ReactOS 0.4.11-dev DrWtsn32 Application exception occurred: App: Batch.exe (pid=720, tid=0x2d4) When: 2/10/2018 @ 00:14:03.583 Exception number: 0xc0000005 (EXCEPTION_ACCESS_VIOLATION) *----> System Information <----* Computer Name: REACTOS-K5TSOE9 User Name: Administrator Number of Processors: 1 Processor Type: x86 Family 15 Model 2 Stepping 9 ReactOS Version: 5.2 BuildLab: 20180929-0.4.11-dev-249-g0c12258.GNU_4.7.2 Service Pack: Service Pack 2 Current Type: Uniprocessor Checked Registered Organization: Registered Owner: Владелец *----> Task List <----* 0: [System Process] 4: System 88: smss.exe 148: csrss.exe 172: winlogon.exe 188: services.exe 196: lsass.exe 220: eventlog.exe 352: rpcss.exe 432: svchost.exe 448: svchost.exe 456: explorer.exe 528: wlansvc.exe 544: spoolsv.exe 664: kbswitch.exe 680: runMI.exe 700: MenuI.exe 720: Batch.exe 744: taskmgr.exe 808: drwtsn32.exe *----> Module List <----* (00000000 - 0007E000) C:\Program Files\Cognitive\CuneiForm\Batch.exe (00240000 - 00246000) C:\Program Files\Cognitive\CuneiForm\CTWWW.dll (00480000 - 00646000) C:\ReactOS\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.2600.2982_none_deadbeef\COMCTL32.dll (10000000 - 10130000) C:\Program Files\Cognitive\CuneiForm\GEAR32PD.dll (5F400000 - 5F4F2000) C:\Program Files\Cognitive\CuneiForm\CTL42.DLL (76650000 - 7665A000) C:\ReactOS\system32\kernel32_vista.dll (77A20000 - 77B89000) C:\ReactOS\system32\USER32.dll (79710000 - 7973D000) C:\ReactOS\system32\apphelp.dll (797F0000 - 797FE000) C:\ReactOS\system32\advapi32_vista.dll (79C10000 - 79C77000) C:\ReactOS\system32\usp10.dll (7A200000 - 7A24A000) C:\ReactOS\System32\uxtheme.dll (7A260000 - 7A296000) C:\ReactOS\System32\userenv.DLL (7AB30000 - 7AB58000) C:\ReactOS\system32\imm32.dll (7B210000 - 7B22D000) C:\ReactOS\system32\VERSION.dll (7B260000 - 7BB11000) C:\ReactOS\system32\shell32.dll (7BB20000 - 7BC11000) C:\ReactOS\system32\comdlg32.dll (7BCF0000 - 7BD27000) C:\ReactOS\system32\winspool.drv (7BD40000 - 7BF0C000) C:\ReactOS\system32\ole32.dll (7BF20000 - 7C0E6000) C:\ReactOS\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.2600.2982_none_deadbeef\comctl32.dll (7C100000 - 7C1B1000) C:\ReactOS\system32\rpcrt4.dll (7C1D0000 - 7C262000) C:\ReactOS\system32\shlwapi.dll (7C280000 - 7C294000) C:\ReactOS\system32\ws2help.dll (7C2B0000 - 7C2E5000) C:\ReactOS\system32\ws2_32.dll (7C420000 - 7C4B0000) C:\ReactOS\system32\gdi32.dll (7C4D0000 - 7C56C000) C:\ReactOS\system32\advapi32.dll (7C580000 - 7C620000) C:\ReactOS\system32\msvcrt.dll (7C640000 - 7C904000) C:\ReactOS\system32\kernel32.dll (7C920000 - 7CA2C000) C:\ReactOS\System32\ntdll.dll State Dump for Thread Id 0x2d4 (CRASH) eax:00000000 ebx:00000000 ecx:000002F4 edx:00000001 esi:00000000 edi:00155570 eip:5F415DAB esp:0012F050 ebp:0012F05C dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0012F05C 5F415DAB 00000000 00000002 000002F4 00000007 ctl42! 0012F0D8 5F415AB0 01FD02F8 5F40206F 00000000 000002F8 ctl42! 0012F164 5F415A25 00000005 00000000 5F49C798 0012F180 ctl42! 0012F184 5F401CEA 00000005 00000000 01FD02F8 00000005 ctl42! 0012F1E4 5F401C73 00000000 0002017C 00000005 00000000 ctl42! 0012F200 5F401BFB 0002017C 00000005 00000000 01FD02F8 ctl42! 0012F22C 5F401BBA 0002017C 00000005 00000000 01FD02F8 ctl42! 0012F25C 77A82ACE 5F401B81 0002017C 00000005 00000000 user32!IsWow64Message 0012F3B4 77A7629F 0036BF40 0002017C 00000005 00000000 user32!IntCallWindowProcW 0012F40C 77A788E9 0012F424 00000020 0012F688 7C92EFCC user32!User32CallWindowProcFromKernel 0012F544 7C92F01D 80000000 5F49FC8C 00000000 50000000 ntdll!EtwQueryAllTracesA 0012F5CC 77A7FDEF 00000000 5F49FC8C 00000000 50000000 user32!CreateWindowExA 0012F63C 5F40DDCC 00000000 5F49FC8C 00000000 50000000 ctl42! 0012F694 5F416021 001554B0 00000000 00000000 50000000 ctl42! 0012F6B0 5F416D88 001554B0 00000001 00000002 50000000 ctl42! 0012F794 0040EA14 00000001 00000000 0041E008 0012F7B0 batch! 0012F7B4 5F401CEA 00000001 00000000 00146688 001554B0 ctl42! 0012F830 0040ECEC 00000000 00020178 00000001 00000000 batch! 0012F84C 5F401BFB 00020178 00000001 00000000 00146688 ctl42! 0012F878 5F401BBA 00020178 00000001 00000000 00146688 ctl42! 0012F8A8 77A82ACE 5F401B81 00020178 00000001 00000000 user32!IsWow64Message 0012FA00 77A7629F 0036BE50 00020178 00000001 00000000 user32!IntCallWindowProcW 0012FA58 77A788E9 0012FA70 00000094 0012FD70 7C92EFCC user32!User32CallWindowProcFromKernel 0012FC04 7C92F01D 80000200 0013BEE0 00149A70 00CFC000 ntdll!EtwQueryAllTracesA 0012FC8C 77A7FDEF 00000200 0013BEE0 00149A70 00CFC000 user32!CreateWindowExA 0012FCFC 5F40DDCC 00000000 0013BEE0 00149A70 00CF8000 ctl42! 0012FD3C 5F40C376 0013BEE0 00149A70 00CF8000 5F4D45B0 ctl42! 0012FD7C 5F40C12D 0014AD30 00CF8000 00000000 0012FD9C ctl42! 0012FDB0 5F40BEDA 001464E0 00000000 00145C80 00145D28 ctl42! 0012FDE0 5F40D47B 00000000 00000001 00145C80 004235C0 ctl42! 0012FE70 5F415F6B 004235C0 004235C0 0012FFA0 FFFFFFFF ctl42! 004236CC 00401CFF 00000000 00000000 00000000 00000001 batch! 5F4A0A78 00000001 5F409A56 5F492C75 5F409A56 5F486532 ! *----> Raw Stack Dump <----* 5F4A0A80 56 9a 40 5f 75 2c 49 5f - 56 9a 40 5f 32 65 48 5f V.@_u,I_V.@_2eH_ 5F4A0A90 39 e6 45 5f 13 3f 41 5f - 29 71 40 5f e0 17 40 5f 9.E_.?A_)q@_..@_ 5F4A0AA0 e0 17 40 5f 10 e6 45 5f - c8 20 40 5f 71 e6 45 5f ..@_..E_. @_q.E_ 5F4A0AB0 2d e6 45 5f 6b e6 45 5f - e0 69 41 5f 33 e6 45 5f -.E_k.E_.iA_3.E_ 5F4A0AC0 47 1a 40 5f 29 71 40 5f - 29 71 40 5f 29 71 40 5f G.@_)q@_)q@_)q@_ 5F4A0AD0 49 b3 40 5f 79 b3 40 5f - fd 1f 41 5f 8b 66 48 5f I.@_y.@_..A_.fH_ 5F4A0AE0 ef 46 41 5f 1d 45 48 5f - 15 4e 48 5f 00 00 00 00 .FA_.EH_.NH_.... 5F4A0AF0 38 48 4d 5f 03 00 00 00 - 00 00 00 00 ff ff ff ff 8HM_............ 5F4A0B00 00 00 00 00 00 00 00 00 - f0 0a 4a 5f 28 dd 49 5f ..........J_(.I_ 5F4A0B10 78 b9 49 5f 98 b8 49 5f - 00 00 00 00 00 00 00 00 x.I_..I_........ State Dump for Thread Id 0x330 eax:7FFAF000 ebx:00000001 ecx:00000002 edx:00000003 esi:00000004 edi:00000005 eip:7C92F483 esp:00A3FFE8 ebp:00A3FFF4 dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 00A3FFF4 7C92F483 00000000 00000000 00000000 00000000 ntdll!EtwpSetHWConfigFunction