213D 0149FFEC 7C63C920 00297FB8 00000000 explorer!CDesktopThread::DesktopThreadProc +0x120
      0149FFA4 00402153 00297FB8 00000000 FFFFFFFF 7C673917 explorer!CDesktopThread::s_DesktopThreadProc +0x8
      0149FFEC 7C63C920 00402148 00297FB8 00000000 00000000 kernel32!BaseThreadStartup +0x47

      State Dump for Thread Id 0x310

      eax:00000118 ebx:7C966BC0 ecx:8009C000 edx:00000000 esi:0169FEEC edi:00000006
      eip:7C92F48A esp:0169FE9C ebp:0169FF24
      dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000

      ---> Stack Back Trace <---

      FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
      0169FF24 7C92F48A 00000006 002B7520 00000000 FFFFFFFF ntdll!KiFastSystemCallRet +0x0
      0169FF5C 7BEEBB13 00294EF8 00000006 002B7520 00000000 rpcrt4!rpcrt4_protseq_np_wait_for_new_connection +0x3b
      0169FFA4 7BEDF556 00294EF8 00000000 FFFFFFFF 7C673917 rpcrt4!RPCRT4_server_thread +0x25f
      0169FFEC 7C63C920 7BEDF2F7 00294EF8 00000000 00000000 kernel32!BaseThreadStartup +0x47

      State Dump for Thread Id 0x314

      eax:000011CB ebx:00030110 ecx:8009C000 edx:00000000 esi:00000403 edi:B0CEC758
      eip:7C92F48A esp:0189EFD4 ebp:0189F04C
      dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000

      ---> Stack Back Trace <---

      FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
      0189F04C 7C92F48A 00030110 00000403 0000041C 00000204 ntdll!KiFastSystemCallRet +0x0
      0189F0AC 7AD7EC86 00000000 000DF333 002DB220 000001BB shell32!CreateNotificationParamAndSend +0x16c
      0189F58C 7AD7FDD6 80000002 00001005 0189F7BC 00000000 shell32!SHChangeNotify +0x575
      0189FBDC 7AD782BF 0030A928 0189FF24 7C673917 0189FBE8 shell32!CDirectoryWatcher::ProcessNotification +0x455
      0189FC04 7AD78571 00000000 0000004C 0189FC24 7C9433C1 shell32!CDirectoryWatcher::ReadCompletion +0x14d
      0189FC24 7AD7859B 00000000 0000004C 00293EFC 7C966BCF shell32!_NotificationCompletion +0x1e
      0189FC44 7C6482D3 7AD78576 00293EFC 00000000 00010017 kernel32!BasepIoCompletionSimple +0x2f
      0189FF8C 7C92F36A FFFFFFFE FFFFFFFF 00000001 00000000 ntdll!KiUserApcDispatcher +0x25
      0189FFA4 7AD77B9A 00000000 00000000 FFFFFFFF 7C673917 shell32!DirectoryWatcherThreadFuncAPC +0x23
      0189FFEC 7C63C920 7AD77B6E 00000000 00000000 042444C7 kernel32!BaseThreadStartup +0x47

      ---> Raw Stack Dump <---

      0189FFF4 6e 7b d7 7a 00 00 00 00 - 00 00 00 00 c7 44 24 04 n{.z.........D$.
      018A0004 4c cf e1 02 e9 73 2e 12 - 77 00 00 00 00 00 00 00 L....s..w.......
      018A0014 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
      018A0024 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
      018A0034 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
      018A0044 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
      018A0054 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
      018A0064 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
      018A0074 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
      018A0084 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

      State Dump for Thread Id 0x358

      eax:00000119 ebx:7C966BCF ecx:8009C000 edx:00000000 esi:00000000 edi:0000026C
      eip:7C92F48A esp:0421FCFC ebp:0421FD5C
      dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000

      ---> Stack Back Trace <---

      FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
      0421FD5C 7C92F48A 0000026C FFFFFFFF 00000000 00000000 ntdll!KiFastSystemCallRet +0x0
      0421FD74 7C636B06 0000026C FFFFFFFF 00000000 002CC868 kernel32!WaitForSingleObject +0x20
      0421FDD4 7BA7691C 002DEE38 002D5BF8 00000004 00000004 ole32!dispatch_rpc +0x3e8
      0421FE6C 7BEDFE78 0421FF54 7C97250B 0421FE74 7C97D578 rpcrt4!process_request_packet +0x35b
      0421FEB4 7BEE0FB5 002CA3E0 00000000 02008450 00000000 rpcrt4!RPCRT4_worker_thread +0x188
      0421FF24 7C964884 00000000 00000000 02008450 0421FF80 ntdll!RtlpExecuteWorkItem +0xac
      0421FFA4 7C96416D 0401FEF8 00000000 FFFFFFFF 7C673917 ntdll!RtlpWorkerThreadProc +0xa5
      0421FFEC 7C63C920 7C9640C8 0401FEF8 00000000 00000000 kernel32!BaseThreadStartup +0x47

      State Dump for Thread Id 0x36c

      eax:00000119 ebx:7C966BCF ecx:8009C000 edx:00000000 esi:00000000 edi:00000230
      eip:7C92F48A esp:0401FDCC ebp:0401FE2C
      dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000

      ---> Stack Back Trace <---

      FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
      0401FE2C 7C92F48A 00000230 FFFFFFFF 00000000 00000000 ntdll!KiFastSystemCallRet +0x0
      0401FE44 7C636B06 00000230 FFFFFFFF 00000000 00000000 kernel32!WaitForSingleObject +0x20
      0401FE8C 7BEE9901 02690EE8 0401FECC 00000010 00000007 rpcrt4!rpcrt4_conn_np_read +0xc9
      0401FEEC 7BEDB041 02690EE8 00000001 FFFFD8F0 FFFFFFFF rpcrt4!RPCRT4_receive_fragment +0x61
      0401FF5C 7BEDB394 02690EE8 0401FF90 002B9758 0401FF8C rpcrt4!RPCRT4_ReceiveWithAuth +0x6e
      0401FFA4 7BEE0AAF 02690EE8 00000000 FFFFFFFF 7C673917 rpcrt4!RPCRT4_io_thread +0x19b
      0401FFEC 7C63C920 7BEE0914 02690EE8 00000000 00000000 kernel32!BaseThreadStartup +0x47

      State Dump for Thread Id 0x370

      eax:000000C6 ebx:00000102 ecx:8009C000 edx:00000000 esi:01EBFF80 edi:01EBFF8C
      eip:7C92F48A esp:01EBFF24 ebp:01EBFFA4
      dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000

      ---> Stack Back Trace <---

      FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
      01EBFFA4 7C92F48A 01B2FEF8 00000000 FFFFFFFF 7C673917 ntdll!KiFastSystemCallRet +0x0
      01EBFFEC 7C63C920 7C9640C8 01B2FEF8 00000000 00000000 kernel32!BaseThreadStartup +0x47

      State Dump for Thread Id 0x374

      eax:00000119 ebx:7C966BCF ecx:8009C000 edx:00000000 esi:00000000 edi:000002BC
      eip:7C92F48A esp:01B2FDCC ebp:01B2FE2C
      dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000

      ---> Stack Back Trace <---

      FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
      01B2FE2C 7C92F48A 000002BC FFFFFFFF 00000000 00000000 ntdll!KiFastSystemCallRet +0x0
      01B2FE44 7C636B06 000002BC FFFFFFFF 00000000 00000000 kernel32!WaitForSingleObject +0x20
      01B2FE8C 7BEE9901 0256BF50 01B2FECC 00000010 00000007 rpcrt4!rpcrt4_conn_np_read +0xc9
      01B2FEEC 7BEDB041 0256BF50 00000001 FFFFD8F0 FFFFFFFF rpcrt4!RPCRT4_receive_fragment +0x61
      01B2FF5C 7BEDB394 0256BF50 01B2FF90 002BFF08 01B2FF8C rpcrt4!RPCRT4_ReceiveWithAuth +0x6e
      01B2FFA4 7BEE0AAF 0256BF50 00000000 FFFFFFFF 7C673917 rpcrt4!RPCRT4_io_thread +0x19b
      01B2FFEC 7C63C920 7BEE0914 0256BF50 00000000 00000000 kernel32!BaseThreadStartup +0x47

      ---> Raw Stack Dump <---

      01B2FFF4 14 09 ee 7b 50 bf 56 02 - 00 00 00 00 00 00 00 00 ...{P.V.........
      01B30004 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
      01B30014 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
      01B30024 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
      01B30034 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
      01B30044 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
      01B30054 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
      01B30064 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
      01B30074 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
      01B30084 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

      State Dump for Thread Id 0x41c

      eax:7FFDD000 ebx:00000001 ecx:00000002 edx:00000003 esi:00000004 edi:00000005
      eip:7C965663 esp:01C0FFE8 ebp:01C0FFF4
      dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000

      ---> Stack Back Trace <---

      FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
      01C0FFF4 7C965663 00000000 042444C7 02020350 66024BE9 ntdll!DbgBreakPoint +0x1

      ---> Raw Stack Dump <---

      01C0FFFC 00 00 00 00 c7 44 24 04 - 50 03 02 02 e9 4b 02 66 .....D$.P....K.f
      01C1000C 77 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 w...............
      01C1001C 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
      01C1002C 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
      01C1003C 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
      01C1004C 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
      01C1005C 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
      01C1006C 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
      01C1007C 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
      01C1008C 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

      Attachments

        Activity

          People

            Unassigned Unassigned
            ReactOS_User27355 ReactOS_User27355
            Votes:
            0 Vote for this issue
            Watchers:
            2 Start watching this issue

            Dates

              Created:
              Updated:
              Resolved: