ReactOS 0.4.11-dev DrWtsn32 Application exception occurred: App: explorer.exe (pid=436, tid=0x2a0) When: 2/11/2018 @ 10:43:03.204 Exception number: 0xc0000005 (EXCEPTION_ACCESS_VIOLATION) *----> System Information <----* Computer Name: REACTOS-NHU93QQ User Name: Administrator Number of Processors: 1 Processor Type: x86 Family 15 Model 2 Stepping 9 ReactOS Version: 5.2 BuildLab: 20181101-0.4.11-dev-640-g8cbaca5.GNU_4.7.2 Service Pack: Service Pack 2 Current Type: Uniprocessor Checked Registered Organization: Registered Owner: Владелец *----> Task List <----* 0: [System Process] 4: System 88: smss.exe 136: csrss.exe 160: winlogon.exe 176: services.exe 184: lsass.exe 208: eventlog.exe 328: rpcss.exe 412: svchost.exe 436: explorer.exe 448: svchost.exe 480: wlansvc.exe 540: spoolsv.exe 656: kbswitch.exe 976: drwtsn32.exe *----> Module List <----* (00000000 - 0017F000) C:\ReactOS\explorer.exe (73390000 - 7340E000) C:\ReactOS\System32\stobject.dll (735E0000 - 7372C000) C:\ReactOS\System32\shellbtrfs.dll (73740000 - 73777000) C:\ReactOS\System32\shdocvw.dll (746C0000 - 74757000) C:\ReactOS\System32\netshell.dll (75980000 - 7599C000) C:\ReactOS\System32\msacm32.drv (75B90000 - 75BA7000) C:\ReactOS\System32\midimap.dll (75EE0000 - 75F02000) C:\ReactOS\System32\lpk.dll (76590000 - 7659A000) C:\ReactOS\system32\kernel32_vista.dll (77A20000 - 77B89000) C:\ReactOS\system32\user32.dll (79270000 - 793E7000) C:\ReactOS\System32\browseui.dll (79400000 - 79411000) C:\ReactOS\System32\beepmidi.dll (79680000 - 796AE000) C:\ReactOS\system32\apphelp.dll (79760000 - 7976E000) C:\ReactOS\system32\advapi32_vista.dll (79B80000 - 79BE7000) C:\ReactOS\system32\usp10.dll (7A170000 - 7A1BA000) C:\ReactOS\System32\uxtheme.dll (7A1D0000 - 7A207000) C:\ReactOS\System32\userenv.DLL (7A7D0000 - 7A7E9000) C:\ReactOS\System32\powrprof.dll (7A890000 - 7A8BE000) C:\ReactOS\System32\msacm32.dll (7AAB0000 - 7AAD8000) C:\ReactOS\system32\imm32.dll (7AE30000 - 7AF92000) C:\ReactOS\system32\setupapi.dll (7AFB0000 - 7B16F000) C:\ReactOS\system32\oleaut32.dll (7B190000 - 7B1AD000) C:\ReactOS\system32\version.dll (7B1E0000 - 7BA91000) C:\ReactOS\system32\shell32.dll (7BAB0000 - 7BBA1000) C:\ReactOS\system32\comdlg32.dll (7BBC0000 - 7BC63000) C:\ReactOS\System32\winmm.dll (7BC80000 - 7BCB7000) C:\ReactOS\system32\winspool.drv (7BCD0000 - 7BE9C000) C:\ReactOS\system32\ole32.dll (7BEB0000 - 7C076000) C:\ReactOS\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.2600.2982_none_deadbeef\comctl32.dll (7C090000 - 7C142000) C:\ReactOS\system32\rpcrt4.dll (7C160000 - 7C1F3000) C:\ReactOS\system32\shlwapi.dll (7C210000 - 7C224000) C:\ReactOS\system32\ws2help.dll (7C240000 - 7C275000) C:\ReactOS\system32\ws2_32.dll (7C290000 - 7C2C4000) C:\ReactOS\System32\iphlpapi.dll (7C360000 - 7C39B000) C:\ReactOS\System32\dhcpcsvc.dll (7C3B0000 - 7C440000) C:\ReactOS\system32\gdi32.dll (7C460000 - 7C4FD000) C:\ReactOS\system32\advapi32.dll (7C510000 - 7C5B0000) C:\ReactOS\system32\msvcrt.dll (7C5D0000 - 7C901000) C:\ReactOS\system32\kernel32.dll (7C920000 - 7CA2C000) C:\ReactOS\System32\ntdll.dll State Dump for Thread Id 0x2a0 (CRASH) eax:00255A02 ebx:0024F250 ecx:00001680 edx:000067B2 esi:00250000 edi:002DBDB8 eip:7C53AA31 esp:01D2D35C ebp:01D2D364 dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 01D2D364 7C53AA31 002DB008 0024F250 000067B2 00273CF8 msvcrt!memcmp 01D2D39C 7B25AF01 0024F250 002A0059 01D2D3CC 77A4F497 shell32!ILClone 01D2D3EC 7B25BD0C 0024F250 792C65D0 01D2D448 01D2D438 shell32!SHBindToParent 01D2D674 7928C32C 002D41F0 0024F250 01D2D694 00000003 browseui!CShellBrowser::BrowseToPath 01D2D6AC 7928C67C 0024F250 00000003 00000000 00000001 browseui!CShellBrowser::BrowseToPIDL 01D2D6C4 7928C7A6 00266F98 0024F250 00000000 0024F250 browseui!CShellBrowser::BrowseObject 01D2D704 7927612D 00273CC8 00000000 00000002 00000000 browseui!CAddressEditBox::Execute 01D2D71C 79275E73 00273CC8 00030116 00000111 0001A205 browseui!CAddressEditBox::OnWinEvent 01D2D764 79275855 00274EB0 00030116 00000111 0001A205 browseui!CAddressBand::OnWinEvent 01D2D794 792839E2 00274ED9 00030116 00000111 0001A205 browseui!IUnknown_RelayWinEvent 01D2D7C4 79283AA1 0026D878 00030116 00000111 0001A205 browseui!CInternetToolbar::OnWinEvent 01D2D7F4 79286C84 00000111 0001A205 00030116 01D2D810 browseui!CInternetToolbar::OnCommand 01D2D824 792A6BB3 000300FA 00000111 0001A205 00030116 browseui!CInternetToolbar::ProcessWindowMessage 01D2D884 792B24DF 0026D878 00000111 0001A205 00030116 browseui!CWindowImplBaseT >::WindowProc 01D2D8B4 77A82DEE 01D50000 000300FA 00000111 0001A205 user32!IsWow64Message 01D2DA0C 77A76EA0 00354E10 000300FA 00000111 0001A205 user32! 01D2DA5C 77A772E9 00354E10 000300FA 00000111 0001A205 user32!IntCallMessageProc 01D2DAD4 77A77EB8 000300FA 00000111 0001A205 00030116 user32!SendMessageW 01D2DB84 7BF1EBC4 000200FC 00000111 0001A205 00030116 comctl32! 01D2DBB4 77A82DEE 7BF1CFF9 000200FC 00000111 0001A205 user32!IsWow64Message 01D2DD0C 77A76EA0 00354F08 000200FC 00000111 0001A205 user32! 01D2DD5C 77A772E9 00354F08 000200FC 00000111 0001A205 user32!IntCallMessageProc 01D2DDD4 77A77EB8 000200FC 00000111 0001A205 00030116 user32!SendMessageW 01D2E444 7BEBD70C 00030116 00000000 00000047 00000000 comctl32!COMBOEX_Command 01D2E54C 7BEC0119 00030116 00000111 0001A205 00020118 comctl32! 01D2E57C 77A82DEE 7BEBE8D0 00030116 00000111 0001A205 user32!IsWow64Message 01D2E6D4 77A76EA0 00356BA0 00030116 00000111 0001A205 user32! 01D2E704 77A77508 7BEBE8D0 00030116 00000111 0001A205 user32!CallWindowProcW 01D2E764 792B25A3 00274EB0 00000111 0001A205 00020118 browseui!CWindowImplBaseT >::WindowProc 01D2E794 77A82DEE 01D90000 00030116 00000111 0001A205 user32!IsWow64Message 01D2E8EC 77A76EA0 00356BA0 00030116 00000111 0001A205 user32! 01D2E91C 77A77508 01D90000 00030116 00000111 0001A205 user32!CallWindowProcW 01D2E974 792B28EB 00273D10 00000111 0001A205 00020118 browseui!CContainedWindowT >::WindowProc 01D2E9A4 77A82DEE 01DF0000 00030116 00000111 0001A205 user32!IsWow64Message 01D2EAFC 77A76EA0 00356BA0 00030116 00000111 0001A205 user32! 01D2EB4C 77A772E9 00356BA0 00030116 00000111 0001A205 user32!IntCallMessageProc 01D2EBC4 77A77EB8 00030116 00000111 0001A205 00020118 user32!SendMessageW 01D2EC7C 7BEBAC86 00020118 00000111 000103E8 0002011A comctl32! 01D2ECAC 77A82DEE 7BEB9716 00020118 00000111 000103E8 user32!IsWow64Message 01D2EE04 77A76EA0 00356C98 00020118 00000111 000103E8 user32! 01D2EE34 77A77508 7BEB9716 00020118 00000111 000103E8 user32!CallWindowProcW 01D2EE74 7BEC4E73 00020118 00000111 000103E8 0002011A comctl32!DefSubclassProc 01D2F534 7BEBE8C3 00020118 00000111 000103E8 0002011A comctl32!COMBOEX_ComboWndProc 01D2F574 7BEC4EC9 00020118 00000111 000103E8 0002011A comctl32!DefSubclassProc 01D2F5B4 7BEC4FDE 00020118 00000111 000103E8 0002011A comctl32!COMCTL32_SubclassProc 01D2F5E4 77A82DEE 7BEC4EDB 00020118 00000111 000103E8 user32!IsWow64Message 01D2F73C 77A76EA0 00356C98 00020118 00000111 000103E8 user32! 01D2F78C 77A772E9 00356C98 00020118 00000111 000103E8 user32!IntCallMessageProc 01D2F804 77A77EB8 00020118 00000111 000103E8 0002011A user32!SendMessageW 01D2F824 7BEE63A2 01D2FAB4 00000190 0000002B 00000084 comctl32!LISTBOX_HandleLButtonUp 01D2FD14 7BEEB1D0 0002011A 00000202 00000000 002B0190 comctl32! 01D2FD44 77A82DEE 7BEE8B0D 0002011A 00000202 00000000 user32!IsWow64Message 01D2FE9C 77A76EA0 00356D90 0002011A 00000202 00000000 user32! 01D2FEEC 77A772E9 00356D90 0002011A 00000202 00000000 user32!IntCallMessageProc 01D2FF54 77A77A16 01D2FF78 01D2FF78 00000000 00000000 user32!DispatchMessageW 01D2FFA4 7927E01E 00267420 8001003B F975FC84 FFFFFFFF browseui!BrowserThreadProc 01D2FFEC 7C5EB86F 7927DE76 00267420 00000000 042444C7 kernel32!BaseThreadStartup *----> Raw Stack Dump <----* 01D2FFF4 76 de 27 79 20 74 26 00 - 00 00 00 00 c7 44 24 04 v.'y t&......D$. 01D30004 98 6f 26 00 e9 5b a7 55 - 77 00 00 00 00 00 00 00 .o&..[.Uw....... 01D30014 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01D30024 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01D30034 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01D30044 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01D30054 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01D30064 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01D30074 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01D30084 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ State Dump for Thread Id 0x1b8 eax:000011A4 ebx:0022FC14 ecx:00000000 edx:00000000 esi:00255108 edi:00000030 eip:7C92F105 esp:0022FBE0 ebp:0022FBF8 dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0022FBF8 7C92F105 0022FC14 00000000 00000000 00000000 ntdll!EtwQueryAllTracesA 0022FC38 0040A6BD 00255134 004340EC 0043F074 0004E870 explorer!TrayMessageLoop 0022FE58 0040158A 00000003 0042F000 004340C9 004341EB explorer!StartWithDesktop 0022FED0 004016ED 00400000 00000000 0023633E 00000001 explorer!wWinMain 0022FEE8 0041597D 00000001 0023FC18 002369C8 FFB76DB0 explorer!wmain 0022FF98 00414A41 0022FFF0 7C5E0CF7 FFFFFFFE 00000009 explorer!__tmainCRTStartup 0022FFA0 00414A8A FFFFFFFE 00000009 0022FFF8 00000004 explorer!wWinMainCRTStartup 0022FFF0 7C5E0CF7 00414A73 00000000 EC0100ED 00000000 kernel32!BaseProcessStartup *----> Raw Stack Dump <----* 0022FFF8 73 4a 41 00 00 00 00 00 - ed 00 01 ec 00 00 00 00 sJA............. 00230008 ee ff ee ff 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 00230018 00 00 23 00 00 00 23 00 - 00 01 00 00 68 07 23 00 ..#...#.....h.#. 00230028 00 00 33 00 55 00 00 00 - 06 00 00 00 00 00 00 00 ..3.U........... 00230038 28 07 23 00 b0 06 23 00 - 02 00 00 00 00 00 00 00 (.#...#......... 00230048 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 00230058 00 00 00 00 00 00 00 00 - 00 fe 00 00 ff ee ef 0e ................ 00230068 00 00 10 00 00 20 00 00 - 00 02 00 00 00 20 00 00 ..... ....... .. 00230078 a9 13 00 00 ff ef fd 7f - 01 00 68 07 00 00 00 00 ..........h..... 00230088 00 00 00 00 00 00 00 00 - f0 06 23 00 50 07 23 00 ..........#.P.#. State Dump for Thread Id 0x25c eax:00000118 ebx:0123FB34 ecx:FFFFFFFF edx:00000000 esi:00000000 edi:00000000 eip:7C92F105 esp:0123FAE4 ebp:0123FB6C dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0123FB6C 7C92F105 00000006 0026C610 00000000 FFFFFFFF ntdll!EtwQueryAllTracesA 0123FB8C 7C5E5FB3 00000006 0026C610 00000000 FFFFFFFF kernel32!WaitForMultipleObjects 0123FFA4 00405D24 0025B108 8001003B F943BC84 FFFFFFFF explorer!CIconWatcher::WatcherThread 0123FFEC 7C5EB86F 00405C2C 0025B108 00000000 EC0100ED kernel32!BaseThreadStartup *----> Raw Stack Dump <----* 0123FFF4 2c 5c 40 00 08 b1 25 00 - 00 00 00 00 ed 00 01 ec ,\@...%......... 01240004 00 00 00 00 ee ff ee ff - 00 00 00 00 00 00 00 00 ................ 01240014 00 00 00 00 00 00 24 01 - 00 00 24 01 10 00 00 00 ......$...$..... 01240024 68 07 24 01 00 00 25 01 - 00 00 00 00 00 00 00 00 h.$...%......... 01240034 00 00 00 00 38 00 24 01 - 38 00 24 01 02 10 00 00 ....8.$.8.$..... 01240044 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01240054 00 00 00 00 00 00 00 00 - 00 00 00 00 00 fe 00 00 ................ 01240064 ff ee ef 0e 00 00 10 00 - 00 20 00 00 00 02 00 00 ......... ...... 01240074 00 20 00 00 02 1f 00 00 - ff ef fd 7f 03 00 68 07 . ............h. 01240084 00 00 00 00 00 00 00 00 - 00 00 00 00 a8 06 24 01 ..............$. State Dump for Thread Id 0x260 eax:000011A4 ebx:0145FD20 ecx:00000000 edx:00000000 esi:01250000 edi:0000C096 eip:7C92F105 esp:0145FCEC ebp:0145FD04 dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0145FD04 7C92F105 0145FD20 00000000 00000000 00000000 ntdll!EtwQueryAllTracesA 0145FD44 73391722 00000188 0000C096 00000000 86400000 stobject!CSysTray::SysTrayMessageLoop 0145FF9C 73391927 0145FFEC 7C5EB86F 0025C808 8001003B stobject!CSysTray::SysTrayThreadProc 0145FFA4 73391967 0025C808 8001003B F9423C84 FFFFFFFF stobject!CSysTray::s_SysTrayThreadProc 0145FFEC 7C5EB86F 7339195C 0025C808 00000000 00000000 kernel32!BaseThreadStartup *----> Raw Stack Dump <----* 0145FFF4 5c 19 39 73 08 c8 25 00 - 00 00 00 00 00 00 00 00 \.9s..%......... 01460004 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01460014 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01460024 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01460034 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01460044 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01460054 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01460064 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01460074 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01460084 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ State Dump for Thread Id 0x27c eax:000011A4 ebx:016CFF48 ecx:00000000 edx:00000000 esi:00260C71 edi:00000000 eip:7C92F105 esp:016CFF14 ebp:016CFF2C dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 016CFF2C 7C92F105 016CFF48 00000000 00000000 00000000 ntdll!EtwQueryAllTracesA 016CFF6C 7B28573E 00260C71 000000C9 016CFFA4 0042163A shell32!SHDesktopMessageLoop 016CFF7C 004019F4 00260C71 00436D68 016CFF98 8093470C explorer!_SHDesktopMessageLoop 016CFFA4 0042163A 00263D58 8001003B F93F7C84 FFFFFFFF explorer!CDesktopThread::s_DesktopThreadProc 016CFFEC 7C5EB86F 004215CC 00263D58 00000000 042444C7 kernel32!BaseThreadStartup *----> Raw Stack Dump <----* 016CFFF4 cc 15 42 00 58 3d 26 00 - 00 00 00 00 c7 44 24 04 ..B.X=&......D$. 016D0004 48 0c 26 00 e9 f3 12 bd - 79 00 00 00 00 00 00 00 H.&.....y....... 016D0014 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 016D0024 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 016D0034 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 016D0044 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 016D0054 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 016D0064 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 016D0074 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 016D0084 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ State Dump for Thread Id 0x280 eax:00000118 ebx:018EFEEC ecx:FFFFFFFF edx:00000000 esi:00000001 edi:00000000 eip:7C92F105 esp:018EFE9C ebp:018EFF24 dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 018EFF24 7C92F105 00000003 0028F0E0 00000000 FFFFFFFF ntdll!EtwQueryAllTracesA 018EFF5C 7C0C9AB9 0026B150 00000003 0028F0E0 8088A060 rpcrt4!rpcrt4_protseq_np_wait_for_new_connection 018EFFA4 7C0BE4A7 0026B150 8001003B F93F7C84 FFFFFFFF rpcrt4!RPCRT4_server_thread 018EFFEC 7C5EB86F 7C0BE3F5 0026B150 00000000 00000000 kernel32!BaseThreadStartup State Dump for Thread Id 0x284 eax:000011CB ebx:0012010C ecx:01AEF23C edx:00000000 esi:00001511 edi:FFA9C4A8 eip:7C92F105 esp:01AEF1F4 ebp:01AEF284 dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 01AEF284 7C92F105 0012010C 00001511 01AEF5A4 80000002 ntdll!EtwQueryAllTracesA 01AEF5BC 7B2566E0 80000002 00000005 01AEF5E4 00000000 shell32!SHChangeNotify 01AEFC0C 7B25711E 00265C48 00272570 0000004C 002C15BC shell32!_ProcessNotification 01AEFC34 7B2573EC 00000000 0000004C 00265E5C 01AEFF58 shell32!_NotificationCompletion 01AEFC54 7C5F762E 7B25716C 00265E5C 00000000 00010017 kernel32!BasepIoCompletionSimple 01AEFF94 7C92EFEA FFFFFFFF 00000001 01AEFFEC 7C5EB86F ntdll!EtwQueryAllTracesA 01AEFFA4 7B2558ED 00000000 8001003B F93E3C84 FFFFFFFF shell32!_RunAsyncThreadProc 01AEFFEC 7C5EB86F 7B2558C9 00000000 00000000 004C0041 kernel32!BaseThreadStartup *----> Raw Stack Dump <----* 01AEFFF4 c9 58 25 7b 00 00 00 00 - 00 00 00 00 41 00 4c 00 .X%{........A.L. 01AF0004 4c 00 55 00 53 00 45 00 - 52 00 53 00 50 00 52 00 L.U.S.E.R.S.P.R. 01AF0014 4f 00 46 00 49 00 4c 00 - 45 00 3d 00 43 00 3a 00 O.F.I.L.E.=.C.:. 01AF0024 5c 00 44 00 6f 00 63 00 - 75 00 6d 00 65 00 6e 00 \.D.o.c.u.m.e.n. 01AF0034 74 00 73 00 20 00 61 00 - 6e 00 64 00 20 00 53 00 t.s. .a.n.d. .S. 01AF0044 65 00 74 00 74 00 69 00 - 6e 00 67 00 73 00 5c 00 e.t.t.i.n.g.s.\. 01AF0054 41 00 6c 00 6c 00 20 00 - 55 00 73 00 65 00 72 00 A.l.l. .U.s.e.r. 01AF0064 73 00 00 00 41 00 50 00 - 50 00 44 00 41 00 54 00 s...A.P.P.D.A.T. 01AF0074 41 00 3d 00 43 00 3a 00 - 5c 00 44 00 6f 00 63 00 A.=.C.:.\.D.o.c. 01AF0084 75 00 6d 00 65 00 6e 00 - 74 00 73 00 20 00 61 00 u.m.e.n.t.s. .a. State Dump for Thread Id 0x3d8 eax:7FFD9000 ebx:00000001 ecx:00000002 edx:00000003 esi:00000004 edi:00000005 eip:7C92F4C3 esp:009AFFE8 ebp:009AFFF4 dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 009AFFF4 7C92F4C3 00000000 00000000 00000000 00000000 ntdll!EtwpSetHWConfigFunction