ReactOS 0.4.16-x86-dev DrWtsn32 Application exception occurred: App: explorer.exe (pid=424, tid=0x2b8) When: 5/12/2024 @ 08:47:33.972 First chance: 0 Exception number: 0xc0000005 (EXCEPTION_ACCESS_VIOLATION) Exception flags: 0x00000000 Exception address: 77A4F03E Exception parameters: 2 Parameter 0: 0x00000000 Parameter 1: 0x00F08110 *----> System Information <----* Computer Name: REACTOS-762N1ZU User Name: Administrator BIOS Vendor: innotek GmbH BIOS Version: VirtualBox BIOS Date: 12/01/2006 System Manufacturer: innotek GmbH System Family: Virtual Machine System Model: VirtualBox System Version: 1.2 Baseboard Manufacturer: Oracle Corporation Baseboard Model: VirtualBox Baseboard Version: 1.2 Number of Processors: 1 Processor Type: x86 Family 6 Model 58 Stepping 9 ReactOS Version: 5.2 BuildLab: 20241110-0.4.16-dev-254-g30b4024.GNU_8.4.0 Service Pack: Service Pack 2 Current Type: Uniprocessor Checked Registered Organization: Registered Owner: Owner *----> Task List <----* 0: [System Process] 4: System 96: smss.exe 144: csrss.exe 164: winlogon.exe 188: services.exe 196: lsass.exe 228: svchost.exe 252: eventlog.exe 336: rpcss.exe 416: svchost.exe 424: explorer.exe 472: svchost.exe 496: wlansvc.exe 564: spoolsv.exe 688: kbswitch.exe 728: drwtsn32.exe *----> Module List <----* (00000000 - 001B0000) C:\ReactOS\explorer.exe (717C0000 - 7183C000) C:\ReactOS\System32\stobject.dll (71A40000 - 71C4E000) C:\ReactOS\System32\shellbtrfs.dll (71C60000 - 71CCF000) C:\ReactOS\System32\shdocvw.dll (72C40000 - 72C4D000) C:\ReactOS\system32\ntdll_vista.dll (72CC0000 - 72CD6000) C:\ReactOS\System32\nfs41_np.dll (72D50000 - 72DFA000) C:\ReactOS\System32\netshell.dll (73AB0000 - 73AD0000) C:\ReactOS\System32\msrle32.dll (74440000 - 7445D000) C:\ReactOS\System32\msacm32.drv (74690000 - 746A7000) C:\ReactOS\System32\midimap.dll (74A80000 - 74A96000) C:\ReactOS\System32\lpk.dll (75170000 - 7517C000) C:\ReactOS\system32\kernel32_vista.dll (77A20000 - 77BAA000) C:\ReactOS\system32\user32.dll (78DA0000 - 78F5E000) C:\ReactOS\System32\browseui.dll (78FB0000 - 78FC1000) C:\ReactOS\System32\beepmidi.dll (79280000 - 792B4000) C:\ReactOS\system32\apphelp.dll (79370000 - 79381000) C:\ReactOS\system32\advapi32_vista.dll (79840000 - 798AB000) C:\ReactOS\system32\usp10.dll (79E80000 - 79ECD000) C:\ReactOS\System32\uxtheme.dll (79EF0000 - 79F2D000) C:\ReactOS\System32\userenv.DLL (7A410000 - 7A42B000) C:\ReactOS\System32\powrprof.dll (7A4E0000 - 7A511000) C:\ReactOS\System32\msacm32.dll (7A6E0000 - 7A715000) C:\ReactOS\System32\msvfw32.dll (7A730000 - 7A795000) C:\ReactOS\system32\imm32.dll (7A7B0000 - 7A7BE000) C:\ReactOS\system32\psapi.dll (7AAF0000 - 7AB21000) C:\ReactOS\system32\mpr.dll (7AB40000 - 7ACAE000) C:\ReactOS\system32\setupapi.dll (7ACC0000 - 7AEAA000) C:\ReactOS\system32\oleaut32.dll (7AEC0000 - 7AEDE000) C:\ReactOS\system32\version.dll (7AF10000 - 7B942000) C:\ReactOS\system32\shell32.dll (7B950000 - 7BA4E000) C:\ReactOS\system32\comdlg32.dll (7BA70000 - 7BB18000) C:\ReactOS\System32\winmm.dll (7BB30000 - 7BB8F000) C:\ReactOS\system32\winspool.drv (7BBA0000 - 7BDBA000) C:\ReactOS\system32\ole32.dll (7BDD0000 - 7BFCA000) C:\ReactOS\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.2600.2982_none_deadbeef\comctl32.dll (7BFE0000 - 7C0B1000) C:\ReactOS\system32\rpcrt4.dll (7C0D0000 - 7C18F000) C:\ReactOS\system32\shlwapi.dll (7C1B0000 - 7C1C4000) C:\ReactOS\system32\ws2help.dll (7C1E0000 - 7C218000) C:\ReactOS\system32\ws2_32.dll (7C230000 - 7C268000) C:\ReactOS\System32\iphlpapi.dll (7C310000 - 7C34F000) C:\ReactOS\System32\dhcpcsvc.dll (7C370000 - 7C409000) C:\ReactOS\system32\gdi32.dll (7C420000 - 7C4CB000) C:\ReactOS\system32\advapi32.dll (7C4E0000 - 7C5A4000) C:\ReactOS\system32\msvcrt.dll (7C5E0000 - 7C8F0000) C:\ReactOS\system32\kernel32.dll (7C920000 - 7CA72000) C:\ReactOS\System32\ntdll.dll State Dump for Thread Id 0x2b8 (CRASH) eax:0000E8A0 ebx:00F08110 ecx:00011BBF edx:0000B581 esi:0000000E edi:00E93C00 eip:77A4F03E esp:01BAE20C ebp:01BAE224 dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 01BAE224 77A4F03E 00E90000 00000000 00000002 01BAE2AC user32!find_entry_by_id +0x36 01BAE704 77A503C9 00000000 00000000 00000000 00000000 user32!ICO_ExtractIconExW +0x12b5 01BAE754 77A50C93 01BAE990 00000000 00000000 00000000 user32!PrivateExtractIconsW +0x6a 01BAEBB4 7AF7A30C 002C8FA8 0029C8F8 7B06A5A0 01BAEC60 shell32!CFSExtractIcon_CreateInstance +0x5dc 01BAEC74 7AF7C793 002C8FA8 00000000 00000001 01BAEED8 shell32!CFSFolder::GetUIObjectOf +0x333 01BAEECC 7AF5D1FB 002C8FA8 0029C8F8 00000000 00000000 shell32!PidlToSicIndex +0x228 01BAEF14 7AF5D2B4 002C8FA8 0029C8F8 00000000 01BAEF64 shell32!SHMapPIDLToSystemImageListIndex +0x84 01BAF184 7AFB207E 0000004E 00000001 01BAF574 01BAF1A8 shell32!CDefView::OnNotify +0x74b 01BAF1BC 7B020C77 00040130 0000004E 00000001 01BAF574 shell32!CDefView::ProcessWindowMessage +0x2a8 01BAF21C 7B01D392 00295198 0000004E 00000001 01BAF574 shell32!CWindowImplBaseT >::WindowProc +0x82 01BAF23C 7B0208E2 00295198 0000004E 00000001 01BAF574 shell32!CDefView::WindowProc +0x2b 01BAF26C 77A8B4AE 01CD0000 00040130 0000004E 00000001 user32!CALL_EXTERN_WNDPROC +0x1a 01BAF3DC 77A7F74C 007C9F08 00040130 0000004E 00000001 user32!IntCallWindowProcW +0x1857 01BAF42C 77A7FB66 007C9F08 00040130 0000004E 00000001 user32!IntCallMessageProc +0x22d 01BAF4A4 77A8075F 00040130 0000004E 00000001 01BAF574 user32!SendMessageW +0x150 01BAF4DC 7BE0F4B1 01BAF51C 77A6E5CF AC010142 002EA180 comctl32!notify_hdr +0x50 01BAF52C 7BE1481F 00000001 00000000 00000020 FFFFFFFF comctl32!notify_dispinfoT +0x2d5 01BAF5CC 7BE151E7 01BAF950 01BAF680 00000177 00000000 comctl32!LISTVIEW_GetItemT +0x76b 01BAF944 7BE1C94A 00000000 00000000 00000177 00000000 comctl32!LISTVIEW_DrawItem +0xba 01BAFB4C 7BE1E740 00020136 01BAFB74 00000000 00000000 comctl32!LISTVIEW_Refresh +0x14d9 01BAFBBC 7BE1F5CF 00020136 00000000 00000000 00000000 comctl32!LISTVIEW_Paint +0xfc 01BAFC8C 7BE278E2 00020136 0000000F 00000000 00000000 comctl32!LISTVIEW_WindowProc +0x27f3 01BAFCBC 77A8B4AE 7BE250EF 00020136 0000000F 00000000 user32!CALL_EXTERN_WNDPROC +0x1a 01BAFE2C 77A7F74C 007CA198 00020136 0000000F 00000000 user32!IntCallWindowProcW +0x1857 01BAFE84 77A81593 01BAFE9C 00000020 01BAFFB4 7C92F050 user32!User32CallWindowProcFromKernel +0x28e 01BAFF24 7C92F0A1 01BAFF58 01BAFF58 00000000 00000000 ntdll!KiUserCallbackDispatcher +0x2e 01BAFF84 78DCA442 0028D318 00000000 7C969EE1 7C92FD2B browseui!ExplorerMessageLoop +0x1ea 01BAFFA4 78DCA5BD 0028D318 00000000 FFFFFFFF 7C63479B browseui!BrowserThreadProc +0x17 01BAFFEC 7C5FCA74 78DCA59C 0028D318 00000000 042444C7 kernel32!BaseThreadStartup +0x47 *----> Raw Stack Dump <----* 01BAFFF4 9c a5 dc 78 18 d3 28 00 - 00 00 00 00 c7 44 24 04 ...x..(......D$. 01BB0004 b8 3e 29 00 e9 c3 4f 22 - 77 00 00 00 00 00 00 00 .>)...O"w....... 01BB0014 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01BB0024 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01BB0034 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01BB0044 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01BB0054 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01BB0064 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01BB0074 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01BB0084 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ State Dump for Thread Id 0x1b0 eax:000011CB ebx:0000007F ecx:80EFE000 edx:00000000 esi:00000001 edi:001700F0 eip:7C92F14E esp:0022F590 ebp:0022F610 dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0022F610 7C92F14E 001700F0 0000007F 00000002 00000000 ntdll!KiFastSystemCallRet +0x0 0022F878 0042D660 00297BF0 00000590 00000000 002C014A explorer!_ZN14CTaskSwitchWnd20UpdateTaskItemButtonEP10_TASK_ITEM +0x110 0022F8E8 004290C8 0000C01D 00000004 002C014A 0022F96C explorer!CTaskSwitchWnd::OnShellHook +0xd00 0022F980 0042D156 0002009E 0000C01D 00000004 002C014A explorer!CTaskSwitchWnd::ProcessWindowMessage +0x1c62 0022F9E0 00435ABA 0025B490 0000C01D 00000004 002C014A explorer!CWindowImplBaseT >::WindowProc +0x82 0022FA10 77A8B4AE 00E70000 0002009E 0000C01D 00000004 user32!CALL_EXTERN_WNDPROC +0x1a 0022FB80 77A7F74C 007C37E0 0002009E 0000C01D 00000004 user32!IntCallWindowProcW +0x1857 0022FBD0 77A7FB66 007C37E0 0002009E 0000C01D 00000004 user32!IntCallMessageProc +0x22d 0022FC38 77A802D7 0022FC54 0022FC54 00000000 00000000 user32!DispatchMessageW +0x24d 0022FC78 00415F76 002551C4 00440AF4 0044D008 7C948BD3 explorer!TrayMessageLoop +0x1f 0022FEA8 0040299F 00400000 0043E028 00440AD1 00440FC4 explorer!StartWithDesktop +0xfa 0022FED0 00402B16 00400000 00000000 0023A02E 00000001 explorer!wWinMain +0x9e 0022FEE8 0041927D 00000001 0023FE48 00239000 00000000 explorer!wmain +0x2d 0022FF98 00418797 0022FFF0 7C5F1CDE FFFFFFFE 00000009 explorer!__tmainCRTStartup +0x30e 0022FFA0 004187EC FFFFFFFE 00000009 0022FFF8 00000004 explorer!wWinMainCRTStartup +0x17 0022FFF0 7C5F1CDE 004187D5 00000000 75010175 00000000 kernel32!BaseProcessStartup +0x47 *----> Raw Stack Dump <----* 0022FFF8 d5 87 41 00 00 00 00 00 - 75 01 01 75 00 00 00 00 ..A.....u..u.... 00230008 ee ff ee ff 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 00230018 00 00 23 00 00 00 23 00 - 00 01 00 00 a8 0b 23 00 ..#...#.......#. 00230028 00 00 33 00 3e 00 00 00 - 01 00 00 00 00 00 00 00 ..3.>........... 00230038 ec 0a 23 00 ec 0a 23 00 - 02 00 00 00 00 00 00 00 ..#...#......... 00230048 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 00230058 00 00 00 00 00 00 00 00 - 00 fe 00 00 ff ee ef 0e ................ 00230068 00 00 10 00 00 20 00 00 - 00 02 00 00 00 20 00 00 ..... ....... .. 00230078 d3 01 00 00 ff ef fd 7f - 01 00 a8 0b 00 00 00 00 ................ 00230088 00 00 00 00 00 00 00 00 - 14 0b 23 00 8c 0b 23 00 ..........#...#. State Dump for Thread Id 0x288 eax:00000118 ebx:7C96A3D0 ecx:80EFE000 edx:00000000 esi:010FFB3C edi:00000005 eip:7C92F14E esp:010FFAEC ebp:010FFB74 dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 010FFB74 7C92F14E 00000005 00277F88 00000000 FFFFFFFF ntdll!KiFastSystemCallRet +0x0 010FFB94 7C5F6F69 00000005 00277F88 00000000 FFFFFFFF kernel32!WaitForMultipleObjects +0x2e 010FFFA4 0040965C 0025D030 00000000 FFFFFFFF 7C63479B explorer!CIconWatcher::WatcherThread +0xa6 010FFFEC 7C5FCA74 004095AA 0025D030 00000000 75010175 kernel32!BaseThreadStartup +0x47 *----> Raw Stack Dump <----* 010FFFF4 aa 95 40 00 30 d0 25 00 - 00 00 00 00 75 01 01 75 ..@.0.%.....u..u 01100004 00 00 00 00 ee ff ee ff - 00 00 00 00 00 00 00 00 ................ 01100014 00 00 00 00 00 00 10 01 - 00 00 10 01 10 00 00 00 ................ 01100024 a8 0b 10 01 00 00 11 01 - 00 00 00 00 00 00 00 00 ................ 01100034 00 00 00 00 38 00 10 01 - 38 00 10 01 02 10 00 00 ....8...8....... 01100044 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01100054 00 00 00 00 00 00 00 00 - 00 00 00 00 00 fe 00 00 ................ 01100064 ff ee ef 0e 00 00 10 00 - 00 20 00 00 00 02 00 00 ......... ...... 01100074 00 20 00 00 7a 1e 00 00 - ff ef fd 7f 04 00 a8 0b . ..z........... 01100084 00 00 00 00 00 00 00 00 - 00 00 00 00 e4 0a 10 01 ................ State Dump for Thread Id 0x28c eax:000011A4 ebx:0131FD20 ecx:80EFE000 edx:00000000 esi:0000C06A edi:01110000 eip:7C92F14E esp:0131FCEC ebp:0131FD04 dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0131FD04 7C92F14E 0131FD20 00000000 00000000 00000000 ntdll!KiFastSystemCallRet +0x0 0131FD44 717C1730 00000188 0000C06A 00000000 86400000 stobject!CSysTray::SysTrayMessageLoop +0x23 0131FF9C 717C1952 0131FFEC 7C5FCA74 002608C8 00000000 stobject!CSysTray::SysTrayThreadProc +0x1ea 0131FFA4 717C1705 002608C8 00000000 FFFFFFFF 7C63479B stobject!CSysTray::s_SysTrayThreadProc +0x8 0131FFEC 7C5FCA74 717C16FA 002608C8 00000000 00000010 kernel32!BaseThreadStartup +0x47 *----> Raw Stack Dump <----* 0131FFF4 fa 16 7c 71 c8 08 26 00 - 00 00 00 00 10 00 00 00 ..|q..&......... 01320004 02 00 00 00 00 00 00 00 - 00 00 00 00 62 03 00 00 ............b... 01320014 a9 01 00 00 30 00 00 00 - 01 00 00 00 00 00 00 00 ....0........... 01320024 00 00 00 00 00 00 00 00 - 00 00 00 00 10 00 00 00 ................ 01320034 02 00 00 00 00 00 00 00 - 00 00 00 00 00 04 00 00 ................ 01320044 e4 02 00 00 10 00 00 00 - 02 00 00 00 4c 00 00 00 ............L... 01320054 55 02 00 00 c2 03 00 00 - 69 02 00 00 00 00 00 00 U.......i....... 01320064 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01320074 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01320084 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ State Dump for Thread Id 0x290 eax:000011A4 ebx:0152FF30 ecx:80EFE000 edx:00000000 esi:00263269 edi:00263269 eip:7C92F14E esp:0152FEF4 ebp:0152FF0C dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0152FF0C 7C92F14E 0152FF30 00000000 00000000 00000000 ntdll!KiFastSystemCallRet +0x0 0152FF54 7AF27972 00263269 000000C9 0152FF9C 004020B1 shell32!SHDesktopMessageLoop +0x4f 0152FF64 00403749 00263269 0044A05C 0152FF88 00000000 explorer!_SHDesktopMessageLoop +0x6f 0152FF9C 004020B1 0152FFEC 7C5FCA74 00260788 00000000 explorer!CDesktopThread::DesktopThreadProc +0x120 0152FFA4 004020C7 00260788 00000000 FFFFFFFF 7C63479B explorer!CDesktopThread::s_DesktopThreadProc +0x8 0152FFEC 7C5FCA74 004020BC 00260788 00000000 042444C7 kernel32!BaseThreadStartup +0x47 *----> Raw Stack Dump <----* 0152FFF4 bc 20 40 00 88 07 26 00 - 00 00 00 00 c7 44 24 04 . @...&......D$. 01530004 40 32 26 00 e9 3b d0 ae - 79 00 00 00 00 00 00 00 @2&..;..y....... 01530014 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01530024 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01530034 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01530044 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01530054 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01530064 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01530074 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 01530084 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ State Dump for Thread Id 0x2a0 eax:00000118 ebx:7C96A3D0 ecx:80EFE000 edx:00000000 esi:0179FEEC edi:00000003 eip:7C92F14E esp:0179FE9C ebp:0179FF24 dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0179FF24 7C92F14E 00000003 00295DD8 00000000 FFFFFFFF ntdll!KiFastSystemCallRet +0x0 0179FF5C 7C01BB53 0026B9D8 00000003 00295DD8 00000000 rpcrt4!rpcrt4_protseq_np_wait_for_new_connection +0x3b 0179FFA4 7C00F596 0026B9D8 00000000 FFFFFFFF 7C63479B rpcrt4!RPCRT4_server_thread +0x25f 0179FFEC 7C5FCA74 7C00F337 0026B9D8 00000000 75010175 kernel32!BaseThreadStartup +0x47 *----> Raw Stack Dump <----* 0179FFF4 37 f3 00 7c d8 b9 26 00 - 00 00 00 00 75 01 01 75 7..|..&.....u..u 017A0004 00 00 00 00 ee ff ee ff - 00 00 00 00 00 00 00 00 ................ 017A0014 00 00 00 00 00 00 7a 01 - 00 00 7a 01 10 00 00 00 ......z...z..... 017A0024 a8 0b 7a 01 00 00 7b 01 - 0f 00 00 00 01 00 00 00 ..z...{......... 017A0034 00 00 00 00 ec 0a 7a 01 - ec 0a 7a 01 02 00 00 00 ......z...z..... 017A0044 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 017A0054 00 00 00 00 00 00 00 00 - 00 00 00 00 00 fe 00 00 ................ 017A0064 ff ee ef 0e 00 00 10 00 - 00 20 00 00 00 02 00 00 ......... ...... 017A0074 00 20 00 00 83 00 00 00 - ff ef fd 7f 05 00 a8 0b . .............. 017A0084 00 00 00 00 00 00 00 00 - 00 00 00 00 fc 0a 7a 01 ..............z. State Dump for Thread Id 0x2ac eax:00000119 ebx:7C96A3DF ecx:80EFE000 edx:00000000 esi:00000001 edi:FFFFFFFE eip:7C92F14E esp:019AFF2C ebp:019AFF8C dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 019AFF8C 7C92F14E FFFFFFFE FFFFFFFF 00000001 00000000 ntdll!KiFastSystemCallRet +0x0 019AFFA4 7AF27DC2 00000000 00000000 FFFFFFFF 7C63479B shell32!DirectoryWatcherThreadFuncAPC +0x23 019AFFEC 7C5FCA74 7AF27D96 00000000 00000000 00000000 kernel32!BaseThreadStartup +0x47 State Dump for Thread Id 0x2e0 eax:7FFD8000 ebx:00000001 ecx:00000002 edx:00000003 esi:00000004 edi:00000005 eip:7C96897B esp:01D5FFE8 ebp:01D5FFF4 dr0:00000000 dr1:00000000 dr2:00000000 dr3:00000000 dr6:00000000 dr7:00000000 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 01D5FFF4 7C96897B 00000000 00000000 00000000 00000000 ntdll!DbgBreakPoint +0x1