ReactOS 0.4.12-dev DrWtsn32 Application exception occurred: App: explorer.exe (pid=1192, tid=0x4b0) When: 22/3/2019 @ 17:55:13.136 First chance: 0 Exception number: 0xc0000005 (EXCEPTION_ACCESS_VIOLATION) Exception flags: 0x00000000 Exception address: 77A4D462 Exception parameters: 2 Parameter 0: 0x00000000 Parameter 1: 0x01BCA80C *----> System Information <----* Computer Name: REACTOS-XJEN8GL User Name: Administrator BIOS Vendor: Phoenix Technologies, LTD BIOS Version: 6.00 PG BIOS Date: 06/23/2005 System Manufacturer: System Model: System Version: System SKU:  Baseboard Manufacturer: Baseboard Model: nForce-CK8S Baseboard Version: Number of Processors: 1 Processor Type: x86 Family 15 Model 4 Stepping 8 ReactOS Version: 5.2 BuildLab: 20190318-0.4.12-dev-906-gdf42495.GNU_4.7.2 Service Pack: Service Pack 2 Current Type: Uniprocessor Checked Registered Organization: Registered Owner: oldman *----> Task List <----* 0: [System Process] 4: System 100: smss.exe 160: csrss.exe 176: winlogon.exe 200: services.exe 208: lsass.exe 232: svchost.exe 260: eventlog.exe 372: rpcss.exe 452: svchost.exe 528: wlansvc.exe 588: spoolsv.exe 704: kbswitch.exe 992: rxapi.exe 1724: jqs.exe 1544: docfetcher-daemon-windows.exe 1516: iexplore.exe 1192: explorer.exe 1148: drwtsn32.exe *----> Module List <----* (00000000 - 0017E000) C:\ReactOS\explorer.exe (016D0000 - 01856000) C:\ReactOS\System32\shellbtrfs.dll (726F0000 - 72819000) C:\ReactOS\System32\windowscodecs.dll (73390000 - 7340E000) C:\ReactOS\System32\stobject.dll (73740000 - 73776000) C:\ReactOS\System32\shdocvw.dll (74050000 - 7407B000) C:\ReactOS\System32\propsys.dll (746C0000 - 7476B000) C:\ReactOS\System32\netshell.dll (75980000 - 7599B000) C:\ReactOS\System32\msacm32.drv (75B90000 - 75BA6000) C:\ReactOS\System32\midimap.dll (75EE0000 - 75F01000) C:\ReactOS\System32\lpk.dll (76590000 - 7659A000) C:\ReactOS\system32\kernel32_vista.dll (77A20000 - 77B8C000) C:\ReactOS\system32\user32.dll (79270000 - 793E9000) C:\ReactOS\System32\browseui.dll (79400000 - 79410000) C:\ReactOS\System32\beepmidi.dll (79680000 - 796B0000) C:\ReactOS\system32\apphelp.dll (79760000 - 7976E000) C:\ReactOS\system32\advapi32_vista.dll (79B80000 - 79BE6000) C:\ReactOS\system32\usp10.dll (7A170000 - 7A1B9000) C:\ReactOS\System32\uxtheme.dll (7A1D0000 - 7A208000) C:\ReactOS\System32\userenv.DLL (7A7D0000 - 7A7E8000) C:\ReactOS\System32\powrprof.dll (7A890000 - 7A8BE000) C:\ReactOS\System32\msacm32.dll (7AAB0000 - 7AAD7000) C:\ReactOS\system32\imm32.dll (7AAF0000 - 7AB05000) C:\ReactOS\system32\psapi.dll (7AE30000 - 7AF92000) C:\ReactOS\system32\setupapi.dll (7AFB0000 - 7B15C000) C:\ReactOS\system32\oleaut32.dll (7B190000 - 7B1AC000) C:\ReactOS\system32\version.dll (7B1E0000 - 7BA9E000) C:\ReactOS\system32\shell32.dll (7BAB0000 - 7BBA3000) C:\ReactOS\system32\comdlg32.dll (7BBC0000 - 7BC62000) C:\ReactOS\System32\winmm.dll (7BC80000 - 7BCB7000) C:\ReactOS\system32\winspool.drv (7BCD0000 - 7BE9E000) C:\ReactOS\system32\ole32.dll (7BEB0000 - 7C076000) C:\ReactOS\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.2600.2982_none_deadbeef\comctl32.dll (7C090000 - 7C149000) C:\ReactOS\system32\rpcrt4.dll (7C160000 - 7C1F2000) C:\ReactOS\system32\shlwapi.dll (7C210000 - 7C223000) C:\ReactOS\system32\ws2help.dll (7C240000 - 7C274000) C:\ReactOS\system32\ws2_32.dll (7C290000 - 7C2C7000) C:\ReactOS\System32\iphlpapi.dll (7C360000 - 7C39A000) C:\ReactOS\System32\dhcpcsvc.dll (7C3B0000 - 7C442000) C:\ReactOS\system32\gdi32.dll (7C460000 - 7C4FD000) C:\ReactOS\system32\advapi32.dll (7C510000 - 7C5AF000) C:\ReactOS\system32\msvcrt.dll (7C5D0000 - 7C905000) C:\ReactOS\system32\kernel32.dll (7C920000 - 7CA2D000) C:\ReactOS\System32\ntdll.dll State Dump for Thread Id 0x4b0 (CRASH) eax:01BCA800 ebx:00004550 ecx:01BCA810 edx:0000000E esi:00000000 edi:01A5DDEC eip:77A4D462 esp:01A5D87C ebp:01A5D894 dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 01A5D894 77A4D462 01BC0000 00000000 00000002 01A5D918 user32!find_entry_by_id +0x12 01A5DD5C 77A4E3F9 00000001 00000020 00000020 01A5DDEC user32!ICO_ExtractIconExW +0xe7f 01A5DDAC 77A4EB67 01A5E09C 00000000 00000020 00000020 user32!PrivateExtractIconsW +0x115 01A5DE04 7B202456 00241BC0 01A5DE30 00000000 7B200E9D shell32!SIC_LoadIcon +0x59 01A5E05C 7B202776 01A5E09C 00000000 00000000 00000104 shell32!SIC_GetIconIndex +0x129 01A5E2AC 7B202A76 00283808 0028F210 00000000 00000000 shell32!PidlToSicIndex +0x138 01A5E2F4 7B202B9C 00283808 0028F210 00000000 00000000 shell32!SHMapPIDLToSystemImageListIndex +0xcd 01A5E464 7B238703 0000004E 00000001 01A5E81C 01A5E480 shell32!CDefView::OnNotify +0x88f 01A5E494 7B2A4A6B 002C0198 0000004E 00000001 01A5E81C shell32!CDefView::ProcessWindowMessage +0x243 01A5E4F4 7B2A4703 00272BA0 0000004E 00000001 01A5E81C shell32!CDefView::WindowProc +0xa3 01A5E524 77A8445E 00990000 002C0198 0000004E 00000001 user32!IsWow64Message +0x35 01A5E67C 77A78360 00364D10 002C0198 0000004E 00000001 user32! +0x0 01A5E6CC 77A787A9 00364D10 002C0198 0000004E 00000001 user32!IntCallMessageProc +0x1d4 01A5E744 77A79378 002C0198 0000004E 00000001 01A5E81C user32!SendMessageW +0x10f 01A5E77C 7BEEC1B4 0004A811 01A5E7B0 01A5E7C4 77A684BE comctl32!notify_hdr +0x90 01A5E7D4 7BEEE725 00000001 00000000 00000020 00FFFFFF comctl32!notify_dispinfoT +0x22f 01A5E874 7BEF06D4 01A5EBF8 01A5E928 00000000 00000000 comctl32!LISTVIEW_GetItemT +0x5c3 01A5EBEC 7BEFE193 00000000 000000E1 00000000 00000000 comctl32!LISTVIEW_DrawItem +0x126 01A5EDF4 7BEFFE6E 000B009A 01A5EE1C 00000000 00000210 comctl32! +0x0 01A5EE64 7BF00C3F 000B009A 00000000 00000000 00000000 comctl32!LISTVIEW_Paint +0xf0 01A5EF4C 7BF03993 000B009A 0000000F 00000000 00000000 comctl32! +0x0 01A5EF7C 77A8445E 7BF014B7 000B009A 0000000F 00000000 user32!IsWow64Message +0x35 01A5F0D4 77A78360 0036F500 000B009A 0000000F 00000000 user32! +0x0 01A5F12C 77A7A2B1 01A5F144 00000020 01A5FFB8 7C92F994 user32!User32CallWindowProcFromKernel +0x36a 01A5F17C 7C92F9E5 002C0198 00000000 00000000 00000000 ntdll!EtwUpdateTraceW +0xf9 01A5F1EC 7B239C4A 00272BA0 00252619 0026C051 00000000 shell32!CDefView::CreateViewWindow3 +0x6fc 01A5F224 7B231AE3 00272BA0 0026C051 01A5F4CC 00252619 shell32!CDefView::CreateViewWindow +0x53 01A5F4AC 7928C797 00283808 00289310 01A5F4CC 00000003 browseui!CShellBrowser::BrowseToPath +0x28d 01A5F4E4 7928CDDE 00289310 00000003 00252619 002696F0 browseui!CShellBrowser::BrowseToPIDL +0xb6 01A5F4FC 7928CFB2 002525F0 00289310 00000010 01A5F518 browseui!CShellBrowser::BrowseObject +0x46 01A5F52C 7B241BF4 01A5F590 00267FE8 00000010 0036FB08 shell32!CDefaultContextMenu::TryToBrowse +0xac 01A5F564 7B241E10 01A5F590 00000000 00000000 00000000 shell32!CDefaultContextMenu::InvokeRegVerb +0x86 01A5F5BC 7B241F44 002696F0 01A5F5D8 01A5F5F4 77A505B5 shell32!CDefaultContextMenu::InvokeCommand +0xcc 01A5F60C 7B2364E3 00000000 00000000 00000000 00000000 shell32!CDefView::InvokeContextMenuCommand +0x81 01A5F63C 7B236611 00230000 00230000 01A5F65C 0036DBF8 shell32!CDefView::OpenSelectedItems +0xed 01A5F7AC 7B23826D 0000004E 00000001 01A5FB34 01A5F7C8 shell32!CDefView::OnNotify +0x3f9 01A5F7DC 7B2A4A6B 000900AA 0000004E 00000001 01A5FB34 shell32!CDefView::ProcessWindowMessage +0x243 01A5F83C 7B2A4703 0026C028 0000004E 00000001 01A5FB34 shell32!CDefView::WindowProc +0xa3 01A5F86C 77A8445E 01B40000 000900AA 0000004E 00000001 user32!IsWow64Message +0x35 01A5F9C4 77A78360 003621A8 000900AA 0000004E 00000001 user32! +0x0 01A5FA14 77A787A9 003621A8 000900AA 0000004E 00000001 user32!IntCallMessageProc +0x1d4 01A5FA8C 77A79378 000900AA 0000004E 00000001 01A5FB34 user32!SendMessageW +0x10f 01A5FAC4 7BEEC1B4 00000000 00000000 00000000 00000000 comctl32!notify_hdr +0x90 01A5FB74 7BEF0CDB 00000000 00000000 00000000 00000000 comctl32!notify_click +0x129 01A5FC2C 7BEF4BD0 0000001A 00000000 00000000 00000000 comctl32!LISTVIEW_LButtonDblClk +0xd2 01A5FD14 7BF0272D 002A0234 00000203 00000001 001A010E comctl32! +0x0 01A5FD44 77A8445E 7BF014B7 002A0234 00000203 00000001 user32!IsWow64Message +0x35 01A5FE9C 77A78360 00364880 002A0234 00000203 00000001 user32! +0x0 01A5FEEC 77A787A9 00364880 002A0234 00000203 00000001 user32!IntCallMessageProc +0x1d4 01A5FF54 77A78ED6 01A5FF78 01A5FF78 00000000 00000000 user32!DispatchMessageW +0x1dd 01A5FFA4 7927E285 00252F90 00000000 B1B53064 FFFFFFFF browseui!BrowserThreadProc +0x1ef 01A5FFEC 7C5EBA6F 7927E096 00252F90 00000000 042444C7 kernel32!BaseThreadStartup +0x31 *----> Raw Stack Dump <----* 01A5FFF4 96 e0 27 79 90 2f 25 00 - 00 00 00 00 c7 44 24 04 ..'y./%......D$. 01A60004 f0 25 25 00 e9 29 b0 82 - 77 00 00 00 00 00 00 00 .%%..)..w....... 01A60014 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01A60024 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01A60034 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01A60044 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01A60054 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01A60064 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01A60074 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01A60084 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ State Dump for Thread Id 0x41c eax:7FFD7000 ebx:00000001 ecx:00000002 edx:00000003 esi:00000004 edi:00000005 eip:7C92FCCB esp:01B8FFE8 ebp:01B8FFF4 dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 01B8FFF4 7C92FCCB 00000000 00000000 00000000 00000000 ntdll!EtwpSetHWConfigFunction +0x2c State Dump for Thread Id 0x4b4 eax:0000003D ebx:016CFF58 ecx:807F6000 edx:00000000 esi:016CFF7C edi:00000001 eip:7C92FA92 esp:016CFF3C ebp:016CFF94 dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 016CFF94 7C92FA92 FFFFFFFF 00000001 016CFFEC 7C5EBA6F ntdll!EtwUpdateTraceW +0x1a6 016CFFA4 7B25677D 00000000 00000000 B1CE9BBC FFFFFFFF shell32!_RunAsyncThreadProc +0x24 016CFFEC 7C5EBA6F 7B256759 00000000 00000000 00905A4D kernel32!BaseThreadStartup +0x31 *----> Raw Stack Dump <----* 016CFFF4 59 67 25 7b 00 00 00 00 - 00 00 00 00 4d 5a 90 00 Yg%{........MZ.. 016D0004 03 00 00 00 04 00 00 00 - ff ff 00 00 b8 00 00 00 ................ 016D0014 00 00 00 00 40 00 00 00 - 00 00 00 00 00 00 00 00 ....@........... 016D0024 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 016D0034 00 00 00 00 00 00 00 00 - 80 00 00 00 0e 1f ba 0e ................ 016D0044 00 b4 09 cd 21 b8 01 4c - cd 21 54 68 69 73 20 70 ....!..L.!This p 016D0054 72 6f 67 72 61 6d 20 63 - 61 6e 6e 6f 74 20 62 65 rogram cannot be 016D0064 20 72 75 6e 20 69 6e 20 - 44 4f 53 20 6d 6f 64 65 run in DOS mode 016D0074 2e 0d 0d 0a 24 00 00 00 - 00 00 00 00 50 45 00 00 ....$.......PE.. 016D0084 4c 01 0b 00 d0 a1 8f 5c - 00 ec 17 00 00 00 00 00 L......\........ State Dump for Thread Id 0x4d0 eax:000011A4 ebx:012AFF48 ecx:807F6000 edx:00000000 esi:00250849 edi:00000000 eip:7C92FA92 esp:012AFF14 ebp:012AFF2C dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 012AFF2C 7C92FA92 012AFF48 00000000 00000000 00000000 ntdll!EtwUpdateTraceW +0x1a6 012AFF6C 7B286A0E 00250849 000000C9 012AFFA4 004216BA shell32!SHDesktopMessageLoop +0xc0 012AFF7C 004019F4 00250849 00436D8C 012AFF98 00000000 explorer!_SHDesktopMessageLoop +0x73 012AFFA4 004216BA 0025C5E8 00000000 B1E86064 FFFFFFFF explorer!CDesktopThread::s_DesktopThreadProc +0x6e 012AFFEC 7C5EBA6F 0042164C 0025C5E8 00000000 042444C7 kernel32!BaseThreadStartup +0x31 *----> Raw Stack Dump <----* 012AFFF4 4c 16 42 00 e8 c5 25 00 - 00 00 00 00 c7 44 24 04 L.B...%......D$. 012B0004 20 08 25 00 e9 83 2a ff - 79 00 00 00 00 00 00 00 .%...*.y....... 012B0014 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 012B0024 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 012B0034 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 012B0044 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 012B0054 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 012B0064 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 012B0074 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 012B0084 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ State Dump for Thread Id 0x4d4 eax:00000118 ebx:014CFEEC ecx:807F6000 edx:00000000 esi:00000001 edi:00000000 eip:7C92FA92 esp:014CFE9C ebp:014CFF24 dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 014CFF24 7C92FA92 00000003 0025A278 00000000 FFFFFFFF ntdll!EtwUpdateTraceW +0x1a6 014CFF5C 7C0C9B59 00255100 00000003 0025A278 808880E0 rpcrt4!rpcrt4_protseq_np_wait_for_new_connection +0x3b 014CFFA4 7C0BE547 00255100 00000000 B1B5A164 FFFFFFFF rpcrt4!RPCRT4_server_thread +0xb2 014CFFEC 7C5EBA6F 7C0BE495 00255100 00000000 00000000 kernel32!BaseThreadStartup +0x31 State Dump for Thread Id 0x4d8 eax:000011A4 ebx:0105FD20 ecx:807F6000 edx:00000000 esi:00E50000 edi:0000C175 eip:7C92FA92 esp:0105FCEC ebp:0105FD04 dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0105FD04 7C92FA92 0105FD20 00000000 00000000 00000000 ntdll!EtwUpdateTraceW +0x1a6 0105FD44 73391722 00000188 0000C175 00000000 86400000 stobject!CSysTray::SysTrayMessageLoop +0x46 0105FF9C 73391927 0105FFEC 7C5EBA6F 0024C8A0 00000000 stobject!CSysTray::SysTrayThreadProc +0x1f3 0105FFA4 73391967 0024C8A0 00000000 B1B77064 FFFFFFFF stobject!CSysTray::s_SysTrayThreadProc +0xb 0105FFEC 7C5EBA6F 7339195C 0024C8A0 00000000 00000000 kernel32!BaseThreadStartup +0x31 *----> Raw Stack Dump <----* 0105FFF4 5c 19 39 73 a0 c8 24 00 - 00 00 00 00 00 00 00 00 \.9s..$......... 01060004 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01060014 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01060024 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01060034 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01060044 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01060054 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01060064 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01060074 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01060084 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ State Dump for Thread Id 0x4e4 eax:00000118 ebx:00BEFB34 ecx:807F6000 edx:00000000 esi:00000000 edi:00000000 eip:7C92FA92 esp:00BEFAE4 ebp:00BEFB6C dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 00BEFB6C 7C92FA92 00000006 00255E88 00000000 FFFFFFFF ntdll!EtwUpdateTraceW +0x1a6 00BEFB8C 7C5E61B3 00000006 00255E88 00000000 FFFFFFFF kernel32!WaitForMultipleObjects +0x2e 00BEFFA4 00405D24 00246E40 00000000 B1DBAA84 FFFFFFFF explorer!CIconWatcher::WatcherThread +0xf8 00BEFFEC 7C5EBA6F 00405C2C 00246E40 00000000 4E9F000D kernel32!BaseThreadStartup +0x31 *----> Raw Stack Dump <----* 00BEFFF4 2c 5c 40 00 40 6e 24 00 - 00 00 00 00 0d 00 9f 4e ,\@.@n$........N 00BF0004 01 00 3f 00 3f 00 3f 00 - 3f 00 00 00 00 00 00 00 ..?.?.?.?....... 00BF0014 00 00 00 00 00 00 03 01 - 00 00 01 00 02 00 03 00 ................ 00BF0024 04 00 05 00 06 00 07 00 - 08 00 09 00 0a 00 0b 00 ................ 00BF0034 0c 00 0d 00 0e 00 0f 00 - 10 00 11 00 12 00 13 00 ................ 00BF0044 14 00 15 00 16 00 17 00 - 18 00 19 00 1a 00 1b 00 ................ 00BF0054 1c 00 1d 00 1e 00 1f 00 - 20 00 21 00 22 00 23 00 ........ .!.".#. 00BF0064 24 00 25 00 26 00 27 00 - 28 00 29 00 2a 00 2b 00 $.%.&.'.(.).*.+. 00BF0074 2c 00 2d 00 2e 00 2f 00 - 30 00 31 00 32 00 33 00 ,.-.../.0.1.2.3. 00BF0084 34 00 35 00 36 00 37 00 - 38 00 39 00 3a 00 3b 00 4.5.6.7.8.9.:.;. State Dump for Thread Id 0x4f0 eax:000011A4 ebx:0022FC14 ecx:807F6000 edx:00000000 esi:0023D838 edi:00000030 eip:7C92FA92 esp:0022FBE0 ebp:0022FBF8 dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0022FBF8 7C92FA92 0022FC14 00000000 00000000 00000000 ntdll!EtwUpdateTraceW +0x1a6 0022FC38 0040A71D 0023D864 004340EC 0043E074 00049630 explorer!TrayMessageLoop +0x3a 0022FE58 0040158A 00000003 0042F000 004340CA 004341EB explorer!StartWithDesktop +0x15f 0022FED0 004016ED 00400000 00000000 0023515E 00000001 explorer!wWinMain +0xfc 0022FEE8 004159DD 00000001 0023EA78 00235928 B1C28020 explorer!wmain +0x2d 0022FF98 00414AA9 0022FFF0 7C5E0EF7 FFFFFFFE 00000009 explorer!__tmainCRTStartup +0x2e0 0022FFA0 00414AF2 FFFFFFFE 00000009 0022FFF8 00000004 explorer!wWinMainCRTStartup +0x17 0022FFF0 7C5E0EF7 00414ADB 00000000 EC0100ED 00000000 kernel32!BaseProcessStartup +0x35 *----> Raw Stack Dump <----* 0022FFF8 db 4a 41 00 00 00 00 00 - ed 00 01 ec 00 00 00 00 .JA............. 00230008 ee ff ee ff 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 00230018 00 00 23 00 00 00 23 00 - 00 01 00 00 68 07 23 00 ..#...#.....h.#. 00230028 00 00 33 00 98 00 00 00 - 02 00 00 00 00 00 00 00 ..3............. 00230038 c8 06 23 00 b0 06 23 00 - 02 00 00 00 00 00 00 00 ..#...#......... 00230048 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 00230058 00 00 00 00 00 00 00 00 - 00 fe 00 00 ff ee ef 0e ................ 00230068 00 00 10 00 00 20 00 00 - 00 02 00 00 00 20 00 00 ..... ....... .. 00230078 74 15 00 00 ff ef fd 7f - 01 00 68 07 00 00 00 00 t.........h..... 00230088 00 00 00 00 00 00 00 00 - d8 06 23 00 50 07 23 00 ..........#.P.#.