ReactOS 0.4.15-x86-dev DrWtsn32 Application exception occurred: App: explorer.exe (pid=1276, tid=0x61c) When: 20/7/2024 @ 22:48:30.231 First chance: 0 Exception number: 0xc0000005 (EXCEPTION_ACCESS_VIOLATION) Exception flags: 0x00000000 Exception address: 7AFE1573 Exception parameters: 2 Parameter 0: 0x00000000 Parameter 1: 0x00301891 *----> System Information <----* Computer Name: REACTOS-DNIOVP8 User Name: Administrator BIOS Vendor: innotek GmbH BIOS Version: VirtualBox BIOS Date: 12/01/2006 System Manufacturer: innotek GmbH System Family: Virtual Machine System Model: VirtualBox System Version: 1.2 Baseboard Manufacturer: Oracle Corporation Baseboard Model: VirtualBox Baseboard Version: 1.2 Number of Processors: 1 Processor Type: x86 Family 21 Model 2 Stepping 0 ReactOS Version: 5.2 BuildLab: 20240721-0.4.15-dev-8417-gb6b82fe.GNU_8.4.0 Service Pack: Service Pack 2 Current Type: Uniprocessor Checked Registered Organization: Registered Owner: Owner *----> Task List <----* 0: [System Process] 4: System 128: smss.exe 176: csrss.exe 196: winlogon.exe 220: services.exe 228: lsass.exe 264: VBoxService.exe 292: svchost.exe 308: eventlog.exe 460: rpcss.exe 504: svchost.exe 548: svchost.exe 576: wlansvc.exe 608: spoolsv.exe 676: audiosrv.exe 788: VBoxTray.exe 796: kbswitch.exe 1276: explorer.exe 1596: drwtsn32.exe *----> Module List <----* (00000000 - 001AB000) C:\ReactOS\explorer.exe (005B0000 - 006AF000) C:\ReactOS\system32\comdlg32.dll (10000000 - 10050000) C:\ReactOS\System32\VBoxMRXNP.dll (70C60000 - 70E0B000) C:\ReactOS\System32\wdmaud.drv (717C0000 - 7183E000) C:\ReactOS\System32\stobject.dll (71A40000 - 71C4F000) C:\ReactOS\System32\shellbtrfs.dll (71C60000 - 71CBE000) C:\ReactOS\System32\shdocvw.dll (72C40000 - 72C4C000) C:\ReactOS\system32\ntdll_vista.dll (72CC0000 - 72CD6000) C:\ReactOS\System32\nfs41_np.dll (72D50000 - 72DFA000) C:\ReactOS\System32\netshell.dll (74440000 - 7445D000) C:\ReactOS\System32\msacm32.drv (74690000 - 746A7000) C:\ReactOS\System32\midimap.dll (74A80000 - 74A96000) C:\ReactOS\System32\lpk.dll (75140000 - 75150000) C:\ReactOS\System32\ksuser.dll (75170000 - 7517B000) C:\ReactOS\system32\kernel32_vista.dll (77A20000 - 77BAA000) C:\ReactOS\system32\user32.dll (78DA0000 - 78F6E000) C:\ReactOS\System32\browseui.dll (78FB0000 - 78FC1000) C:\ReactOS\System32\beepmidi.dll (79280000 - 792B4000) C:\ReactOS\system32\apphelp.dll (79370000 - 79380000) C:\ReactOS\system32\advapi32_vista.dll (79840000 - 798AB000) C:\ReactOS\system32\usp10.dll (79E80000 - 79ECD000) C:\ReactOS\System32\uxtheme.dll (79EF0000 - 79F2D000) C:\ReactOS\System32\userenv.DLL (7A410000 - 7A42B000) C:\ReactOS\System32\powrprof.dll (7A4E0000 - 7A511000) C:\ReactOS\System32\msacm32.dll (7A730000 - 7A795000) C:\ReactOS\system32\imm32.dll (7A7B0000 - 7A7BE000) C:\ReactOS\system32\psapi.dll (7AAF0000 - 7AB20000) C:\ReactOS\system32\mpr.dll (7AB40000 - 7ACAB000) C:\ReactOS\system32\setupapi.dll (7ACC0000 - 7AEAA000) C:\ReactOS\system32\oleaut32.dll (7AEC0000 - 7AEDD000) C:\ReactOS\system32\version.dll (7AF10000 - 7B959000) C:\ReactOS\system32\shell32.dll (7BA70000 - 7BB17000) C:\ReactOS\System32\winmm.dll (7BB30000 - 7BB8E000) C:\ReactOS\system32\winspool.drv (7BBA0000 - 7BDB9000) C:\ReactOS\system32\ole32.dll (7BDD0000 - 7BFC3000) C:\ReactOS\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.2600.2982_none_deadbeef\comctl32.dll (7BFE0000 - 7C0B1000) C:\ReactOS\system32\rpcrt4.dll (7C0D0000 - 7C190000) C:\ReactOS\system32\shlwapi.dll (7C1B0000 - 7C1C4000) C:\ReactOS\system32\ws2help.dll (7C1E0000 - 7C217000) C:\ReactOS\system32\ws2_32.dll (7C230000 - 7C268000) C:\ReactOS\System32\iphlpapi.dll (7C310000 - 7C34F000) C:\ReactOS\System32\dhcpcsvc.dll (7C370000 - 7C409000) C:\ReactOS\system32\gdi32.dll (7C420000 - 7C4CB000) C:\ReactOS\system32\advapi32.dll (7C4E0000 - 7C5A4000) C:\ReactOS\system32\msvcrt.dll (7C5E0000 - 7C8EF000) C:\ReactOS\system32\kernel32.dll (7C920000 - 7CA6C000) C:\ReactOS\System32\ntdll.dll State Dump for Thread Id 0x61c (CRASH) eax:000050E1 ebx:00000000 ecx:00301891 edx:00005094 esi:002FC7B0 edi:01B3D33C eip:7AFE1573 esp:01B3D244 ebp:01B3D26C dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 01B3D26C 7AFE1573 002FC7B0 7AFE2455 002FC7B0 002A6920 shell32!ILGetSize +0x2a 01B3D2A4 7AFE15F3 002FC7B0 00000002 01B3D2CC 002F0A88 shell32!ILClone +0x1c 01B3D2F4 7AFE2631 002FC7B0 78E09C00 01B3D32C 01B3D33C shell32!SHBindToParent +0x14d 01B3D574 78DD7972 002FC7E8 002FC7B0 01B3D5A8 00000003 browseui!CShellBrowser::BrowseToPath +0x392 01B3D5C4 78DD7276 002FC7B0 00000003 78E08770 01B3D5E8 browseui!CShellBrowser::BrowseToPIDL +0xc8 01B3D5F4 78DDB36B 002E62C8 002FC7B0 00000000 002FC7B0 browseui!CShellBrowser::BrowseObject +0x80 01B3D634 78DB8F91 002A68F0 00000000 00000004 00000000 browseui!CAddressEditBox::Execute +0xd7 01B3D64C 78DB9195 002A68F0 000B009A 00000111 0001A205 browseui!CAddressEditBox::OnWinEvent +0x9b 01B3D694 78DB73B4 00298C80 000B009A 00000111 0001A205 browseui!CAddressBand::OnWinEvent +0x70 01B3D6C4 78DCFB2A 00298CA9 000B009A 00000111 0001A205 browseui!IUnknown_RelayWinEvent +0x6e 01B3D6F4 78DD30BF 0032BEF8 000B009A 00000111 0001A205 browseui!CInternetToolbar::OnWinEvent +0x5d 01B3D724 78DD438C 00000111 0001A205 000B009A 01B3D740 browseui!CInternetToolbar::OnCommand +0x28 01B3D754 78DE9707 00080128 00000111 0001A205 000B009A browseui!CInternetToolbar::ProcessWindowMessage +0x108 01B3D7B4 78DF1A74 0032BEF8 00000111 0001A205 000B009A browseui!CWindowImplBaseT >::WindowProc +0x7c 01B3D7E4 77A8B656 01B50000 00080128 00000111 0001A205 user32!CALL_EXTERN_WNDPROC +0x1a 01B3D954 77A7F8F4 00363CB0 00080128 00000111 0001A205 user32!IntCallWindowProcW +0x1857 01B3D9A4 77A7FD0E 00363CB0 00080128 00000111 0001A205 user32!IntCallMessageProc +0x22d 01B3DA1C 77A80907 00080128 00000111 0001A205 000B009A user32!SendMessageW +0x150 01B3DACC 7BE42224 008A0156 00000111 0001A205 000B009A comctl32!REBAR_WindowProc +0x367 01B3DAFC 77A8B656 7BE41EBD 008A0156 00000111 0001A205 user32!CALL_EXTERN_WNDPROC +0x1a 01B3DC6C 77A7F8F4 00363E70 008A0156 00000111 0001A205 user32!IntCallWindowProcW +0x1857 01B3DCBC 77A7FD0E 00363E70 008A0156 00000111 0001A205 user32!IntCallMessageProc +0x22d 01B3DD34 77A80907 008A0156 00000111 0001A205 000B009A user32!SendMessageW +0x150 01B3E3A4 7BDDEF3F 000B009A 00000000 77A9B1AC 77A5A544 comctl32!COMBOEX_Command +0x48c 01B3E4A4 7BDDFFB3 000B009A 00000111 0001A205 0006015A comctl32!COMBOEX_WindowProc +0xe7a 01B3E4D4 77A8B656 7BDDF139 000B009A 00000111 0001A205 user32!CALL_EXTERN_WNDPROC +0x1a 01B3E644 77A7F8F4 00362E50 000B009A 00000111 0001A205 user32!IntCallWindowProcW +0x1857 01B3E674 77A7FE9E 7BDDF139 000B009A 00000111 0001A205 user32!CallWindowProcW +0x51 01B3E6D4 78DF1AAB 00298C80 00000111 0001A205 0006015A browseui!CWindowImplBaseT >::WindowProc +0xb3 01B3E704 77A8B656 01B90000 000B009A 00000111 0001A205 user32!CALL_EXTERN_WNDPROC +0x1a 01B3E874 77A7F8F4 00362E50 000B009A 00000111 0001A205 user32!IntCallWindowProcW +0x1857 01B3E8A4 77A7FE9E 01B90000 000B009A 00000111 0001A205 user32!CallWindowProcW +0x51 01B3E8FC 78DF1D6B 002A6938 00000111 0001A205 0006015A browseui!CContainedWindowT >::WindowProc +0xb7 01B3E92C 77A8B656 01BF0000 000B009A 00000111 0001A205 user32!CALL_EXTERN_WNDPROC +0x1a 01B3EA9C 77A7F8F4 00362E50 000B009A 00000111 0001A205 user32!IntCallWindowProcW +0x1857 01B3EAEC 77A7FD0E 00362E50 000B009A 00000111 0001A205 user32!IntCallMessageProc +0x22d 01B3EB64 77A80907 000B009A 00000111 0001A205 0006015A user32!SendMessageW +0x150 01B3EC0C 7BDDA4B5 0006015A 00000111 000103E8 00080160 comctl32!COMBO_WindowProc +0x8ee 01B3EC3C 77A8B656 7BDD9BC7 0006015A 00000111 000103E8 user32!CALL_EXTERN_WNDPROC +0x1a 01B3EDAC 77A7F8F4 003633E0 0006015A 00000111 000103E8 user32!IntCallWindowProcW +0x1857 01B3EDDC 77A7FE9E 7BDD9BC7 0006015A 00000111 000103E8 user32!CallWindowProcW +0x51 01B3EE1C 7BDE5AA4 0006015A 00000111 000103E8 00080160 comctl32!DefSubclassProc +0x148 01B3F4DC 7BDDDBF8 0006015A 00000111 000103E8 00080160 comctl32!COMBOEX_ComboWndProc +0x94 01B3F51C 7BDE59C8 0006015A 00000111 000103E8 00080160 comctl32!DefSubclassProc +0x6c 01B3F564 7BDE5B31 0006015A 00000111 000103E8 00080160 comctl32!COMCTL32_SubclassProc +0x5c 01B3F594 77A8B656 7BDE5AD5 0006015A 00000111 000103E8 user32!CALL_EXTERN_WNDPROC +0x1a 01B3F704 77A7F8F4 003633E0 0006015A 00000111 000103E8 user32!IntCallWindowProcW +0x1857 01B3F754 77A7FD0E 003633E0 0006015A 00000111 000103E8 user32!IntCallMessageProc +0x22d 01B3F7CC 77A80907 0006015A 00000111 000103E8 00080160 user32!SendMessageW +0x150 01B3F7EC 7BE09757 01B3FA6C 00000073 00000043 00000000 comctl32!LISTBOX_HandleLButtonUp +0x9a 01B3FCCC 7BE0E6AE 00080160 00000202 00000000 00430073 comctl32!LISTBOX_WindowProc +0x281c 01B3FCFC 77A8B656 7BE0BE92 00080160 00000202 00000000 user32!CALL_EXTERN_WNDPROC +0x1a 01B3FE6C 77A7F8F4 00363550 00080160 00000202 00000000 user32!IntCallWindowProcW +0x1857 01B3FEBC 77A7FD0E 00363550 00080160 00000202 00000000 user32!IntCallMessageProc +0x22d 01B3FF24 77A8047F 01B3FF58 01B3FF58 00000000 00000000 user32!DispatchMessageW +0x24d 01B3FF84 78DCA506 002AF310 00000000 7C9676FD 7C92FD27 browseui!ExplorerMessageLoop +0x1ea 01B3FFA4 78DCA681 002AF310 00000000 FFFFFFFF 7C63476B browseui!BrowserThreadProc +0x17 01B3FFEC 7C5FCA58 78DCA660 002AF310 00000000 042444C7 kernel32!BaseThreadStartup +0x47 *----> Raw Stack Dump <----* 01B3FFF4 60 a6 dc 78 10 f3 2a 00 - 00 00 00 00 c7 44 24 04 `..x..*......D$. 01B40004 50 63 2e 00 e9 df 19 2b - 77 00 00 00 00 00 00 00 Pc.....+w....... 01B40014 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01B40024 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01B40034 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01B40044 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01B40054 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01B40064 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01B40074 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01B40084 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ State Dump for Thread Id 0x500 eax:000011CB ebx:0000007F ecx:80F70000 edx:00000000 esi:00000001 edi:002A0134 eip:7C92F8B2 esp:0022F590 ebp:0022F610 dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0022F610 7C92F8B2 002A0134 0000007F 00000002 00000000 ntdll!KiFastSystemCallRet +0x0 0022F878 0042C140 002AF8A0 00000590 00000001 00080160 explorer!_ZN14CTaskSwitchWnd20UpdateTaskItemButtonEP10_TASK_ITEM +0x110 0022F8E8 00427C71 0000C01D 00000006 002A0134 0022F96C explorer!CTaskSwitchWnd::OnShellHook +0xdc9 0022F980 0042BC36 0004015C 0000C01D 00000006 002A0134 explorer!CTaskSwitchWnd::ProcessWindowMessage +0x1c62 0022F9E0 00433FEA 0027D638 0000C01D 00000006 002A0134 explorer!CWindowImplBaseT >::WindowProc +0x82 0022FA10 77A8B656 00D00000 0004015C 0000C01D 00000006 user32!CALL_EXTERN_WNDPROC +0x1a 0022FB80 77A7F8F4 00368FA0 0004015C 0000C01D 00000006 user32!IntCallWindowProcW +0x1857 0022FBD0 77A7FD0E 00368FA0 0004015C 0000C01D 00000006 user32!IntCallMessageProc +0x22d 0022FC38 77A8047F 0022FC54 0022FC54 00000000 00000000 user32!DispatchMessageW +0x24d 0022FC78 004148EC 00277164 0043F910 0044A008 7C945377 explorer!TrayMessageLoop +0x1f 0022FEA8 004029C7 00400000 0043D028 0043F8EF 0043FD84 explorer!StartWithDesktop +0xfa 0022FED0 00402B3E 00400000 00000000 0023A02E 00000001 explorer!wWinMain +0x9e 0022FEE8 00417BF9 00000001 0023AC20 00239000 00000000 explorer!wmain +0x2d 0022FF98 00417113 0022FFF0 7C5F1CDE FFFFFFFE 00000009 explorer!__tmainCRTStartup +0x30e 0022FFA0 00417168 FFFFFFFE 00000009 0022FFF8 00000004 explorer!wWinMainCRTStartup +0x17 0022FFF0 7C5F1CDE 00417151 00000000 75010175 00000000 kernel32!BaseProcessStartup +0x47 *----> Raw Stack Dump <----* 0022FFF8 51 71 41 00 00 00 00 00 - 75 01 01 75 00 00 00 00 QqA.....u..u.... 00230008 ee ff ee ff 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 00230018 00 00 23 00 00 00 23 00 - 00 01 00 00 a8 0b 23 00 ..#...#.......#. 00230028 00 00 33 00 2c 00 00 00 - 04 00 00 00 00 00 00 00 ..3.,........... 00230038 78 00 62 01 ec 0a 23 00 - 02 00 00 00 00 00 00 00 x.b...#......... 00230048 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 00230058 00 00 00 00 00 00 00 00 - 00 fe 00 00 ff ee ef 0e ................ 00230068 00 00 20 00 00 20 00 00 - 00 02 00 00 00 20 00 00 .. .. ....... .. 00230078 7e 02 00 00 ff ef fd 7f - 01 00 a8 0b 00 00 00 00 ~............... 00230088 00 00 00 00 00 00 00 00 - 58 00 62 01 e8 0f 62 01 ........X.b...b. State Dump for Thread Id 0x50c eax:00000118 ebx:7C967BEC ecx:80F70000 edx:00000000 esi:00F7FB3C edi:00000007 eip:7C92F8B2 esp:00F7FAEC ebp:00F7FB74 dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 00F7FB74 7C92F8B2 00000007 0029A2B8 00000000 FFFFFFFF ntdll!KiFastSystemCallRet +0x0 00F7FB94 7C5F6F4D 00000007 0029A2B8 00000000 FFFFFFFF kernel32!WaitForMultipleObjects +0x2e 00F7FFA4 00409760 0027ED00 00000000 FFFFFFFF 7C63476B explorer!CIconWatcher::WatcherThread +0xa6 00F7FFEC 7C5FCA58 004096AE 0027ED00 00000000 75010175 kernel32!BaseThreadStartup +0x47 *----> Raw Stack Dump <----* 00F7FFF4 ae 96 40 00 00 ed 27 00 - 00 00 00 00 75 01 01 75 ..@...'.....u..u 00F80004 00 00 00 00 ee ff ee ff - 00 00 00 00 00 00 00 00 ................ 00F80014 00 00 00 00 00 00 f8 00 - 00 00 f8 00 10 00 00 00 ................ 00F80024 a8 0b f8 00 00 00 f9 00 - 00 00 00 00 00 00 00 00 ................ 00F80034 00 00 00 00 38 00 f8 00 - 38 00 f8 00 02 10 00 00 ....8...8....... 00F80044 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 00F80054 00 00 00 00 00 00 00 00 - 00 00 00 00 00 fe 00 00 ................ 00F80064 ff ee ef 0e 00 00 10 00 - 00 20 00 00 00 02 00 00 ......... ...... 00F80074 00 20 00 00 7a 1e 00 00 - ff ef fd 7f 04 00 a8 0b . ..z........... 00F80084 00 00 00 00 00 00 00 00 - 00 00 00 00 e4 0a f8 00 ................ State Dump for Thread Id 0x518 eax:000011A4 ebx:0119FD20 ecx:80F70000 edx:00000000 esi:0000C094 edi:00F90000 eip:7C92F8B2 esp:0119FCEC ebp:0119FD04 dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0119FD04 7C92F8B2 0119FD20 00000000 00000000 00000000 ntdll!KiFastSystemCallRet +0x0 0119FD44 717C1730 00000188 0000C094 00000000 86400000 stobject!CSysTray::SysTrayMessageLoop +0x23 0119FF9C 717C1952 0119FFEC 7C5FCA58 002806C8 00000000 stobject!CSysTray::SysTrayThreadProc +0x1ea 0119FFA4 717C1705 002806C8 00000000 FFFFFFFF 7C63476B stobject!CSysTray::s_SysTrayThreadProc +0x8 0119FFEC 7C5FCA58 717C16FA 002806C8 00000000 00000030 kernel32!BaseThreadStartup +0x47 *----> Raw Stack Dump <----* 0119FFF4 fa 16 7c 71 c8 06 28 00 - 00 00 00 00 30 00 00 00 ..|q..(.....0... 011A0004 01 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 011A0014 00 00 00 00 10 00 00 00 - 02 00 00 00 00 00 00 00 ................ 011A0024 00 00 00 00 80 04 00 00 - 44 03 00 00 10 00 00 00 ........D....... 011A0034 02 00 00 00 00 00 00 00 - 00 00 00 00 80 04 00 00 ................ 011A0044 44 03 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 D............... 011A0054 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 011A0064 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 011A0074 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 011A0084 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ State Dump for Thread Id 0x51c eax:000011A4 ebx:013FFF30 ecx:80F70000 edx:00000000 esi:00296B21 edi:00296B21 eip:7C92F8B2 esp:013FFEF4 ebp:013FFF0C dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 013FFF0C 7C92F8B2 013FFF30 00000000 00000000 00000000 ntdll!KiFastSystemCallRet +0x0 013FFF54 7AF27A2C 00296B21 000000C9 013FFF9C 004020C5 shell32!SHDesktopMessageLoop +0x4f 013FFF64 004037AD 00296B21 00446F2C 013FFF88 00000000 explorer!_SHDesktopMessageLoop +0x6f 013FFF9C 004020C5 013FFFEC 7C5FCA58 002997B8 00000000 explorer!CDesktopThread::DesktopThreadProc +0x120 013FFFA4 004020DB 002997B8 00000000 FFFFFFFF 7C63476B explorer!CDesktopThread::s_DesktopThreadProc +0x8 013FFFEC 7C5FCA58 004020D0 002997B8 00000000 042444C7 kernel32!BaseThreadStartup +0x47 *----> Raw Stack Dump <----* 013FFFF4 d0 20 40 00 b8 97 29 00 - 00 00 00 00 c7 44 24 04 . @...)......D$. 01400004 50 8b 29 00 e9 9f a0 c1 - 79 00 00 00 00 00 00 00 P.).....y....... 01400014 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01400024 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01400034 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01400044 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01400054 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01400064 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01400074 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01400084 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ State Dump for Thread Id 0x520 eax:00000118 ebx:7C967BEC ecx:80F70000 edx:00000000 esi:0160FEEC edi:00000004 eip:7C92F8B2 esp:0160FE9C ebp:0160FF24 dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0160FF24 7C92F8B2 00000004 002EAE40 00000000 FFFFFFFF ntdll!KiFastSystemCallRet +0x0 0160FF5C 7C01BB53 0029C000 00000004 002EAE40 00000000 rpcrt4!rpcrt4_protseq_np_wait_for_new_connection +0x3b 0160FFA4 7C00F596 0029C000 00000000 FFFFFFFF 7C63476B rpcrt4!RPCRT4_server_thread +0x25f 0160FFEC 7C5FCA58 7C00F337 0029C000 00000000 042444C7 kernel32!BaseThreadStartup +0x47 *----> Raw Stack Dump <----* 0160FFF4 37 f3 00 7c 00 c0 29 00 - 00 00 00 00 c7 44 24 04 7..|..)......D$. 01610004 08 81 29 00 e9 27 72 a0 - 79 00 00 00 00 00 00 00 ..)..'r.y....... 01610014 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01610024 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01610034 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01610044 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01610054 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01610064 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01610074 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01610084 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ State Dump for Thread Id 0x524 eax:00000119 ebx:7C967BFB ecx:80F70000 edx:00000000 esi:00000001 edi:FFFFFFFE eip:7C92F8B2 esp:0182FF2C ebp:0182FF8C dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0182FF8C 7C92F8B2 FFFFFFFE FFFFFFFF 00000001 00000000 ntdll!KiFastSystemCallRet +0x0 0182FFA4 7AF27E92 00000000 00000000 FFFFFFFF 7C63476B shell32!DirectoryWatcherThreadFuncAPC +0x23 0182FFEC 7C5FCA58 7AF27E66 00000000 00000000 09010008 kernel32!BaseThreadStartup +0x47 *----> Raw Stack Dump <----* 0182FFF4 66 7e f2 7a 00 00 00 00 - 00 00 00 00 08 00 01 09 f~.z............ 01830004 00 00 01 00 ee ff ee ff - 00 00 00 00 00 00 00 00 ................ 01830014 00 00 00 00 00 00 23 00 - 00 00 83 01 00 01 00 00 ......#......... 01830024 40 00 83 01 00 00 93 01 - ff 00 00 00 01 00 00 00 @............... 01830034 00 00 00 00 a8 00 62 01 - a8 00 62 01 16 00 01 00 ......b...b..... 01830044 08 00 01 0a 78 00 38 00 - 36 00 5f 00 6d 00 69 00 ....x.8.6._.m.i. 01830054 63 00 72 00 6f 00 73 00 - 6f 00 66 00 74 00 2e 00 c.r.o.s.o.f.t... 01830064 77 00 69 00 6e 00 64 00 - 6f 00 77 00 73 00 2e 00 w.i.n.d.o.w.s... 01830074 63 00 6f 00 6d 00 6d 00 - 6f 00 6e 00 2d 00 63 00 c.o.m.m.o.n.-.c. 01830084 6f 00 6e 00 74 00 72 00 - 6f 00 6c 00 73 00 5f 00 o.n.t.r.o.l.s._. State Dump for Thread Id 0x644 eax:7FFAF000 ebx:00000001 ecx:00000002 edx:00000003 esi:00000004 edi:00000005 eip:7C966197 esp:01C5FFE8 ebp:01C5FFF4 dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 01C5FFF4 7C966197 00000000 00000000 00000000 00000000 ntdll!DbgBreakPoint +0x1 *----> Raw Stack Dump <----* 01C5FFFC 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01C6000C 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01C6001C 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01C6002C 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01C6003C 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01C6004C 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01C6005C 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01C6006C 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01C6007C 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01C6008C 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................