ReactOS 0.4.12-dev DrWtsn32 Application exception occurred: App: Physion.exe (pid=1496, tid=0x618) When: 28/2/2019 @ 20:25:51.579 Exception number: 0xc0000005 (EXCEPTION_ACCESS_VIOLATION) *----> System Information <----* Computer Name: REACTOS-PWIWTVO User Name: Administrator BIOS Vendor: innotek GmbH BIOS Version: VirtualBox BIOS Date: 12/01/2006 System Manufacturer: innotek GmbH System Family: Virtual Machine System Model: VirtualBox System Version: 1.2 Baseboard Manufacturer: Oracle Corporation Baseboard Model: VirtualBox Baseboard Version: 1.2 Number of Processors: 1 Processor Type: x86 Family 6 Model 13 Stepping 6 ReactOS Version: 5.2 BuildLab: 20190227-0.4.12-dev-764-g1f76fb7.GNU_4.7.2 Service Pack: Service Pack 2 Current Type: Uniprocessor Checked Registered Organization: Registered Owner: Darío *----> Task List <----* 0: [System Process] 4: System 116: smss.exe 172: csrss.exe 188: winlogon.exe 212: services.exe 220: lsass.exe 248: VBoxService.exe 304: eventlog.exe 452: rpcss.exe 504: svchost.exe 516: explorer.exe 524: svchost.exe 576: wlansvc.exe 636: spoolsv.exe 668: audiosrv.exe 784: VBoxTray.exe 792: kbswitch.exe 1496: Physion.exe 1380: drwtsn32.exe *----> Module List <----* (00000000 - 00203000) D:\Physion\Physion.exe (645C0000 - 645F5000) D:\Physion\imageformats\qjpeg4.dll (65100000 - 65A1F000) D:\Physion\QtGui4.dll (68F00000 - 68F19000) D:\Physion\imageformats\qgif4.dll (6A1C0000 - 6A410000) D:\Physion\QtCore4.dll (6D040000 - 6D106000) D:\Physion\QtOpenGL4.dll (6DC40000 - 6DC60000) D:\Physion\quazip.dll (6E240000 - 6E263000) D:\Physion\QPropertyEditor.dll (6E940000 - 6E950000) D:\Physion\libgcc_s_dw2-1.dll (6F540000 - 6F708000) D:\Physion\QtScript4.dll (6FBC0000 - 6FBC7000) D:\Physion\mingwm10.dll (6FF00000 - 70024000) D:\Physion\QtNetwork4.dll (75980000 - 7599C000) C:\ReactOS\System32\msacm32.drv (75B90000 - 75BA7000) C:\ReactOS\System32\midimap.dll (75EE0000 - 75F02000) C:\ReactOS\System32\lpk.dll (76590000 - 7659A000) C:\ReactOS\system32\kernel32_vista.dll (77A20000 - 77B8C000) C:\ReactOS\system32\user32.dll (79400000 - 79411000) C:\ReactOS\System32\beepmidi.dll (79680000 - 796AE000) C:\ReactOS\system32\apphelp.dll (79760000 - 7976E000) C:\ReactOS\system32\advapi32_vista.dll (79B80000 - 79BE7000) C:\ReactOS\system32\usp10.dll (7A170000 - 7A1BA000) C:\ReactOS\System32\uxtheme.dll (7A1D0000 - 7A207000) C:\ReactOS\System32\userenv.DLL (7A310000 - 7A419000) C:\ReactOS\System32\OPENGL32.DLL (7A890000 - 7A8BE000) C:\ReactOS\System32\msacm32.dll (7AAB0000 - 7AAD8000) C:\ReactOS\system32\imm32.dll (7AFB0000 - 7B15D000) C:\ReactOS\system32\OLEAUT32.DLL (7B190000 - 7B1AD000) C:\ReactOS\system32\version.dll (7B1E0000 - 7BA9F000) C:\ReactOS\system32\shell32.dll (7BAB0000 - 7BBA1000) C:\ReactOS\system32\COMDLG32.DLL (7BBC0000 - 7BC63000) C:\ReactOS\System32\WINMM.DLL (7BC80000 - 7BCB8000) C:\ReactOS\system32\winspool.drv (7BCD0000 - 7BE9E000) C:\ReactOS\system32\OLE32.dll (7BEB0000 - 7C077000) C:\ReactOS\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.2600.2982_none_deadbeef\comctl32.dll (7C090000 - 7C14A000) C:\ReactOS\system32\rpcrt4.dll (7C160000 - 7C1F3000) C:\ReactOS\system32\shlwapi.dll (7C210000 - 7C224000) C:\ReactOS\system32\ws2help.dll (7C240000 - 7C275000) C:\ReactOS\system32\ws2_32.dll (7C3B0000 - 7C441000) C:\ReactOS\system32\gdi32.dll (7C460000 - 7C4FD000) C:\ReactOS\system32\ADVAPI32.DLL (7C510000 - 7C5B0000) C:\ReactOS\system32\msvcrt.dll (7C5D0000 - 7C906000) C:\ReactOS\system32\kernel32.dll (7C920000 - 7CA2E000) C:\ReactOS\System32\ntdll.dll State Dump for Thread Id 0x618 (CRASH) eax:00000000 ebx:00D44CC0 ecx:00000000 edx:00000000 esi:00D44CC0 edi:00E3AFA8 eip:7A31A734 esp:0022F580 ebp:0022F598 dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0022F598 7A31A734 00D44CC0 6D0ED000 6D0ED010 00D1D420 opengl32!wglDeleteContext +0xc5 0022F5E8 6D08FB1E 00D1D420 00D1D420 0022F618 00CD1A60 qtopengl4! +0x0 0022F608 6D0493D6 00D1D420 00D1D420 0022F658 6D04854D qtopengl4! +0x0 0022F658 6D08E35E 00E3AFA8 00CD1A60 00D1D420 00000001 qtopengl4! +0x0 0022F6E8 6D04899A 00E3AFA8 0022FA9C 0022FA9C 00000000 qtopengl4! +0x0 0022F728 6510671C 002423B8 00E3AFA8 0022FA9C 0022F6EC qtgui4! +0x0 0022F9E8 6510D072 0022FE28 00E3AFA8 0022FA9C 6A1F08B4 qtgui4! +0x0 0022FA38 6A2B0258 0022FE28 00E3AFA8 0022FA9C 6D0416EF qtcore4! +0x0 0022FAC8 6515286C 00E3AFA8 0027ADB8 0022FAEC 6D04377E qtgui4! +0x0 0022FAF8 65152EA6 00E3AFA8 0027ADB8 0022FB58 6D08F5E7 qtgui4! +0x0 0022FBA8 654EF084 0027ADB8 00E3AFA8 00000000 00000000 qtgui4! +0x0 0022FC08 0045FA92 00CADFF8 00000000 0000001B 0022FD08 physion! +0x0 0022FC48 004A074F 00CADFF8 00000000 0000001B 0022FD08 physion! +0x0 0022FCD8 6A2BF891 00CB4590 65813748 00000004 0022FD08 qtcore4! +0x0 0022FD18 656AB834 00CB4590 00000001 00E3A608 0022FE28 qtgui4! +0x0 0022FD68 6542FE95 00CB4590 00000001 0022FDC8 0045D424 qtgui4! +0x0 0022FDC8 0045FB48 00CADFF8 0022FDE4 00000000 0022FE50 physion! +0x0 0022FDF8 00405505 0022FE28 00000001 0022FE74 0022FE78 physion! +0x0 0022FE98 0040148F 00000001 00241DA0 00242390 0000000A physion! +0x0 0022FED8 004A3305 00400000 00000000 002309F6 0000000A physion! +0x0 0022FF58 004A2FC8 00000001 00240900 002348C8 005D8000 physion! +0x0 0022FF90 0040124B 00000002 00000246 0022FFF0 7C5E0EF7 physion! +0x0 0022FFA0 004012B8 FFFFFFFE 00000009 0022FFF8 00000004 physion! +0x0 0022FFF0 7C5E0EF7 004012A0 00000000 EC0100ED 00000000 kernel32!BaseProcessStartup +0x35 *----> Raw Stack Dump <----* 0022FFF8 a0 12 40 00 00 00 00 00 - ed 00 01 ec 00 00 00 00 ..@............. 00230008 ee ff ee ff 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 00230018 00 00 23 00 00 00 23 00 - 00 01 00 00 68 07 23 00 ..#...#.....h.#. 00230028 00 00 33 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ..3............. 00230038 38 00 23 00 38 00 23 00 - 02 00 00 00 00 00 00 00 8.#.8.#......... 00230048 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 00230058 00 00 00 00 00 00 00 00 - 00 fe 00 00 ff ee ef 0e ................ 00230068 00 00 80 00 00 20 00 00 - 00 02 00 00 00 20 00 00 ..... ....... .. 00230078 7d 1b 00 00 ff ef fd 7f - 01 00 68 07 00 00 00 00 }.........h..... 00230088 00 00 00 00 00 00 00 00 - 38 07 23 00 e8 0f e4 00 ........8.#..... State Dump for Thread Id 0x5a4 eax:00000118 ebx:01D5FEEC ecx:FFFFFFFF edx:00000000 esi:00000001 edi:00000000 eip:7C92F95D esp:01D5FE9C ebp:01D5FF24 dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 01D5FF24 7C92F95D 00000002 00CF1290 00000000 FFFFFFFF ntdll!EtwUpdateTraceW +0x1a1 01D5FF5C 7C0C9B69 00D44EA0 00000002 00CF1290 80887CD0 rpcrt4!rpcrt4_protseq_np_wait_for_new_connection +0x3b 01D5FFA4 7C0BE557 00D44EA0 8001003B F7F18C84 FFFFFFFF rpcrt4!RPCRT4_server_thread +0xb2 01D5FFEC 7C5EBA6F 7C0BE4A5 00D44EA0 00000000 01E50000 kernel32!BaseThreadStartup +0x31 *----> Raw Stack Dump <----* 01D5FFF4 a5 e4 0b 7c a0 4e d4 00 - 00 00 00 00 00 00 e5 01 ...|.N.......... 01D60004 00 00 98 01 00 00 00 00 - 00 00 00 00 00 70 0e 00 .............p.. 01D60014 00 70 0e 00 4c 0e 0b 00 - 00 00 00 00 00 00 00 00 .p..L........... 01D60024 00 00 00 00 00 00 00 00 - 00 00 80 3f 00 00 00 00 ...........?.... 01D60034 00 00 00 00 00 00 00 00 - 00 00 80 3f 00 00 00 00 ...........?.... 01D60044 00 00 00 00 00 00 00 00 - 00 00 80 3f 00 00 00 00 ...........?.... 01D60054 00 00 00 00 00 00 00 00 - 00 00 80 3f 00 00 00 00 ...........?.... 01D60064 00 00 00 00 00 00 00 00 - 00 00 80 3f 00 00 00 00 ...........?.... 01D60074 00 00 00 00 00 00 00 00 - 00 00 80 3f 00 00 00 00 ...........?.... 01D60084 00 00 00 00 00 00 00 00 - 00 00 80 3f 00 00 00 00 ...........?.... State Dump for Thread Id 0x5e0 eax:00000118 ebx:011BFE8C ecx:FFFFFFFF edx:00000000 esi:00000000 edi:00000000 eip:7C92F95D esp:011BFE3C ebp:011BFEC4 dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 011BFEC4 7C92F95D 00000003 00D1E300 00000000 FFFFFFFF ntdll!EtwUpdateTraceW +0x1a1 011BFEE4 7C5E61B3 00000003 00D1E300 00000000 FFFFFFFF kernel32!WaitForMultipleObjects +0x2e 011BFF84 6A298727 00D1E128 00D1E250 7C9643C1 7C921013 qtcore4! +0x0 011BFFA4 6A1D6B9A 00D1E128 8001003B F8059C84 FFFFFFFF qtcore4! +0x0 011BFFEC 7C5EBA6F 6A1D6B3C 00D1E128 00000000 09010008 kernel32!BaseThreadStartup +0x31 *----> Raw Stack Dump <----* 011BFFF4 3c 6b 1d 6a 28 e1 d1 00 - 00 00 00 00 08 00 01 09