ReactOS 0.4.13 DrWtsn32 Application exception occurred: App: explorer.exe (pid=520, tid=0x2c8) When: 10/4/2020 @ 00:24:01.474 First chance: 0 Exception number: 0xc0000005 (EXCEPTION_ACCESS_VIOLATION) Exception flags: 0x00000000 Exception address: 7B05E058 Exception parameters: 2 Parameter 0: 0x00000000 Parameter 1: 0x0A000232 *----> System Information <----* Computer Name: REACTOS-XQ4ACCH User Name: Administrator BIOS Vendor: Dell Inc. BIOS Version: A11 BIOS Date: 09/16/2013 System Manufacturer: Dell Inc. System Model: OptiPlex 3010 System Version: 01 Baseboard Manufacturer: Dell Inc. Baseboard Model: 042P49 Baseboard Version: A02 Number of Processors: 1 Processor Type: x86 Family 6 Model 10 Stepping 7 ReactOS Version: 5.2 BuildLab: 20200409-0.4.13-release-0-g4ee3778.GNU_4.7.2 Service Pack: Service Pack 2 Current Type: Uniprocessor Checked Registered Organization: Registered Owner: Julenuri *----> Task List <----* 0: [System Process] 4: System 112: smss.exe 180: csrss.exe 196: winlogon.exe 220: services.exe 228: lsass.exe 260: svchost.exe 280: eventlog.exe 388: rpcss.exe 480: svchost.exe 520: explorer.exe 556: wlansvc.exe 628: spoolsv.exe 716: kbswitch.exe 1036: msiexec.exe 1240: drwtsn32.exe *----> Module List <----* (00000000 - 0018E000) E:\ReactOS\explorer.exe (720A0000 - 721CE000) E:\ReactOS\System32\windowscodecs.dll (72CF0000 - 72D72000) E:\ReactOS\System32\stobject.dll (72F60000 - 730E8000) E:\ReactOS\System32\shellbtrfs.dll (731A0000 - 731D6000) E:\ReactOS\System32\shdocvw.dll (73A40000 - 73A6B000) E:\ReactOS\System32\propsys.dll (74050000 - 74066000) E:\ReactOS\System32\nfs41_np.dll (740E0000 - 74190000) E:\ReactOS\System32\netshell.dll (75640000 - 7565C000) E:\ReactOS\System32\msacm32.drv (75890000 - 758A7000) E:\ReactOS\System32\midimap.dll (75C50000 - 75C6C000) E:\ReactOS\System32\lpk.dll (763A0000 - 763AA000) E:\ReactOS\system32\kernel32_vista.dll (77A20000 - 77B8A000) E:\ReactOS\system32\user32.dll (78D70000 - 78F0D000) E:\ReactOS\System32\browseui.dll (78F20000 - 78F31000) E:\ReactOS\System32\beepmidi.dll (791E0000 - 7920F000) E:\ReactOS\system32\apphelp.dll (792D0000 - 792DD000) E:\ReactOS\system32\advapi32_vista.dll (79610000 - 79669000) E:\ReactOS\System32\acppage.dll (797E0000 - 79846000) E:\ReactOS\system32\usp10.dll (798E0000 - 798F0000) E:\ReactOS\System32\sfc_os.dll (79E70000 - 79EB9000) E:\ReactOS\System32\uxtheme.dll (79EE0000 - 79F19000) E:\ReactOS\System32\userenv.DLL (7A4A0000 - 7A4B9000) E:\ReactOS\System32\powrprof.dll (7A570000 - 7A59C000) E:\ReactOS\System32\msacm32.dll (7A7D0000 - 7A7F7000) E:\ReactOS\system32\imm32.dll (7A810000 - 7A826000) E:\ReactOS\system32\psapi.dll (7AB80000 - 7ABAB000) E:\ReactOS\system32\mpr.dll (7ABD0000 - 7AD31000) E:\ReactOS\system32\setupapi.dll (7AD60000 - 7AF18000) E:\ReactOS\system32\oleaut32.dll (7AF80000 - 7AF9D000) E:\ReactOS\system32\version.dll (7AFE0000 - 7B8AE000) E:\ReactOS\system32\shell32.dll (7B900000 - 7B9F8000) E:\ReactOS\system32\comdlg32.dll (7BA20000 - 7BAC1000) E:\ReactOS\System32\winmm.dll (7BAE0000 - 7BB1D000) E:\ReactOS\system32\winspool.drv (7BB40000 - 7BD17000) E:\ReactOS\system32\ole32.dll (7BDA0000 - 7BF65000) E:\ReactOS\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.2600.2982_none_deadbeef\comctl32.dll (7BFC0000 - 7C079000) E:\ReactOS\system32\rpcrt4.dll (7C0B0000 - 7C140000) E:\ReactOS\system32\shlwapi.dll (7C170000 - 7C184000) E:\ReactOS\system32\ws2help.dll (7C1A0000 - 7C1D4000) E:\ReactOS\system32\ws2_32.dll (7C1F0000 - 7C226000) E:\ReactOS\System32\iphlpapi.dll (7C2E0000 - 7C31A000) E:\ReactOS\System32\dhcpcsvc.dll (7C340000 - 7C3D3000) E:\ReactOS\system32\gdi32.dll (7C400000 - 7C49A000) E:\ReactOS\system32\advapi32.dll (7C4D0000 - 7C56F000) E:\ReactOS\system32\msvcrt.dll (7C5B0000 - 7C8E8000) E:\ReactOS\system32\kernel32.dll (7C920000 - 7CA32000) E:\ReactOS\System32\ntdll.dll State Dump for Thread Id 0x2c8 (CRASH) eax:002B5EE4 ebx:0A000006 ecx:0183FFB8 edx:005C0000 esi:7B05DE5C edi:00000000 eip:7B05E058 esp:0183FC14 ebp:0183FC34 dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0183FC34 7B05E058 00000000 005C0000 002B5EE4 0183FF58 shell32!_NotificationCompletion +0x1fc 0183FC54 7C5D830E 7B05DE5C 002B5EE4 00000000 00010017 kernel32!BasepIoCompletionSimple +0x46 0183FF94 7C92FB82 FFFFFFFF 00000001 0183FFEC 7C5CC531 ntdll!KiUserApcDispatcher +0x25 0183FFA4 7B05C5DD 00000000 00000000 B7806794 FFFFFFFF shell32!_RunAsyncThreadProc +0x24 0183FFEC 7C5CC531 7B05C5B9 00000000 00000000 EC0100ED kernel32!BaseThreadStartup +0x31 *----> Raw Stack Dump <----* 0183FFF4 b9 c5 05 7b 00 00 00 00 - 00 00 00 00 ed 00 01 ec ...{............ 01840004 00 00 00 00 ee ff ee ff - 00 00 00 00 00 00 00 00 ................ 01840014 00 00 00 00 00 00 84 01 - 00 00 84 01 10 00 00 00 ................ 01840024 68 07 84 01 00 00 85 01 - 00 00 00 00 00 00 00 00 h............... 01840034 00 00 00 00 38 00 84 01 - 38 00 84 01 02 00 00 00 ....8...8....... 01840044 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01840054 00 00 00 00 00 00 00 00 - 00 00 00 00 00 fe 00 00 ................ 01840064 ff ee ef 0e 00 00 10 00 - 00 20 00 00 00 02 00 00 ......... ...... 01840074 00 20 00 00 0c 1f 00 00 - ff ef fd 7f 05 00 68 07 . ............h. 01840084 00 00 00 00 00 00 00 00 - 00 00 00 00 a8 06 84 01 ................ State Dump for Thread Id 0x20c eax:000011A4 ebx:0022FC14 ecx:80D1B000 edx:00000000 esi:00255FB8 edi:00000030 eip:7C92FCA2 esp:0022FBE0 ebp:0022FBF8 dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0022FBF8 7C92FCA2 0022FC14 00000000 00000000 00000000 ntdll!KiFastSystemCallRet +0x0 0022FC38 0040CDBD 00255FE4 00437300 00442074 00040030 explorer!TrayMessageLoop +0x2f 0022FE58 004020AA 00000003 00432018 004372DF 004373FF explorer!StartWithDesktop +0x152 0022FED0 0040224F 00400000 00000000 0023524E 00000001 explorer!wWinMain +0xfc 0022FEE8 0041808D 00000001 0023FA18 00235970 B7AC9020 explorer!wmain +0x2d 0022FF98 00417271 0022FFF0 7C5C16D7 FFFFFFFE 00000009 explorer!__tmainCRTStartup +0x2e0 0022FFA0 004172BA FFFFFFFE 00000009 0022FFF8 00000004 explorer!wWinMainCRTStartup +0x17 0022FFF0 7C5C16D7 004172A3 00000000 EC0100ED 00000000 kernel32!BaseProcessStartup +0x35 *----> Raw Stack Dump <----* 0022FFF8 a3 72 41 00 00 00 00 00 - ed 00 01 ec 00 00 00 00 .rA............. 00230008 ee ff ee ff 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 00230018 00 00 23 00 00 00 23 00 - 00 01 00 00 68 07 23 00 ..#...#.....h.#. 00230028 00 00 33 00 6b 00 00 00 - 0f 00 00 00 00 00 00 00 ..3.k........... 00230038 18 00 d0 01 b0 06 23 00 - 02 00 00 00 00 00 00 00 ......#......... 00230048 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 00230058 00 00 00 00 00 00 00 00 - 00 fe 00 00 ff ee ef 0e ................ 00230068 00 00 10 00 00 20 00 00 - 00 02 00 00 00 20 00 00 ..... ....... .. 00230078 60 17 00 00 ff ef fd 7f - 01 00 68 07 00 00 00 00 `.........h..... 00230088 00 00 00 00 00 00 00 00 - b8 00 d0 01 e8 0f d0 01 ................ State Dump for Thread Id 0x2b8 eax:00000118 ebx:00F8FB34 ecx:80D1B000 edx:00000000 esi:00000000 edi:00000000 eip:7C92FCA2 esp:00F8FAE4 ebp:00F8FB6C dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 00F8FB6C 7C92FCA2 00000004 0029C1F8 00000000 FFFFFFFF ntdll!KiFastSystemCallRet +0x0 00F8FB8C 7C5C6993 00000004 0029C1F8 00000000 FFFFFFFF kernel32!WaitForMultipleObjects +0x2e 00F8FFA4 00407714 0025C5C0 00000000 B79D8D8C FFFFFFFF explorer!CIconWatcher::WatcherThread +0xe9 00F8FFEC 7C5CC531 0040761C 0025C5C0 00000000 EC0100ED kernel32!BaseThreadStartup +0x31 *----> Raw Stack Dump <----* 00F8FFF4 1c 76 40 00 c0 c5 25 00 - 00 00 00 00 ed 00 01 ec .v@...%......... 00F90004 00 00 00 00 ee ff ee ff - 00 00 00 00 00 00 00 00 ................ 00F90014 00 00 00 00 00 00 f9 00 - 00 00 f9 00 10 00 00 00 ................ 00F90024 68 07 f9 00 00 00 fa 00 - 00 00 00 00 00 00 00 00 h............... 00F90034 00 00 00 00 38 00 f9 00 - 38 00 f9 00 02 10 00 00 ....8...8....... 00F90044 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 00F90054 00 00 00 00 00 00 00 00 - 00 00 00 00 00 fe 00 00 ................ 00F90064 ff ee ef 0e 00 00 10 00 - 00 20 00 00 00 02 00 00 ......... ...... 00F90074 00 20 00 00 02 1f 00 00 - ff ef fd 7f 04 00 68 07 . ............h. 00F90084 00 00 00 00 00 00 00 00 - 00 00 00 00 a8 06 f9 00 ................ State Dump for Thread Id 0x2bc eax:000011A4 ebx:011AFD20 ecx:80D1B000 edx:00000000 esi:00FA0000 edi:0000C097 eip:7C92FCA2 esp:011AFCEC ebp:011AFD04 dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 011AFD04 7C92FCA2 011AFD20 00000000 00000000 00000000 ntdll!KiFastSystemCallRet +0x0 011AFD44 72CF1918 00000188 0000C097 00000000 86400000 stobject!CSysTray::SysTrayMessageLoop +0x3f 011AFF9C 72CF1B1D 011AFFEC 7C5CC531 0025DF38 00000000 stobject!CSysTray::SysTrayThreadProc +0x1e5 011AFFA4 72CF1B5D 0025DF38 00000000 B79D552C FFFFFFFF stobject!CSysTray::s_SysTrayThreadProc +0x8 011AFFEC 7C5CC531 72CF1B52 0025DF38 00000000 042444C7 kernel32!BaseThreadStartup +0x31 *----> Raw Stack Dump <----* 011AFFF4 52 1b cf 72 38 df 25 00 - 00 00 00 00 c7 44 24 04 R..r8.%......D$. 011B0004 80 b6 2a 00 e9 93 b1 ef - 79 00 00 00 00 00 00 00 ..*.....y....... 011B0014 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 011B0024 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 011B0034 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 011B0044 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 011B0054 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 011B0064 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 011B0074 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 011B0084 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ State Dump for Thread Id 0x2c0 eax:00000034 ebx:00000002 ecx:80D1B000 edx:F6949D64 esi:08000000 edi:00000000 eip:7C92FCA2 esp:0141E584 ebp:0141E5F4 dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0141E5F4 7C92FCA2 00000590 00000000 08000002 00000000 ntdll!KiFastSystemCallRet +0x0 0141EABC 77A4D7E8 00000001 00000020 00000020 00000000 user32!ICO_ExtractIconExW +0x1ee 0141EB0C 77A4EBE7 0141EDFC FFFFFF68 00000020 00000020 user32!PrivateExtractIconsW +0x115 0141EB64 7B003E92 00255C10 0141EB90 00000000 7B0028B8 shell32!SIC_LoadIcon +0x49 0141EDBC 7B0041B2 0141EDFC FFFFFF68 00000000 00000104 shell32!SIC_GetIconIndex +0x129 0141F00C 7B0044B2 00256BE8 0028BF10 00000000 00000000 shell32!PidlToSicIndex +0x138 0141F054 7B0045D8 00256BE8 0028BF10 00000000 00000000 shell32!SHMapPIDLToSystemImageListIndex +0xcd 0141F1C4 7B03CB13 0000004E 00000001 0141F57C 0141F1E0 shell32!CDefView::OnNotify +0x880 0141F1F4 7B0AB5AB 000500EE 0000004E 00000001 0141F57C shell32!CDefView::ProcessWindowMessage +0x22e 0141F254 7B0AB243 002648B0 0000004E 00000001 0141F57C shell32!CDefView::WindowProc +0x97 0141F284 77A8433E 01430000 000500EE 0000004E 00000001 user32!CALL_EXTERN_WNDPROC +0x1a 0141F3DC 77A78569 00366D18 000500EE 0000004E 00000001 user32!IntCallWindowProcW +0x1566 0141F42C 77A78966 00366D18 000500EE 0000004E 00000001 user32!IntCallMessageProc +0x1d4 0141F4A4 77A79538 000500EE 0000004E 00000001 0141F57C user32!SendMessageW +0x10f 0141F4DC 7BDDCD44 77A884DC 77A3E997 000200F2 00000001 comctl32!notify_hdr +0x90 0141F534 7BDDF2B5 00000001 00000000 0141F5EC 0141F47C comctl32!notify_dispinfoT +0x22f 0141F5D4 7BDE1264 0000003C 00266DB8 00000000 0141F85C comctl32!LISTVIEW_GetItemT +0x5c3 0141F94C 7BDEED45 00000000 00000000 0000020D 00000000 comctl32!LISTVIEW_DrawItem +0x126 0141FB54 7BDF0A1F 000200F2 0141FB7C 0000004C 0026C300 comctl32!LISTVIEW_Refresh +0x14a5 0141FBC4 7BDF17EF 000200F2 00000000 00000000 0026C300 comctl32!LISTVIEW_Paint +0xf0 0141FCAC 7BDF4543 000200F2 0000000F 00000000 00000000 comctl32!LISTVIEW_WindowProc +0x24dc 0141FCDC 77A8433E 7BDF2067 000200F2 0000000F 00000000 user32!CALL_EXTERN_WNDPROC +0x1a 0141FE34 77A78569 00366EF8 000200F2 0000000F 00000000 user32!IntCallWindowProcW +0x1566 0141FE8C 77A7A471 0141FEA4 00000020 0141FFB8 7C92FBA4 user32!User32CallWindowProcFromKernel +0x36a 0141FF2C 7C92FBF5 0141FF48 0141FF48 00000000 00000000 ntdll!KiUserCallbackDispatcher +0x2e 0141FF6C 7B08D49D 00264801 000000C9 0141FFA4 00423DAA shell32!SHDesktopMessageLoop +0x9d 0141FF7C 004027E4 00264801 00439F3C 0141FF98 00000000 explorer!_SHDesktopMessageLoop +0x6d 0141FFA4 00423DAA 0025E058 00000000 B7A71D34 FFFFFFFF explorer!CDesktopThread::s_DesktopThreadProc +0x63 0141FFEC 7C5CC531 00423D3C 0025E058 00000000 042444C7 kernel32!BaseThreadStartup +0x31 *----> Raw Stack Dump <----* 0141FFF4 3c 3d 42 00 58 e0 25 00 - 00 00 00 00 c7 44 24 04 <=B.X.%......D$. 01420004 d8 47 26 00 e9 c3 95 c8 - 79 00 00 00 00 00 00 00 .G&.....y....... 01420014 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01420024 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01420034 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01420044 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01420054 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01420064 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01420074 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01420084 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ State Dump for Thread Id 0x2c4 eax:00000118 ebx:0163FEEC ecx:80D1B000 edx:00000000 esi:00000001 edi:00000000 eip:7C92FCA2 esp:0163FE9C ebp:0163FF24 dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0163FF24 7C92FCA2 00000003 00277188 00000000 FFFFFFFF ntdll!KiFastSystemCallRet +0x0 0163FF5C 7BFF9B59 00264CA8 00000003 00277188 80888C90 rpcrt4!rpcrt4_protseq_np_wait_for_new_connection +0x3b 0163FFA4 7BFEE547 00264CA8 00000000 B77C8CD4 FFFFFFFF rpcrt4!RPCRT4_server_thread +0xb2 0163FFEC 7C5CC531 7BFEE495 00264CA8 00000000 00000000 kernel32!BaseThreadStartup +0x31 State Dump for Thread Id 0x3bc eax:000011A4 ebx:00274600 ecx:80D1B000 edx:00000000 esi:01AFFF78 edi:00000000 eip:7C92FCA2 esp:01AFFF3C ebp:01AFFF54 dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 01AFFF54 7C92FCA2 01AFFF78 00000000 00000000 00000000 ntdll!KiFastSystemCallRet +0x0 01AFFFA4 78D7F68D 00274600 00000000 B7A7E12C FFFFFFFF browseui!BrowserThreadProc +0x20b 01AFFFEC 7C5CC531 78D7F476 00274600 00000000 00000000 kernel32!BaseThreadStartup +0x31 *----> Raw Stack Dump <----* 01AFFFF4 76 f4 d7 78 00 46 27 00 - 00 00 00 00 00 00 00 00 v..x.F'......... 01B00004 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01B00014 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01B00024 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01B00034 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01B00044 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01B00054 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01B00064 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01B00074 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01B00084 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ State Dump for Thread Id 0x4e0 eax:7FFDA000 ebx:00000001 ecx:00000002 edx:00000003 esi:00000004 edi:00000005 eip:7C92FEDB esp:011CFFE8 ebp:011CFFF4 dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 011CFFF4 7C92FEDB 00000000 00000000 00000000 00000000 ntdll!DbgBreakPoint +0x1