ReactOS 0.4.15-dev DrWtsn32 Application exception occurred: App: explorer.exe (pid=852, tid=0x37c) When: 4/1/2080 @ 08:15:20.22 First chance: 0 Exception number: 0xc0000005 (EXCEPTION_ACCESS_VIOLATION) Exception flags: 0x00000000 Exception address: 77A4D5A2 Exception parameters: 2 Parameter 0: 0x00000000 Parameter 1: 0x0185A80C *----> System Information <----* Computer Name: REACTOS-8PVFEJU User Name: Administrator BIOS Vendor: Hewlett-Packard BIOS Version: 68DTD Ver. F.13 BIOS Date: 04/20/2006 System Manufacturer: Hewlett-Packard System Family: € System Model: HP Compaq nc6120 (PY505ET#ABU) System Version: F.13 System SKU: Baseboard Manufacturer: Hewlett-Packard Baseboard Model: 099C Baseboard Version: KBC Version 39.2A Number of Processors: 1 Processor Type: x86 Family 6 Model 13 Stepping 8 ReactOS Version: 5.2 BuildLab: 20200430-0.4.15-dev-95-g7895704.GNU_4.7.2 Service Pack: Service Pack 2 Current Type: Uniprocessor Checked Registered Organization: Registered Owner: Owner *----> Task List <----* 0: [System Process] 4: System 128: smss.exe 188: csrss.exe 208: winlogon.exe 232: services.exe 240: lsass.exe 300: svchost.exe 312: eventlog.exe 400: rpcss.exe 444: svchost.exe 516: svchost.exe 552: wlansvc.exe 604: spoolsv.exe 728: kbswitch.exe 852: explorer.exe 904: drwtsn32.exe *----> Module List <----* (00000000 - 00190000) C:\ReactOS\explorer.exe (10000000 - 10010000) C:\Program Files\7-Zip\7-zip.dll (71C80000 - 71DAF000) C:\ReactOS\System32\windowscodecs.dll (72A20000 - 72AA3000) C:\ReactOS\System32\stobject.dll (72C90000 - 72E21000) C:\ReactOS\System32\shellbtrfs.dll (72ED0000 - 72F06000) C:\ReactOS\System32\shdocvw.dll (738C0000 - 738EB000) C:\ReactOS\System32\propsys.dll (73EF0000 - 73F06000) C:\ReactOS\System32\nfs41_np.dll (73F80000 - 74032000) C:\ReactOS\System32\netshell.dll (75550000 - 7556C000) C:\ReactOS\System32\msacm32.drv (75790000 - 757A7000) C:\ReactOS\System32\midimap.dll (75B40000 - 75B5C000) C:\ReactOS\System32\lpk.dll (762B0000 - 762BA000) C:\ReactOS\system32\kernel32_vista.dll (77A20000 - 77B8B000) C:\ReactOS\system32\user32.dll (78E10000 - 78FB3000) C:\ReactOS\System32\browseui.dll (78FD0000 - 78FE1000) C:\ReactOS\System32\beepmidi.dll (79290000 - 792BF000) C:\ReactOS\system32\apphelp.dll (79380000 - 7938D000) C:\ReactOS\system32\advapi32_vista.dll (79890000 - 798F0000) C:\ReactOS\system32\usp10.dll (79EF0000 - 79F39000) C:\ReactOS\System32\uxtheme.dll (79F60000 - 79F99000) C:\ReactOS\System32\userenv.DLL (7A500000 - 7A519000) C:\ReactOS\System32\powrprof.dll (7A5D0000 - 7A5FD000) C:\ReactOS\System32\msacm32.dll (7A820000 - 7A847000) C:\ReactOS\system32\imm32.dll (7A860000 - 7A876000) C:\ReactOS\system32\psapi.dll (7ABD0000 - 7ABFC000) C:\ReactOS\system32\mpr.dll (7AC20000 - 7AD82000) C:\ReactOS\system32\setupapi.dll (7ADB0000 - 7AF68000) C:\ReactOS\system32\oleaut32.dll (7AFD0000 - 7AFED000) C:\ReactOS\system32\version.dll (7B020000 - 7B915000) C:\ReactOS\system32\shell32.dll (7B950000 - 7BA48000) C:\ReactOS\system32\comdlg32.dll (7BA70000 - 7BB11000) C:\ReactOS\System32\winmm.dll (7BB30000 - 7BB6D000) C:\ReactOS\system32\winspool.drv (7BB80000 - 7BD5A000) C:\ReactOS\system32\ole32.dll (7BDD0000 - 7BF95000) C:\ReactOS\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.2600.2982_none_deadbeef\comctl32.dll (7BFF0000 - 7C0AC000) C:\ReactOS\system32\rpcrt4.dll (7C0E0000 - 7C170000) C:\ReactOS\system32\shlwapi.dll (7C1A0000 - 7C1B4000) C:\ReactOS\system32\ws2help.dll (7C1D0000 - 7C204000) C:\ReactOS\system32\ws2_32.dll (7C220000 - 7C255000) C:\ReactOS\System32\iphlpapi.dll (7C300000 - 7C33A000) C:\ReactOS\System32\dhcpcsvc.dll (7C350000 - 7C3E3000) C:\ReactOS\system32\gdi32.dll (7C410000 - 7C4AA000) C:\ReactOS\system32\advapi32.dll (7C4E0000 - 7C589000) C:\ReactOS\system32\msvcrt.dll (7C5B0000 - 7C8EB000) C:\ReactOS\system32\kernel32.dll (7C920000 - 7CA39000) C:\ReactOS\System32\ntdll.dll State Dump for Thread Id 0x37c (CRASH) eax:0185A800 ebx:00004550 ecx:0185A810 edx:0000000E esi:00000000 edi:00000000 eip:77A4D5A2 esp:016ED7AC ebp:016ED7C4 dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 016ED7C4 77A4D5A2 01850000 00000000 00000002 016ED850 user32!find_entry_by_id +0x12 016EDC94 77A4E54A 00000000 00000000 00000000 00000000 user32!ICO_ExtractIconExW +0xe90 016EDCEC 77A4EE82 016EDD74 FFFFFFFF 00000000 00000000 user32!PrivateExtractIconExW +0xb8 016EDD34 7B04693A 016EDD74 FFFFFFFF 00000000 00000000 shell32!ExtractIconExW +0xd6 016EDF8C 7B056EB6 0026E850 002BF680 7B11C50C 016EDFD0 shell32!CFSExtractIcon_CreateInstance +0x2ff 016EE04C 7B0589F0 0026E850 00000000 00000001 016EE2A8 shell32!CFSFolder::GetUIObjectOf +0x1d0 016EE29C 7B0463F2 0026E850 002BF680 00000000 00000000 shell32!PidlToSicIndex +0xc8 016EE2E4 7B046588 0026E850 002BF680 00000000 00000000 shell32!SHMapPIDLToSystemImageListIndex +0xcd 016EE45C 7B0808D3 0000004E 00000001 016EE814 016EE478 shell32!CDefView::OnNotify +0x87a 016EE48C 7B0F1FFB 000E0084 0000004E 00000001 016EE814 shell32!CDefView::ProcessWindowMessage +0x22e 016EE4EC 7B0F1C93 00285290 0000004E 00000001 016EE814 shell32!CDefView::WindowProc +0x97 016EE51C 77A847EE 017D0000 000E0084 0000004E 00000001 user32!CALL_EXTERN_WNDPROC +0x1a 016EE674 77A78A00 00365A00 000E0084 0000004E 00000001 user32!IntCallWindowProcW +0x15d8 016EE6C4 77A78E49 00365A00 000E0084 0000004E 00000001 user32!IntCallMessageProc +0x1d4 016EE73C 77A79A44 000E0084 0000004E 00000001 016EE814 user32!SendMessageW +0x10f 016EE774 7BE0CDA4 0004A811 016EE7A8 016EE7BC 77A68A4E comctl32!notify_hdr +0x90 016EE7CC 7BE0F462 00000001 00000000 00000020 FFFFFFFF comctl32!notify_dispinfoT +0x22f 016EE86C 7BE11453 016EEBF0 016EE920 00000000 00000000 comctl32!LISTVIEW_GetItemT +0x5c3 016EEBE4 7BE1EF23 00000000 000000E1 00000000 00000000 comctl32!LISTVIEW_DrawItem +0x126 016EEDEC 7BE20BFE 000700FC 016EEE14 016EEF54 77A78BF0 comctl32!LISTVIEW_Refresh +0x14a6 016EEE5C 7BE219CF 000700FC 00000000 00000000 00000000 comctl32!LISTVIEW_Paint +0xf0 016EEF44 7BE248FF 000700FC 0000000F 00000000 00000000 comctl32!LISTVIEW_WindowProc +0x24f8 016EEF74 77A847EE 7BE22407 000700FC 0000000F 00000000 user32!CALL_EXTERN_WNDPROC +0x1a 016EF0CC 77A78A00 0036B170 000700FC 0000000F 00000000 user32!IntCallWindowProcW +0x15d8 016EF124 77A7A9C9 016EF13C 00000020 016EFFB8 7C92FD94 user32!User32CallWindowProcFromKernel +0x374 016EF174 7C92FDE5 000E0084 00000000 00000000 00000000 ntdll!KiUserCallbackDispatcher +0x2e 016EF1E4 7B08215A 00285290 002670C9 00288191 00000000 shell32!CDefView::CreateViewWindow3 +0x6ed 016EF21C 7B0795F3 00285290 00288191 016EF4C4 002670C9 shell32!CDefView::CreateViewWindow +0x45 016EF4A4 78E2E625 0026E850 0028FA58 016EF4C4 00000003 browseui!CShellBrowser::BrowseToPath +0x281 016EF4DC 78E2EC6E 0028FA58 00000003 002670C9 002A9F48 browseui!CShellBrowser::BrowseToPIDL +0xa2 016EF4F4 78E2EE42 002670A0 0028FA58 00000010 016EF510 browseui!CShellBrowser::BrowseObject +0x3c 016EF524 7B08AAC0 016EF588 002449B8 00000010 016EF530 shell32!CDefaultContextMenu::TryToBrowse +0xa1 016EF55C 7B08ACDC 016EF588 00000000 00000000 00000000 shell32!CDefaultContextMenu::InvokeRegVerb +0x7b 016EF5B4 7B08AE10 002A9F48 016EF5D0 016EF5EC 77A50705 shell32!CDefaultContextMenu::InvokeCommand +0xbf 016EF604 7B07E2B3 00000000 00000000 00000000 00000000 shell32!CDefView::InvokeContextMenuCommand +0x70 016EF634 7B07E3E1 00230640 0028A230 00230000 00230000 shell32!CDefView::OpenSelectedItems +0xdc 016EF7AC 7B08043D 0000004E 00000001 016EFB34 016EF7C8 shell32!CDefView::OnNotify +0x3e4 016EF7DC 7B0F1FFB 0010015A 0000004E 00000001 016EFB34 shell32!CDefView::ProcessWindowMessage +0x22e 016EF83C 7B0F1C93 00288168 0000004E 00000001 016EFB34 shell32!CDefView::WindowProc +0x97 016EF86C 77A847EE 009A0000 0010015A 0000004E 00000001 user32!CALL_EXTERN_WNDPROC +0x1a 016EF9C4 77A78A00 0036B320 0010015A 0000004E 00000001 user32!IntCallWindowProcW +0x15d8 016EFA14 77A78E49 0036B320 0010015A 0000004E 00000001 user32!IntCallMessageProc +0x1d4 016EFA8C 77A79A44 0010015A 0000004E 00000001 016EFB34 user32!SendMessageW +0x10f 016EFAC4 7BE0CDA4 00000000 00000000 00000000 00000000 comctl32!notify_hdr +0x90 016EFB74 7BE11A5A 00000000 00000000 00000000 00000000 comctl32!notify_click +0x129 016EFC2C 7BE21AC1 00000016 00000000 00000000 00000000 comctl32!LISTVIEW_LButtonDblClk +0xd2 016EFD14 7BE2367D 000E006E 00000203 00000001 00160100 comctl32!LISTVIEW_WindowProc +0x1276 016EFD44 77A847EE 7BE22407 000E006E 00000203 00000001 user32!CALL_EXTERN_WNDPROC +0x1a 016EFE9C 77A78A00 00363398 000E006E 00000203 00000001 user32!IntCallWindowProcW +0x15d8 016EFEEC 77A78E49 00363398 000E006E 00000203 00000001 user32!IntCallMessageProc +0x1d4 016EFF54 77A795A2 016EFF78 016EFF78 00000000 00000000 user32!DispatchMessageW +0x1fc 016EFFA4 78E1F775 0026A0C8 00000000 B0928594 FFFFFFFF browseui!BrowserThreadProc +0x1e3 016EFFEC 7C5CC591 78E1F586 0026A0C8 00000000 042444C7 kernel32!BaseThreadStartup +0x31 *----> Raw Stack Dump <----* 016EFFF4 86 f5 e1 78 c8 a0 26 00 - 00 00 00 00 c7 44 24 04 ...x..&......D$. 016F0004 a0 70 26 00 e9 19 ce 73 - 77 00 00 00 00 00 00 00 .p&....sw....... 016F0014 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 016F0024 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 016F0034 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 016F0044 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 016F0054 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 016F0064 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 016F0074 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 016F0084 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ State Dump for Thread Id 0x358 eax:000011A4 ebx:0022FC14 ecx:8009C000 edx:00000000 esi:0023EA28 edi:00000030 eip:7C92FE92 esp:0022FBE0 ebp:0022FBF8 dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0022FBF8 7C92FE92 0022FC14 00000000 00000000 00000000 ntdll!KiFastSystemCallRet +0x0 0022FC38 0040CF2D 0023EA54 0043738C 00442074 00040030 explorer!TrayMessageLoop +0x2f 0022FE58 004020AA 00000003 00432018 00437369 0043748B explorer!StartWithDesktop +0x152 0022FED0 0040224F 00400000 00000000 00235226 00000001 explorer!wWinMain +0xfc 0022FEE8 004181FD 00000001 0023F9E0 00235928 F6F8FB98 explorer!wmain +0x2d 0022FF98 004173E1 0022FFF0 7C5C16E7 FFFFFFFE 00000009 explorer!__tmainCRTStartup +0x2e0 0022FFA0 0041742A FFFFFFFE 00000009 0022FFF8 00000004 explorer!wWinMainCRTStartup +0x17 0022FFF0 7C5C16E7 00417413 00000000 EC0100ED 00000000 kernel32!BaseProcessStartup +0x35 *----> Raw Stack Dump <----* 0022FFF8 13 74 41 00 00 00 00 00 - ed 00 01 ec 00 00 00 00 .tA............. 00230008 ee ff ee ff 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 00230018 00 00 23 00 00 00 23 00 - 00 01 00 00 68 07 23 00 ..#...#.....h.#. 00230028 00 00 33 00 6a 00 00 00 - 01 00 00 00 00 00 00 00 ..3.j........... 00230038 b0 06 23 00 b0 06 23 00 - 02 00 00 00 00 00 00 00 ..#...#......... 00230048 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 00230058 00 00 00 00 00 00 00 00 - 00 fe 00 00 ff ee ef 0e ................ 00230068 00 00 10 00 00 20 00 00 - 00 02 00 00 00 20 00 00 ..... ....... .. 00230078 69 0b 00 00 ff ef fd 7f - 01 00 68 07 00 00 00 00 i.........h..... 00230088 00 00 00 00 00 00 00 00 - c0 06 23 00 50 07 23 00 ..........#.P.#. State Dump for Thread Id 0x364 eax:00000118 ebx:00BFFB34 ecx:8009C000 edx:00000000 esi:00000000 edi:00000000 eip:7C92FE92 esp:00BFFAE4 ebp:00BFFB6C dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 00BFFB6C 7C92FE92 00000005 0024FA40 00000000 FFFFFFFF ntdll!KiFastSystemCallRet +0x0 00BFFB8C 7C5C69A3 00000005 0024FA40 00000000 FFFFFFFF kernel32!WaitForMultipleObjects +0x2e 00BFFFA4 00407824 00248EA8 00000000 B0933064 FFFFFFFF explorer!CIconWatcher::WatcherThread +0xe9 00BFFFEC 7C5CC591 0040772C 00248EA8 00000000 4E9F000D kernel32!BaseThreadStartup +0x31 *----> Raw Stack Dump <----* 00BFFFF4 2c 77 40 00 a8 8e 24 00 - 00 00 00 00 0d 00 9f 4e ,w@...$........N 00C00004 01 00 3f 00 3f 00 3f 00 - 3f 00 00 00 00 00 00 00 ..?.?.?.?....... 00C00014 00 00 00 00 00 00 03 01 - 00 00 01 00 02 00 03 00 ................ 00C00024 04 00 05 00 06 00 07 00 - 08 00 09 00 0a 00 0b 00 ................ 00C00034 0c 00 0d 00 0e 00 0f 00 - 10 00 11 00 12 00 13 00 ................ 00C00044 14 00 15 00 16 00 17 00 - 18 00 19 00 1a 00 1b 00 ................ 00C00054 1c 00 1d 00 1e 00 1f 00 - 20 00 21 00 22 00 23 00 ........ .!.".#. 00C00064 24 00 25 00 26 00 27 00 - 28 00 29 00 2a 00 2b 00 $.%.&.'.(.).*.+. 00C00074 2c 00 2d 00 2e 00 2f 00 - 30 00 31 00 32 00 33 00 ,.-.../.0.1.2.3. 00C00084 34 00 35 00 36 00 37 00 - 38 00 39 00 3a 00 3b 00 4.5.6.7.8.9.:.;. State Dump for Thread Id 0x368 eax:000011A4 ebx:0106FD20 ecx:8009C000 edx:00000000 esi:00E60000 edi:0000C176 eip:7C92FE92 esp:0106FCEC ebp:0106FD04 dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0106FD04 7C92FE92 0106FD20 00000000 00000000 00000000 ntdll!KiFastSystemCallRet +0x0 0106FD44 72A21918 00000188 0000C176 00000000 86400000 stobject!CSysTray::SysTrayMessageLoop +0x3f 0106FF9C 72A21B1D 0106FFEC 7C5CC591 0024A810 00000000 stobject!CSysTray::SysTrayThreadProc +0x1e5 0106FFA4 72A21B5D 0024A810 00000000 B097B5E4 FFFFFFFF stobject!CSysTray::s_SysTrayThreadProc +0x8 0106FFEC 7C5CC591 72A21B52 0024A810 00000000 00000000 kernel32!BaseThreadStartup +0x31 *----> Raw Stack Dump <----* 0106FFF4 52 1b a2 72 10 a8 24 00 - 00 00 00 00 00 00 00 00 R..r..$......... 01070004 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01070014 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01070024 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01070034 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01070044 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01070054 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01070064 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01070074 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01070084 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ State Dump for Thread Id 0x374 eax:000011A4 ebx:012BFF48 ecx:8009C000 edx:00000000 esi:00259559 edi:00000000 eip:7C92FE92 esp:012BFF14 ebp:012BFF2C dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 012BFF2C 7C92FE92 012BFF48 00000000 00000000 00000000 ntdll!KiFastSystemCallRet +0x0 012BFF6C 7B0D1E5C 00259559 000000C9 012BFFA4 00423F1A shell32!SHDesktopMessageLoop +0xc0 012BFF7C 004027E4 00259559 0043A208 012BFF98 00000000 explorer!_SHDesktopMessageLoop +0x6d 012BFFA4 00423F1A 002527C8 00000000 B09E882C FFFFFFFF explorer!CDesktopThread::s_DesktopThreadProc +0x63 012BFFEC 7C5CC591 00423EAC 002527C8 00000000 042444C7 kernel32!BaseThreadStartup +0x31 *----> Raw Stack Dump <----* 012BFFF4 ac 3e 42 00 c8 27 25 00 - 00 00 00 00 c7 44 24 04 .>B..'%......D$. 012C0004 30 95 25 00 e9 c3 fc e2 - 79 00 00 00 00 00 00 00 0.%.....y....... 012C0014 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 012C0024 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 012C0034 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 012C0044 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 012C0054 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 012C0064 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 012C0074 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 012C0084 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ State Dump for Thread Id 0x378 eax:00000118 ebx:014DFEEC ecx:8009C000 edx:00000000 esi:00000001 edi:00000000 eip:7C92FE92 esp:014DFE9C ebp:014DFF24 dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 014DFF24 7C92FE92 00000003 0025D5A0 00000000 FFFFFFFF ntdll!KiFastSystemCallRet +0x0 014DFF5C 7C02A6FB 00258F30 00000003 0025D5A0 8088A430 rpcrt4!rpcrt4_protseq_np_wait_for_new_connection +0x3b 014DFFA4 7C01F097 00258F30 00000000 B08EA54C FFFFFFFF rpcrt4!RPCRT4_server_thread +0xb2 014DFFEC 7C5CC591 7C01EFE5 00258F30 00000000 042444C7 kernel32!BaseThreadStartup +0x31 *----> Raw Stack Dump <----* 014DFFF4 e5 ef 01 7c 30 8f 25 00 - 00 00 00 00 c7 44 24 04 ...|0.%......D$. 014E0004 30 62 25 00 e9 67 03 c1 - 79 00 00 00 00 00 00 00 0b%..g..y....... 014E0014 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 014E0024 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 014E0034 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 014E0044 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 014E0054 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 014E0064 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 014E0074 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 014E0084 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................