ReactOS 0.4.10-dev DrWtsn32 Application exception occurred: App: explorer.exe (pid=432, tid=0x1b4) When: 28/6/2018 @ 14:07:19.250 Exception number: 0xc0000005 (EXCEPTION_ACCESS_VIOLATION) *----> System Information <----* Computer Name: REACTOS-IC33TEU User Name: Administrator Number of Processors: 1 Processor Type: x86 Family 6 Model 15 Stepping 11 ReactOS Version: 5.2 BuildLab: 20180628-0.4.10-dev-280-gfafcd50.GNU_4.7.2 Service Pack: Service Pack 2 Current Type: Uniprocessor Checked Registered Organization: Registered Owner: Owner *----> Task List <----* 0: [System Process] 4: System 84: smss.exe 132: csrss.exe 156: winlogon.exe 172: services.exe 180: lsass.exe 204: eventlog.exe 248: rpcss.exe 360: svchost.exe 388: svchost.exe 432: explorer.exe 448: wlansvc.exe 472: spoolsv.exe 628: kbswitch.exe 652: drwtsn32.exe *----> Module List <----* (00000000 - 00179000) C:\ReactOS\explorer.exe (00580000 - 00744000) C:\ReactOS\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.2600.2982_none_deadbeef\comctl32.dll (00750000 - 0083A000) C:\ReactOS\system32\comdlg32.dll (01100000 - 01110000) C:\ReactOS\System32\beepmidi.dll (733C0000 - 733DA000) C:\ReactOS\System32\msacm32.drv (74660000 - 746DC000) C:\ReactOS\System32\stobject.dll (74A00000 - 74A35000) C:\ReactOS\System32\shdocvw.dll (75880000 - 75915000) C:\ReactOS\System32\netshell.dll (76B20000 - 76B35000) C:\ReactOS\System32\midimap.dll (76DD0000 - 76DEF000) C:\ReactOS\System32\lpk.dll (77450000 - 7745A000) C:\ReactOS\system32\kernel32_vista.dll (79450000 - 795C3000) C:\ReactOS\System32\browseui.dll (797C0000 - 797ED000) C:\ReactOS\system32\apphelp.dll (79890000 - 79896000) C:\ReactOS\system32\advapi32_vista.dll (79C20000 - 79C86000) C:\ReactOS\system32\usp10.dll (7A200000 - 7A248000) C:\ReactOS\System32\uxtheme.dll (7A860000 - 7A878000) C:\ReactOS\System32\powrprof.dll (7A910000 - 7A93D000) C:\ReactOS\System32\msacm32.dll (7AB30000 - 7AB56000) C:\ReactOS\system32\imm32.dll (7AEB0000 - 7B00F000) C:\ReactOS\system32\setupapi.dll (7B020000 - 7B1DF000) C:\ReactOS\system32\oleaut32.dll (7B1F0000 - 7B20C000) C:\ReactOS\system32\version.dll (7B240000 - 7BAEC000) C:\ReactOS\system32\shell32.dll (7BBA0000 - 7BC42000) C:\ReactOS\System32\winmm.dll (7BC60000 - 7BC95000) C:\ReactOS\system32\winspool.drv (7BCA0000 - 7BE6B000) C:\ReactOS\system32\ole32.dll (7C060000 - 7C110000) C:\ReactOS\system32\rpcrt4.dll (7C130000 - 7C1C1000) C:\ReactOS\system32\shlwapi.dll (7C1E0000 - 7C1F3000) C:\ReactOS\system32\ws2help.dll (7C210000 - 7C244000) C:\ReactOS\system32\ws2_32.dll (7C260000 - 7C292000) C:\ReactOS\System32\iphlpapi.dll (7C330000 - 7C36A000) C:\ReactOS\System32\dhcpcsvc.dll (7C380000 - 7C4E3000) C:\ReactOS\system32\user32.dll (7C500000 - 7C58E000) C:\ReactOS\system32\gdi32.dll (7C5B0000 - 7C64B000) C:\ReactOS\system32\advapi32.dll (7C660000 - 7C6FF000) C:\ReactOS\system32\msvcrt.dll (7C710000 - 7C90A000) C:\ReactOS\system32\kernel32.dll (7C920000 - 7CA29000) C:\ReactOS\System32\ntdll.dll State Dump for Thread Id 0x1b4 (CRASH) eax:00000000 ebx:0023A8F0 ecx:00000000 edx:0023A928 esi:0006008E edi:00000000 eip:0041739E esp:0022F820 ebp:0022F890 dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0022F890 0041739E 0000007B 0006008E FFFFFFFF 0022F8DC explorer!CTrayWindow::IsSpecialHWND 0022F958 00419A20 0006008E 0000007B 0006008E FFFFFFFF explorer!CTrayWindow::ProcessWindowMessage 0022F9B8 0042970F 0023A8F0 0000007B 0006008E FFFFFFFF explorer!CWindowImplBaseT >::WindowProc 0022F9E8 7C3E169E 00BB0000 0006008E 0000007B 0006008E user32!IsWow64Message 0022FB40 7C3D5750 003440A0 0006008E 0000007B 0006008E user32! 0022FB90 7C3D5B99 003440A0 0006008E 0000007B 0006008E user32!IntCallMessageProc 0022FBF8 7C3D62C6 0022FC14 0022FC14 00000000 00000000 user32!DispatchMessageW 0022FC38 0040A4E9 0023A91C 004330A4 0043D074 0005DFE8 explorer!TrayMessageLoop 0022FE58 0040158A 00000003 0042E000 00433080 004331A3 explorer!StartWithDesktop 0022FED0 004016ED 00400000 00000000 00235B2E 00000001 explorer!wWinMain 0022FEE8 0041544D 00000001 0023B258 00233E90 B0B2B5A8 explorer!wmain 0022FF98 00414519 0022FFF0 7C720B57 FFFFFFFE 00000009 explorer!__tmainCRTStartup 0022FFA0 00414562 FFFFFFFE 00000009 0022FFF8 00000004 explorer!wWinMainCRTStartup 0022FFF0 7C720B57 0041454B 00000000 EC0100ED 00000000 kernel32!BaseProcessStartup *----> Raw Stack Dump <----* 0022FFF8 4b 45 41 00 00 00 00 00 - ed 00 01 ec 00 00 00 00 KEA............. 00230008 ee ff ee ff 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 00230018 00 00 23 00 00 00 23 00 - 00 01 00 00 68 07 23 00 ..#...#.....h.#. 00230028 00 00 33 00 c8 00 00 00 - 01 00 00 00 00 00 00 00 ..3............. 00230038 b0 06 23 00 b0 06 23 00 - 02 00 00 00 00 00 00 00 ..#...#......... 00230048 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 00230058 00 00 00 00 00 00 00 00 - 00 fe 00 00 ff ee ef 0e ................ 00230068 00 00 10 00 00 20 00 00 - 00 02 00 00 00 20 00 00 ..... ....... .. 00230078 b9 15 00 00 ff ef fd 7f - 01 00 68 07 00 00 00 00 ..........h..... 00230088 00 00 00 00 00 00 00 00 - c0 06 23 00 50 07 23 00 ..........#.P.#. State Dump for Thread Id 0x244 eax:00000118 ebx:00E9FB34 ecx:8009C000 edx:00000000 esi:00000000 edi:00000000 eip:7C92E6AA esp:00E9FAE4 ebp:00E9FB6C dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 00E9FB6C 7C92E6AA 00000007 00258010 00000000 FFFFFFFF ntdll!EtwQueryAllTracesA 00E9FB8C 7C725DE3 00000007 00258010 00000000 FFFFFFFF kernel32!WaitForMultipleObjects 00E9FFA4 00405D24 00243DB0 00000000 B0AA1064 FFFFFFFF explorer!CIconWatcher::WatcherThread 00E9FFEC 7C72B5CF 00405C2C 00243DB0 00000000 4E9F000D kernel32!BaseThreadStartup *----> Raw Stack Dump <----* 00E9FFF4 2c 5c 40 00 b0 3d 24 00 - 00 00 00 00 0d 00 9f 4e ,\@..=$........N 00EA0004 01 00 3f 00 3f 00 3f 00 - 3f 00 00 00 00 00 00 00 ..?.?.?.?....... 00EA0014 00 00 00 00 00 00 03 01 - 00 00 01 00 02 00 03 00 ................ 00EA0024 04 00 05 00 06 00 07 00 - 08 00 09 00 0a 00 0b 00 ................ 00EA0034 0c 00 0d 00 0e 00 0f 00 - 10 00 11 00 12 00 13 00 ................ 00EA0044 14 00 15 00 16 00 17 00 - 18 00 19 00 1a 00 1b 00 ................ 00EA0054 1c 00 1d 00 1e 00 1f 00 - 20 00 21 00 22 00 23 00 ........ .!.".#. 00EA0064 24 00 25 00 26 00 27 00 - 28 00 29 00 2a 00 2b 00 $.%.&.'.(.).*.+. 00EA0074 2c 00 2d 00 2e 00 2f 00 - 30 00 31 00 32 00 33 00 ,.-.../.0.1.2.3. 00EA0084 34 00 35 00 36 00 37 00 - 38 00 39 00 3a 00 3b 00 4.5.6.7.8.9.:.;. State Dump for Thread Id 0x248 eax:000011CB ebx:0006008E ecx:8009C000 edx:00000000 esi:0000004A edi:B0A8B5B8 eip:7C92E6AA esp:0131ECDC ebp:0131ED54 dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0131ED54 7C92E6AA 0006008E 0000004A 000200C6 0131ED84 ntdll!EtwQueryAllTracesA 0131F164 7B29AC97 00000001 0131F4F0 0131F188 000002B1 shell32!Shell_NotifyIconW 0131F8BC 75886F4E 00000000 002544B8 00000000 00000000 netshell!UpdateLanStatus 0131F8DC 75887CAF 000200C6 00000113 0000FABC 00000000 netshell!LANStatusDlg 0131F90C 7C3E169E 75887BFD 000200C6 00000113 0000FABC user32!IsWow64Message 0131FA64 7C3D5785 003459A0 000200C6 00000113 0000FABC user32! 0131FA94 7C3D5DB8 75887BFD 000200C6 00000113 0000FABC user32!CallWindowProcW 0131FAC4 7C3C14B4 000200C6 00000113 0000FABC 00000000 user32!DefDlgProcW 0131FAF4 7C3E169E 7C3C1430 000200C6 00000113 0000FABC user32!IsWow64Message 0131FC4C 7C3D5785 003459A0 000200C6 00000113 0000FABC user32! 0131FC9C 7C3D5B99 003459A0 000200C6 00000113 0000FABC user32!IntCallMessageProc 0131FD04 7C3D62C6 0131FD20 00000000 00000000 00000000 user32!DispatchMessageW 0131FD44 746616FF 00000188 0000C066 00000000 86400000 stobject!CSysTray::SysTrayMessageLoop 0131FF9C 74661927 0131FFEC 7C72B5CF 00245610 00000000 stobject!CSysTray::SysTrayThreadProc 0131FFA4 74661967 00245610 00000000 B0A8C594 FFFFFFFF stobject!CSysTray::s_SysTrayThreadProc 0131FFEC 7C72B5CF 7466195C 00245610 00000000 00000000 kernel32!BaseThreadStartup *----> Raw Stack Dump <----* 0131FFF4 5c 19 66 74 10 56 24 00 - 00 00 00 00 00 00 00 00 \.ft.V$......... 01320004 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01320014 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01320024 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01320034 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01320044 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01320054 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01320064 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01320074 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01320084 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ State Dump for Thread Id 0x268 eax:00000119 ebx:00000000 ecx:8009C000 edx:F7C9CD64 esi:000002B4 edi:00000000 eip:7C92E6AA esp:0156DB54 ebp:0156DBB4 dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0156DBB4 7C92E6AA 000002B4 FFFFFFFF 00000000 00000050 ntdll!EtwQueryAllTracesA 0156DBCC 7C725BD8 000002B4 FFFFFFFF 00000000 00000000 kernel32!WaitForSingleObject 0156DC14 7C097056 00259778 0156DC54 00000010 00258E98 rpcrt4!rpcrt4_conn_np_read 0156DC74 7C08A496 00259778 00000001 0156DCCC 7C94551A rpcrt4!RPCRT4_receive_fragment 0156DCE4 7C08A7CA 00259778 0156DD28 0156DD34 0156DD2C rpcrt4!RPCRT4_ReceiveWithAuth 0156DD74 7C080461 00258BA0 7C5F3A24 7C5F3A38 00000000 rpcrt4!RpcAssoc_GetClientConnection 0156DDA4 7C08217D 0025AF70 0156DDD8 7C5F3A38 7C5F3A24 rpcrt4!RPCRT4_OpenBinding 0156DDEC 7C08AF91 0156E38C 7C5F29CE 0156DE2C 7C5F29EE rpcrt4!I_RpcNegotiateTransferSyntax 0156DE24 7C08B0D0 0156E38C 7C07C30A 00000000 0156E41C rpcrt4!I_RpcGetBuffer 0156DE64 7C064F62 0156E2B0 00000020 0025AF70 00000000 rpcrt4!NdrGetBuffer 0156E3EC 7C07DEE5 7C5F2820 7C5F29C4 0156E41C 00000000 rpcrt4!ndr_client_call 0156E404 7C07E1C4 7C5F2820 7C5F29C4 0156E41C 00000010 rpcrt4!NdrClientCall2 0156E42C 7C5DF639 00000000 0156E4CC 00000800 0156E4C8 advapi32!LsarOpenPolicy 0156E494 7C5BF8E9 0156E4E4 0156E4CC 00000800 0156E4C8 advapi32!LsaOpenPolicy 0156E4FC 7C5C1B9F 00000000 0024E268 0156E588 0156E530 advapi32!LookupAccountSidW 0156E54C 7C5C21BB 0156E588 0156E584 00000000 00000000 advapi32!GetUserNameW 0156EBB4 7B2C6284 000002C8 7B322260 00000000 0156EE08 shell32!_SHExpandEnvironmentStrings 0156F22C 7B2C6783 0156F55C 7C3D5940 005D1307 000200BC shell32!_SHGetUserShellFolderPath 0156F30C 7B2C7977 0156F55C 00000014 09010071 00000000 shell32!_SHGetUserProfilePath 0156F97C 7B2C8043 00000000 00000010 00000000 00000000 shell32!SHGetFolderPathAndSubDirW 0156F99C 7B2C869D 00000000 00000010 00000000 00000000 shell32!SHGetFolderPathW 0156FBF4 7B2C9032 00000000 00000010 00000000 00000000 shell32!SHGetFolderLocation 0156FC24 7B290982 0000000F 00000000 00000000 00000001 shell32!ILIsParentOrSpecialParent 0156FC6C 7B294BF7 00001511 0198F5A4 80000002 0156FC88 shell32!CDefView::OnChangeNotify 0156FC9C 7B3021A1 000200BA 00001511 0198F5A4 80000002 shell32!CDefView::ProcessWindowMessage 0156FCFC 7B301DA3 0024A0A8 00001511 0198F5A4 80000002 shell32!CDefView::WindowProc 0156FD2C 7C3E169E 01580000 000200BA 00001511 0198F5A4 user32!IsWow64Message 0156FE84 7C3D5750 00345568 000200BA 00001511 0198F5A4 user32! 0156FEDC 7C3D7569 0156FEF4 00000020 0156FFB8 7C92E5AC user32!User32CallWindowProcFromKernel 0156FF2C 7C92E5FD 0156FF48 00000000 00000000 00000000 ntdll!EtwQueryAllTracesA 0156FF6C 7B2E4888 00249FF9 000000C9 0156FFA4 0042052A shell32!SHDesktopMessageLoop 0156FF7C 004019F4 00249FF9 00435B5C 0156FF98 00000000 explorer!_SHDesktopMessageLoop 0156FFA4 0042052A 0024A280 00000000 B0A876DC FFFFFFFF explorer!CDesktopThread::s_DesktopThreadProc 0156FFEC 7C72B5CF 004204BC 0024A280 00000000 042444C7 kernel32!BaseThreadStartup *----> Raw Stack Dump <----* 0156FFF4 bc 04 42 00 80 a2 24 00 - 00 00 00 00 c7 44 24 04 ..B...$......D$. 01570004 d0 9f 24 00 e9 23 01 d9 - 79 00 00 00 00 00 00 00 ..$..#..y....... 01570014 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01570024 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01570034 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01570044 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01570054 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01570064 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01570074 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01570084 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ State Dump for Thread Id 0x26c eax:00000118 ebx:0178FEEC ecx:8009C000 edx:00000000 esi:00000001 edi:00000000 eip:7C92E6AA esp:0178FE9C ebp:0178FF24 dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0178FF24 7C92E6AA 00000002 0024DDE8 00000000 FFFFFFFF ntdll!EtwQueryAllTracesA 0178FF5C 7C099A50 002556D0 00000002 0024DDE8 80887590 rpcrt4!rpcrt4_protseq_np_wait_for_new_connection 0178FFA4 7C08E4B7 002556D0 00000000 B0A7FDF4 FFFFFFFF rpcrt4!RPCRT4_server_thread 0178FFEC 7C72B5CF 7C08E405 002556D0 00000000 00000000 kernel32!BaseThreadStartup State Dump for Thread Id 0x270 eax:000011CB ebx:000200BA ecx:8009C000 edx:00000000 esi:00001511 edi:B0A57620 eip:7C92E6AA esp:0198F1F4 ebp:0198F284 dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0198F284 7C92E6AA 000200BA 00001511 0198F5A4 80000002 ntdll!EtwQueryAllTracesA 0198F5BC 7B2B5010 80000002 00000005 0198F5E4 00000000 shell32!SHChangeNotify 0198FC0C 7B2B5A4E 0024E028 0025A398 0000004C 00000000 shell32!_ProcessNotification 0198FC34 7B2B5D1C 00000000 0000004C 0024E23C F896201B shell32!_NotificationCompletion 0198FC54 7C73738E 7B2B5A9C 0024E23C 00000000 00010017 kernel32!BasepIoCompletionSimple 0198FF94 7C92E58A FFFFFFFF 00000001 0198FFEC 7C72B5CF ntdll!EtwQueryAllTracesA 0198FFA4 7B2B421D 00000000 00000000 B0A7FA0C FFFFFFFF shell32!_RunAsyncThreadProc 0198FFEC 7C72B5CF 7B2B41F9 00000000 00000000 EC0100ED kernel32!BaseThreadStartup *----> Raw Stack Dump <----* 0198FFF4 f9 41 2b 7b 00 00 00 00 - 00 00 00 00 ed 00 01 ec .A+{............ 01990004 00 00 00 00 ee ff ee ff - 00 00 00 00 00 00 00 00 ................ 01990014 00 00 00 00 00 00 99 01 - 00 00 99 01 10 00 00 00 ................ 01990024 68 07 99 01 00 00 9a 01 - 00 00 00 00 00 00 00 00 h............... 01990034 00 00 00 00 38 00 99 01 - 38 00 99 01 02 00 00 00 ....8...8....... 01990044 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01990054 00 00 00 00 00 00 00 00 - 00 00 00 00 00 fe 00 00 ................ 01990064 ff ee ef 0e 00 00 10 00 - 00 20 00 00 00 02 00 00 ......... ...... 01990074 00 20 00 00 0c 1f 00 00 - ff ef fd 7f 04 00 68 07 . ............h. 01990084 00 00 00 00 00 00 00 00 - 00 00 00 00 a8 06 99 01 ................ State Dump for Thread Id 0x298 eax:7FFDA000 ebx:00000001 ecx:00000002 edx:00000003 esi:00000004 edi:00000005 eip:7C92EA63 esp:019AFFE8 ebp:019AFFF4 dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 019AFFF4 7C92EA63 00000000 00000000 00000000 00000000 ntdll!EtwpSetHWConfigFunction