ReactOS 0.4.9-dev DrWtsn32 Application exception occurred: App: eventlog.exe (pid=340, tid=0x448) When: 17/4/2018 @ 03:21:06.801 Exception number: 0xc0000094 (EXCEPTION_INT_DIVIDE_BY_ZERO) *----> System Information <----* Computer Name: MYCOMPUTERNAME User Name: Administrator Number of Processors: 1 Processor Type: x86 Family 6 Model 7 Stepping 6 ReactOS Version: 5.2 BuildLab: 20180417-0.4.9-dev-708-g40017a5.GNU_4.7.2 Service Pack: Service Pack 2 Current Type: Uniprocessor Checked Registered Organization: Registered Owner: mrX *----> Task List <----* 0: [System Process] 4: System 80: smss.exe 132: csrss.exe 156: winlogon.exe 172: services.exe 180: lsass.exe 340: eventlog.exe 380: rpcss.exe 404: svchost.exe 468: explorer.exe 488: svchost.exe 532: wlansvc.exe 568: spoolsv.exe 604: audiosrv.exe 740: kbswitch.exe 980: taskmgr.exe 1032: cmd.exe 1044: drwtsn32.exe 1072: sc.exe *----> Module List <----* (00000000 - 00023000) C:\ReactOS\system32\eventlog.exe (77450000 - 7745A000) C:\ReactOS\system32\kernel32_vista.dll (79890000 - 79896000) C:\ReactOS\system32\advapi32_vista.dll (7C060000 - 7C110000) C:\ReactOS\system32\rpcrt4.dll (7C1E0000 - 7C1F3000) C:\ReactOS\system32\ws2help.dll (7C210000 - 7C244000) C:\ReactOS\system32\ws2_32.dll (7C380000 - 7C4DC000) C:\ReactOS\system32\user32.dll (7C500000 - 7C58E000) C:\ReactOS\system32\gdi32.dll (7C5B0000 - 7C64B000) C:\ReactOS\system32\advapi32.dll (7C660000 - 7C6FD000) C:\ReactOS\system32\msvcrt.dll (7C710000 - 7C8D6000) C:\ReactOS\system32\kernel32.dll (7C920000 - 7CA26000) C:\ReactOS\System32\ntdll.dll State Dump for Thread Id 0x448 (CRASH) eax:00000001 ebx:00237614 ecx:00000000 edx:00000000 esi:00000000 edi:0023761C eip:00403D34 esp:0083F758 ebp:0083F7D0 dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0083F7D0 00403D34 00236790 5AD56822 00000004 00000000 eventlog!ElfrIntReportEventW 0083F818 0040418E 00236790 5AD56822 00000004 00000000 eventlog!ElfrReportEventW 0083F864 7C07BE7D 00404116 00237C58 0000003C 00000000 rpcrt4!create_stub 0083FDC4 7C07E70D 00000000 00000000 00236668 0083FDE0 rpcrt4!NdrStubCall2 0083FDE4 7C07EE80 00236668 0083FE3C 00000202 808028A3 rpcrt4!NdrServerCall2 0083FE74 7C08FC42 00230640 00235B30 00000003 00000000 rpcrt4!process_request_packet 0083FEBC 7C08FF59 00235B18 00000000 00235B38 00000000 rpcrt4!RPCRT4_worker_thread 0083FF34 7C95BFAC 00000000 00000000 00235B38 0083FF58 ntdll!RtlpExecuteWorkItem 0083FFA4 7C95C2AF 0143FEF8 8001003B F700EC84 FFFFFFFF ntdll!RtlpWorkerThreadProc 0083FFEC 7C72B5CF 7C95C1FD 0143FEF8 00000000 00000000 kernel32!BaseThreadStartup State Dump for Thread Id 0x158 eax:000000BF ebx:00000000 ecx:00235BD0 edx:00000000 esi:0022FBF4 edi:000000B8 eip:7C92D7C5 esp:0022FB30 ebp:0022FB80 dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0022FB80 7C92D7C5 000000B8 00235BD0 0000021A 0022FBF4 ntdll!EtwQueryAllTracesA 0022FC08 7C5CBEA2 00230000 00000008 0000021A 7C5EC2D3 advapi32!ScServiceDispatcher 0022FC50 7C5CD369 0040B000 00000000 00233158 0022FCA4 advapi32!StartServiceCtrlDispatcherW 0022FEE8 00402319 00000001 00233148 00232188 B1D6C208 eventlog!wmain 0022FF98 00408FFD 0022FFF0 7C720B57 FFFFFFFE 00000009 eventlog!__tmainCRTStartup 0022FFA0 0040905F FFFFFFFE 00000009 0022FFF8 00000004 eventlog!wmainCRTStartup 0022FFF0 7C720B57 00409048 00000000 EC0100ED 00000000 kernel32!BaseProcessStartup *----> Raw Stack Dump <----* 0022FFF8 48 90 40 00 00 00 00 00 - ed 00 01 ec 00 00 00 00 H.@............. 00230008 ee ff ee ff 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 00230018 00 00 23 00 00 00 23 00 - 00 01 00 00 68 07 23 00 ..#...#.....h.#. 00230028 00 00 33 00 f2 00 00 00 - 01 00 00 00 00 00 00 00 ..3............. 00230038 b0 06 23 00 b0 06 23 00 - 02 00 00 00 00 00 00 00 ..#...#......... 00230048 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 00230058 00 00 00 00 00 00 00 00 - 00 fe 00 00 ff ee ef 0e ................ 00230068 00 00 10 00 00 20 00 00 - 00 02 00 00 00 20 00 00 ..... ....... .. 00230078 e3 00 00 00 ff ef fd 7f - 01 00 68 07 00 00 00 00 ..........h..... 00230088 00 00 00 00 00 00 00 00 - c0 06 23 00 50 07 23 00 ..........#.P.#. State Dump for Thread Id 0x188 eax:00000064 ebx:00000000 ecx:F6E03D64 edx:00000000 esi:00000000 edi:00000000 eip:7C92D7C5 esp:00A3FF2C ebp:00A3FF8C dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 00A3FF8C 7C92D7C5 7C961BE1 7C921013 00000060 00000000 ntdll!EtwQueryAllTracesA 00A3FFA4 0040328D 00000000 8001003B F6E03C84 FFFFFFFF eventlog!PortThreadRoutine 00A3FFEC 7C72B5CF 00403281 00000000 00000000 00000000 kernel32!BaseThreadStartup State Dump for Thread Id 0x18c eax:00000119 ebx:00000000 ecx:FFFFFFFF edx:00000000 esi:000000E4 edi:00000000 eip:7C92D7C5 esp:00C3FEAC ebp:00C3FF0C dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 00C3FF0C 7C92D7C5 000000E4 FFFFFFFF 00000000 00000000 ntdll!EtwQueryAllTracesA 00C3FF24 7C725BD8 000000E4 FFFFFFFF 7C0A22B0 00000001 kernel32!WaitForSingleObject 00C3FF54 7C092159 00000000 00000000 00C3FF74 0000000C rpcrt4!RpcMgmtWaitServerListen 00C3FF84 7C09237D 00000001 000004D2 00000000 00000000 rpcrt4!RpcServerListen 00C3FFA4 00403891 00000000 8001003B F6D7CC84 FFFFFFFF eventlog!RpcThreadRoutine 00C3FFEC 7C72B5CF 004037F9 00000000 00000000 00000000 kernel32!BaseThreadStartup State Dump for Thread Id 0x19c eax:00000118 ebx:00E3FEEC ecx:FFFFFFFF edx:00000000 esi:00000001 edi:00000000 eip:7C92D7C5 esp:00E3FE9C ebp:00E3FF24 dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 00E3FF24 7C92D7C5 00000002 00236250 00000000 FFFFFFFF ntdll!EtwQueryAllTracesA 00E3FF5C 7C099910 002363A8 00000002 00236250 80886EA0 rpcrt4!rpcrt4_protseq_np_wait_for_new_connection 00E3FFA4 7C08E387 002363A8 8001003B F6D30C84 FFFFFFFF rpcrt4!RPCRT4_server_thread 00E3FFEC 7C72B5CF 7C08E2D5 002363A8 00000000 00000000 kernel32!BaseThreadStartup State Dump for Thread Id 0x1ac eax:00000119 ebx:00000000 ecx:FFFFFFFF edx:00000000 esi:00000170 edi:00000000 eip:7C92D7C5 esp:0103FDCC ebp:0103FE2C dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0103FE2C 7C92D7C5 00000170 FFFFFFFF 00000000 00000000 ntdll!EtwQueryAllTracesA 0103FE44 7C725BD8 00000170 FFFFFFFF 00000000 00000000 kernel32!WaitForSingleObject 0103FE8C 7C096F16 00236568 0103FECC 00000010 01E40000 rpcrt4!rpcrt4_conn_np_read 0103FEEC 7C08A366 00236568 7C94B485 7C9858CC FFFFFFFF rpcrt4!RPCRT4_receive_fragment 0103FF5C 7C08A69A 00236568 0103FF90 00236A80 0103FF8C rpcrt4!RPCRT4_ReceiveWithAuth 0103FFA4 7C08F4C7 00236568 8001003B F6D64C84 FFFFFFFF rpcrt4!RPCRT4_io_thread 0103FFEC 7C72B5CF 7C08F42F 00236568 00000000 00000000 kernel32!BaseThreadStartup State Dump for Thread Id 0x1bc eax:00000119 ebx:00000000 ecx:FFFFFFFF edx:00000000 esi:00000178 edi:00000000 eip:7C92D7C5 esp:0123FDCC ebp:0123FE2C dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0123FE2C 7C92D7C5 00000178 FFFFFFFF 00000000 00237BE8 ntdll!EtwQueryAllTracesA 0123FE44 7C725BD8 00000178 FFFFFFFF 00000000 00000000 kernel32!WaitForSingleObject 0123FE8C 7C096F16 00236870 0123FECC 00000010 002371A8 rpcrt4!rpcrt4_conn_np_read 0123FEEC 7C08A366 00236870 00000000 00236E50 00000018 rpcrt4!RPCRT4_receive_fragment 0123FF5C 7C08A69A 00236870 0123FF90 00237178 0123FF8C rpcrt4!RPCRT4_ReceiveWithAuth 0123FFA4 7C08F4C7 00236870 8001003B F6D58C84 FFFFFFFF rpcrt4!RPCRT4_io_thread 0123FFEC 7C72B5CF 7C08F42F 00236870 00000000 00000000 kernel32!BaseThreadStartup State Dump for Thread Id 0x1c0 eax:00000119 ebx:00000000 ecx:FFFFFFFF edx:00000000 esi:0000027C edi:00000000 eip:7C92D7C5 esp:0143FDCC ebp:0143FE2C dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0143FE2C 7C92D7C5 0000027C FFFFFFFF 00000000 00000000 ntdll!EtwQueryAllTracesA 0143FE44 7C725BD8 0000027C FFFFFFFF 00000000 00000000 kernel32!WaitForSingleObject 0143FE8C 7C096F16 00236CC0 0143FECC 00000010 00237258 rpcrt4!rpcrt4_conn_np_read 0143FEEC 7C08A366 00236CC0 00000001 FFFFD8F0 FFFFFFFF rpcrt4!RPCRT4_receive_fragment 0143FF5C 7C08A69A 00236CC0 0143FF90 00237228 0143FF8C rpcrt4!RPCRT4_ReceiveWithAuth 0143FFA4 7C08F4C7 00236CC0 8001003B F6D54C84 FFFFFFFF rpcrt4!RPCRT4_io_thread 0143FFEC 7C72B5CF 7C08F42F 00236CC0 00000000 00000000 kernel32!BaseThreadStartup State Dump for Thread Id 0x1cc eax:000000C6 ebx:00000012 ecx:00000000 edx:00000000 esi:00000012 edi:00000000 eip:7C92D7C5 esp:01A3FF34 ebp:01A3FFA4 dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 01A3FFA4 7C92D7C5 0103FEF8 8001003B F6D48C84 FFFFFFFF ntdll!EtwQueryAllTracesA 01A3FFEC 7C72B5CF 7C95C1FD 0103FEF8 00000000 00000000 kernel32!BaseThreadStartup State Dump for Thread Id 0x1d0 eax:000000C6 ebx:00000013 ecx:00000000 edx:00000000 esi:00000013 edi:00000000 eip:7C92D7C5 esp:01C3FF34 ebp:01C3FFA4 dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 01C3FFA4 7C92D7C5 0123FEF8 8001003B F6D44C84 FFFFFFFF ntdll!EtwQueryAllTracesA 01C3FFEC 7C72B5CF 7C95C1FD 0123FEF8 00000000 00000000 kernel32!BaseThreadStartup State Dump for Thread Id 0x1e0 eax:000000C6 ebx:00000013 ecx:00000000 edx:00000000 esi:00000013 edi:00000000 eip:7C92D7C5 esp:01E3FF34 ebp:01E3FFA4 dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 01E3FFA4 7C92D7C5 0143FEF8 8001003B F6D3CC84 FFFFFFFF ntdll!EtwQueryAllTracesA 01E3FFEC 7C72B5CF 7C95C1FD 0143FEF8 00000000 00000000 kernel32!BaseThreadStartup State Dump for Thread Id 0x1e4 eax:000000C6 ebx:00000000 ecx:00000000 edx:00000000 esi:00000000 edi:00000000 eip:7C92D7C5 esp:0203FF34 ebp:0203FFA4 dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0203FFA4 7C92D7C5 0103FEF8 8001003B F6CA8C84 FFFFFFFF ntdll!EtwQueryAllTracesA 0203FFEC 7C72B5CF 7C95C1FD 0103FEF8 00000000 00000000 kernel32!BaseThreadStartup State Dump for Thread Id 0x44c eax:000000C6 ebx:0143FEF8 ecx:F6D34D64 edx:00000000 esi:00000000 edi:00000000 eip:7C92D7C5 esp:0163FF34 ebp:0163FFA4 dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0163FFA4 7C92D7C5 0143FEF8 8001003B F6D34C84 FFFFFFFF ntdll!EtwQueryAllTracesA 0163FFEC 7C72B5CF 7C95C1FD 0143FEF8 00000000 00000000 kernel32!BaseThreadStartup