RIght clicking on folders crashes my xplorer2 lite

Support for xplorer² free lite version

Moderators: fgagnon, nikos, Site Mods

Bob
New Member
Posts: 1
Joined: 2005 Dec 20, 11:45

RIght clicking on folders crashes my xplorer2 lite

Post by Bob »

I am cutting and pasting images into different folders, every 2 or 3 right clicks either to copy or to paste my xplorer2 lite prog crashes and i have to reopen it, which is very annoying :( because i like the program very much.


I,m not really sure what i can give to help, but this is the error in doc watson file

Thanks if anyone can help out.

State Dump for Thread Id 0x824

eax=00816c74 ebx=00000000 ecx=00000036 edx=00000000 esi=0012fcc8 edi=00000000
eip=77e5842b esp=0012fa14 ebp=0012fa34 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00000246


function: GetMenuItemRect
       77e58412 b899110000       mov     eax,0x1199
       77e58417 8d542404         lea     edx,[esp+0x4]          ss:012898fb=00000000
       77e5841b cd2e             int     2e
       77e5841d c21000           ret     0x10
       77e58420 b89a110000       mov     eax,0x119a
       77e58425 8d542404         lea     edx,[esp+0x4]          ss:012898fb=00000000
       77e58429 cd2e             int     2e
       77e5842b c21000           ret     0x10

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name
0012FA34 004046D5 0012FCC8 00000000 00000000 00000000 user32!GetMenuItemRect
0012FCE4 00441727 00000001 00320072 00132F25 00000000 !<nosymbols>
0012FF24 0044EE06 00400000 00000000 00132F25 00000001 !<nosymbols>
0012FFC0 7C59893D 00320072 0065002E 7FFDF000 00000000 !<nosymbols>
0012FFF0 00000000 0044ECD2 00000000 000000C8 00000100 kernel32!ProcessIdToSessionId

*----> Raw Stack Dump <----*
0012fa14  8f 69 e1 77 c8 fc 12 00 - 00 00 00 00 00 00 00 00  .i.w............
0012fa24  00 00 00 00 00 00 00 00 - c0 76 45 00 00 00 00 00  .........vE.....
0012fa34  e4 fc 12 00 d5 46 40 00 - c8 fc 12 00 00 00 00 00  .....F@.........
0012fa44  00 00 00 00 00 00 00 00 - 00 00 00 00 d0 76 45 00  .............vE.
0012fa54  c0 76 45 00 e4 fa 44 00 - 00 00 00 00 3c 37 45 00  .vE...D.....<7E.
0012fa64  01 00 00 80 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0012fa74  00 00 00 00 00 00 00 00 - 84 fc 12 00 00 00 00 00  ................
0012fa84  a8 07 13 00 11 00 00 00 - 8c fc 12 00 00 00 00 00  ................
0012fa94  3c 37 45 00 3c 37 45 00 - 00 00 00 00 3c 37 45 00  <7E.<7E.....<7E.
0012faa4  3c 37 45 00 3c 37 45 00 - 3c 37 45 00 08 fb 12 00  <7E.<7E.<7E.....
0012fab4  00 00 00 00 76 a2 5c 7c - c1 50 f8 77 00 50 f8 77  ....v.\|.P.w.P.w
0012fac4  2d 00 00 00 da 4f f8 77 - e0 b3 5c 7c 00 00 00 00  -....O.w..\|....
0012fad4  00 00 00 00 dc f6 44 00 - 00 00 00 00 00 00 00 00  ......D.........
0012fae4  01 00 00 00 00 00 00 00 - 3c 37 45 00 60 01 00 00  ........<7E.`...
0012faf4  60 01 00 00 ac fb 12 00 - 00 00 00 00 3c 37 45 00  `...........<7E.
0012fb04  dc f6 44 00 00 00 00 00 - 00 00 00 00 01 00 00 00  ..D.............
0012fb14  00 00 00 00 3c 37 45 00 - 00 00 00 00 30 b7 14 00  ....<7E.....0...
0012fb24  00 00 00 00 00 00 00 00 - 3c 37 45 00 dc f6 44 00  ........<7E...D.
0012fb34  00 00 00 00 00 00 00 00 - 01 00 00 00 00 00 00 00  ................
0012fb44  3c 37 45 00 00 00 13 00 - b8 94 14 00 c0 94 14 00  <7E.............

State Dump for Thread Id 0x9a4

eax=77d358be ebx=00143f18 ecx=0012ba20 edx=00000000 esi=00143db8 edi=00000100
eip=77f83310 esp=00ddfe28 ebp=00ddff74 iopl=0         nv up ei pl nz na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00000206


function: ZwReplyWaitReceivePortEx
       77f83305 b8ac000000       mov     eax,0xac
       77f8330a 8d542404         lea     edx,[esp+0x4]          ss:01f39d0f=????????
       77f8330e cd2e             int     2e
       77f83310 c21400           ret     0x14

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name
00DDFF74 77D37B4C 77D35924 00143DB8 77D33E01 00130000 ntdll!ZwReplyWaitReceivePortEx
00DDFFA8 77D358D6 001435F0 00DDFFEC 7C57B388 00143F18 rpcrt4!NdrCorrelationInitialize
00DDFFB4 7C57B388 00143F18 77D33E01 00130000 00143F18 rpcrt4!RpcBindingFree
00DDFFEC 00000000 00000000 00000000 00000000 00000000 kernel32!lstrcmpiW

State Dump for Thread Id 0xa94

eax=7ce85ae5 ebx=00000102 ecx=00b800b6 edx=00000000 esi=77f82826 edi=00edff74
eip=77f82831 esp=00edff60 ebp=00edff7c iopl=0         nv up ei pl nz na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00000206


function: NtDelayExecution
       77f82826 b832000000       mov     eax,0x32
       77f8282b 8d542404         lea     edx,[esp+0x4]          ss:02039e47=????????
       77f8282f cd2e             int     2e
       77f82831 c20800           ret     0x8
       77f82834 53               push    ebx
       77f82835 51               push    ecx
       77f82836 6a00             push    0x0
       77f82838 c70701000000     mov     dword ptr [edi],0x1    ds:00edff74=dc3cba00
       77f8283e ff750c           push    dword ptr [ebp+0xc]    ss:02039e62=????????
       77f82841 50               push    eax
       77f82842 e879fdffff       call    RtlMultiByteToUnicodeN (77f825c0)
       77f82847 e928fcffff       jmp  RtlConsoleMultiByteToUnicodeN+0x333 (77f82474)

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name
00EDFF7C 7C59A20E 0000EA60 00000000 7CE89ACC 0000EA60 ntdll!NtDelayExecution
00007530 00000000 00000000 00000000 00000000 00000000 kernel32!Sleep

*----> Raw Stack Dump <----*
00edff60  43 a2 59 7c 00 00 00 00 - 74 ff ed 00 73 9f 59 7c  C.Y|....t...s.Y|
00edff70  70 66 14 00 00 ba 3c dc - ff ff ff ff 30 75 00 00  pf....<.....0u..
00edff80  0e a2 59 7c 60 ea 00 00 - 00 00 00 00 cc 9a e8 7c  ..Y|`..........|
00edff90  60 ea 00 00 a7 5b e8 7c - 00 00 00 00 00 00 e2 7c  `....[.|.......|
00edffa0  70 66 14 00 ec ff ed 00 - 70 66 14 00 ff 5a e8 7c  pf......pf...Z.|
00edffb0  85 7d e3 7c 70 7d e3 7c - 88 b3 57 7c 70 66 14 00  .}.|p}.|..W|pf..
00edffc0  85 7d e3 7c 70 7d e3 7c - 70 66 14 00 00 c0 fd 7f  .}.|p}.|pf......
00edffd0  b6 00 b8 00 c0 ff ed 00 - b6 00 b8 00 ff ff ff ff  ................
00edffe0  44 1f 5c 7c 08 2b 57 7c - 00 00 00 00 00 00 00 00  D.\|.+W|........
00edfff0  00 00 00 00 e5 5a e8 7c - 70 66 14 00 00 00 00 00  .....Z.|pf......
00ee0000  01 00 00 00 00 00 00 00 - e2 07 00 00 00 00 00 00  ................
00ee0010  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00ee0020  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00ee0030  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00ee0040  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00ee0050  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00ee0060  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00ee0070  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00ee0080  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00ee0090  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................

State Dump for Thread Id 0xab4

eax=c0000000 ebx=008192a4 ecx=00000000 edx=40000000 esi=00185780 edi=00000000
eip=41001fa4 esp=0103f8d8 ebp=0103f8f4 iopl=0         ov up ei ng nz na po cy
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000a87


function: <nosymbols>
       41001f9a ???
       41001f9b ???
       41001f9c ???
       41001f9d ???
       41001f9e ???
       41001f9f ???
       41001fa0 ???
       41001fa1 ???
       41001fa2 ???
       41001fa3 ???
FAULT ->41001fa4 ???
       41001fa5 ???
       41001fa6 ???
       41001fa7 ???
       41001fa8 ???
       41001fa9 ???
       41001faa ???
       41001fab ???
       41001fac ???
       41001fad ???
       41001fae ???
       41001faf ???

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name
0103F8D4 77E3A3D0 00000000 00000113 000036CA 05B4BDBE <nosymbols>
0103F8F4 77E14750 41001FA4 00000000 00000113 000036CA user32!SetWindowPlacement
0103F910 77E155B0 00000000 00000113 000036CA 05B4BDBE user32!TranslateMessageEx
0103F938 77F9FF57 0103F948 00000018 00000000 00000113 user32!DefWindowProcA
0103F97C 00408B59 00840739 00000102 000002C2 000000BB ntdll!KiUserCallbackDispatcher
0103FA20 00406504 0000007B 00840739 00BB02C2 0103FA48 !<nosymbols>
0103FA4C 00440EF2 00130752 0000007B 00130752 00BB02C2 !<nosymbols>
0103FA94 77E3A3D0 008192A0 0000007B 00130752 00BB02C2 !<nosymbols>
0103FAB4 77E16381 008192A8 00130752 0000007B 00130752 user32!SetWindowPlacement
0103FAE4 77E17361 00564FD0 0000007B 00130752 00BB02C2 user32!IsWindowVisible
0103FB04 717389F7 00130752 0000007B 00130752 00BB02C2 user32!SendMessageW
0103FB84 71738A28 00130752 00000002 00000029 0000003A comctl32!ImageList_GetImageRect
0103FBA4 717171B9 0014CE30 00000000 00000029 0000003A comctl32!ImageList_GetImageRect
0103FD14 77E3A3D0 00130752 00000204 00000002 003A0029 comctl32!Ordinal73
0103FD34 77E16B41 717160D2 00130752 00000204 00000002 user32!SetWindowPlacement
0103FD58 77E16B64 FFFF06E1 00130752 00000204 00000002 user32!ScreenToClient
0103FD78 00440F15 FFFF06E1 00130752 00000204 00000002 user32!CallWindowProcA
0103FDBC 77E3A3D0 008192A0 00000204 00000002 003A0029 !<nosymbols>
0103FDDC 77E14605 008192A8 00130752 00000204 00000002 user32!SetWindowPlacement
0103FE68 77E15B77 0103FE98 00000001 0042BD80 0103FE98 user32!TranslateMessageEx
0103FEB8 0042BBE3 00000000 008172D8 0103FF78 0103FEE0 user32!DispatchMessageA
00000000 00000000 00000000 00000000 00000000 00000000 !<nosymbols>

*----> Raw Stack Dump <----*
0103f8d8  d0 a3 e3 77 00 00 00 00 - 13 01 00 00 ca 36 00 00  ...w.........6..
0103f8e8  be bd b4 05 80 57 18 00 - cd ab ba dc 10 f9 03 01  .....W..........
0103f8f8  50 47 e1 77 a4 1f 00 41 - 00 00 00 00 13 01 00 00  PG.w...A........
0103f908  ca 36 00 00 be bd b4 05 - 38 f9 03 01 b0 55 e1 77  .6......8....U.w
0103f918  00 00 00 00 13 01 00 00 - ca 36 00 00 be bd b4 05  .........6......
0103f928  a4 1f 00 41 30 00 00 00 - 00 00 00 00 00 00 00 00  ...A0...........
0103f938  7c f9 03 01 57 ff f9 77 - 48 f9 03 01 18 00 00 00  |...W..wH.......
0103f948  00 00 00 00 13 01 00 00 - ca 36 00 00 be bd b4 05  .........6......
0103f958  a4 1f 00 41 05 47 e1 77 - 95 ed e4 77 39 07 84 00  ...A.G.w...w9...
0103f968  02 01 00 00 c2 02 00 00 - bb 00 00 00 2a 02 1f 00  ............*...
0103f978  00 00 00 00 20 fa 03 01 - 59 8b 40 00 39 07 84 00  .... ...Y.@.9...
0103f988  02 01 00 00 c2 02 00 00 - bb 00 00 00 00 00 00 00  ................
0103f998  2a 02 1f 00 00 00 00 00 - 9c fa 03 01 01 00 00 00  *...............
0103f9a8  52 07 13 00 28 fb 03 01 - d8 f9 03 01 00 00 00 00  R...(...........
0103f9b8  28 7f 81 00 01 e9 00 00 - 08 fa 03 01 f2 0e 44 00  (.............D.
0103f9c8  be 07 31 00 4e 00 00 00 - 28 f8 44 00 2a 02 1f 00  ..1.N...(.D.*...
0103f9d8  e0 75 81 00 78 07 1d 00 - 80 57 18 00 03 00 00 00  .u..x....W......
0103f9e8  00 00 00 00 be 07 31 00 - 4e 00 00 00 01 e9 00 00  ......1.N.......
0103f9f8  28 fb 03 01 c2 02 00 00 - bb 00 00 00 00 00 00 00  (...............
0103fa08  02 00 00 00 01 00 00 00 - 39 07 84 00 14 00 00 00  ........9.......

State Dump for Thread Id 0xe18

eax=635c82b0 ebx=00000000 ecx=01e50660 edx=00000000 esi=0140ff58 edi=77e2e4f5
eip=77e5842b esp=0140fee4 ebp=0140ff04 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00000246


function: GetMenuItemRect
       77e58412 b899110000       mov     eax,0x1199
       77e58417 8d542404         lea     edx,[esp+0x4]          ss:02569dcb=????????
       77e5841b cd2e             int     2e
       77e5841d c21000           ret     0x10
       77e58420 b89a110000       mov     eax,0x119a
       77e58425 8d542404         lea     edx,[esp+0x4]          ss:02569dcb=????????
       77e58429 cd2e             int     2e
       77e5842b c21000           ret     0x10

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name
0140FF04 0044CF42 0140FF58 00000000 00000000 00000000 user32!GetMenuItemRect
0140FF7C 780085BC 00000AB4 00000065 02BE0400 0081D0F0 !<nosymbols>
0140FFB4 7C57B388 0081D0F0 00000065 02BE0400 0081D0F0 !endthreadex
0140FFEC 00000000 78008532 0081D0F0 00000000 00505A4D kernel32!lstrcmpiW

*----> Raw Stack Dump <----*
0140fee4  8f 69 e1 77 58 ff 40 01 - 00 00 00 00 00 00 00 00  .i.wX.@.........
0140fef4  00 00 00 00 00 00 00 00 - 12 80 00 00 f5 e4 e2 77  ...............w
0140ff04  7c ff 40 01 42 cf 44 00 - 58 ff 40 01 00 00 00 00  |.@.B.D.X.@.....
0140ff14  00 00 00 00 00 00 00 00 - 65 00 00 00 f0 d0 81 00  ........e.......
0140ff24  f0 d0 81 00 30 00 00 00 - 00 00 00 00 ae cf 44 00  ....0.........D.
0140ff34  00 00 00 00 00 00 00 00 - 00 00 40 00 00 00 00 00  ..........@.....
0140ff44  00 00 00 00 00 00 00 00 - 00 00 00 00 94 6b 45 00  .............kE.
0140ff54  00 00 00 00 f4 08 0d 00 - 11 80 00 00 00 00 00 00  ................
0140ff64  90 f7 6b 01 54 b5 b4 05 - 08 02 00 00 c5 02 00 00  ..k.T...........
0140ff74  a0 c7 81 00 b4 ff 40 01 - b4 ff 40 01 bc 85 00 78  ......@...@....x
0140ff84  b4 0a 00 00 65 00 00 00 - 00 04 be 02 f0 d0 81 00  ....e...........
0140ff94  00 75 be 81 40 fb d3 81 - 88 ff 40 01 00 00 00 00  .u..@.....@.....
0140ffa4  dc ff 40 01 6a bd 00 78 - 20 2f 03 78 00 00 00 00  ..@.j..x /.x....
0140ffb4  ec ff 40 01 88 b3 57 7c - f0 d0 81 00 65 00 00 00  ..@...W|....e...
0140ffc4  00 04 be 02 f0 d0 81 00 - 00 a0 fd 7f 00 00 00 00  ................
0140ffd4  c0 ff 40 01 00 00 00 00 - ff ff ff ff 44 1f 5c 7c  ..@.........D.\|
0140ffe4  08 2b 57 7c 00 00 00 00 - 00 00 00 00 00 00 00 00  .+W|............
0140fff4  32 85 00 78 f0 d0 81 00 - 00 00 00 00 4d 5a 50 00  2..x........MZP.
01410004  02 00 00 00 04 00 0f 00 - ff ff 00 00 b8 00 00 00  ................
01410014  00 00 00 00 40 00 1a 00 - 00 00 00 00 00 00 00 00  ....@...........

State Dump for Thread Id 0x9b4

eax=162010d0 ebx=0103f1c0 ecx=ffffffff edx=00000000 esi=77f82826 edi=039eff94
eip=77f82831 esp=039eff80 ebp=039eff9c iopl=0         nv up ei pl nz na pe nc
cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00000202


function: NtDelayExecution
       77f82826 b832000000       mov     eax,0x32
       77f8282b 8d542404         lea     edx,[esp+0x4]          ss:04b49e67=????????
       77f8282f cd2e             int     2e
       77f82831 c20800           ret     0x8
       77f82834 53               push    ebx
       77f82835 51               push    ecx
       77f82836 6a00             push    0x0
       77f82838 c70701000000     mov     dword ptr [edi],0x1    ds:039eff94=fbd3e280
       77f8283e ff750c           push    dword ptr [ebp+0xc]    ss:04b49e82=????????
       77f82841 50               push    eax
       77f82842 e879fdffff       call    RtlMultiByteToUnicodeN (77f825c0)
       77f82847 e928fcffff       jmp  RtlConsoleMultiByteToUnicodeN+0x333 (77f82474)

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name
039EFF9C 7C59A20E 00001B58 00000000 162010DE 00001B58 ntdll!NtDelayExecution
039EFFEC 00000000 162010D0 0103F1C0 00000000 00000008 kernel32!Sleep

*----> Raw Stack Dump <----*
039eff80  43 a2 59 7c 00 00 00 00 - 94 ff 9e 03 00 b0 fd 7f  C.Y|............
039eff90  03 a2 59 7c 80 e2 d3 fb - ff ff ff ff ec ff 9e 03  ..Y|............
039effa0  0e a2 59 7c 58 1b 00 00 - 00 00 00 00 de 10 20 16  ..Y|X......... .
039effb0  58 1b 00 00 00 ef 03 01 - 88 b3 57 7c c0 f1 03 01  X.........W|....
039effc0  00 b0 fd 7f 00 ef 03 01 - c0 f1 03 01 00 90 fd 7f  ................
039effd0  ff ff ff ff c0 ff 9e 03 - ff ff ff ff ff ff ff ff  ................
039effe0  44 1f 5c 7c 08 2b 57 7c - 00 00 00 00 00 00 00 00  D.\|.+W|........
039efff0  00 00 00 00 d0 10 20 16 - c0 f1 03 01 00 00 00 00  ...... .........
039f0000  08 00 00 00 01 01 00 00 - ee ff ee ff 00 00 00 00  ................
039f0010  00 00 8d 03 00 b0 0e 00 - 00 00 9f 03 00 01 00 00  ................
039f0020  40 00 9f 03 00 00 af 03 - eb 00 00 00 01 00 00 00  @...............
039f0030  98 05 8d 03 00 00 00 00 - 88 38 a0 03 00 00 00 00  .........8......
039f0040  09 27 08 00 01 01 08 00 - 0c f8 25 16 f4 f7 25 16  .'........%...%.
039f0050  d0 f7 25 16 b4 f7 25 16 - a0 f7 25 16 01 00 00 00  ..%...%...%.....
039f0060  04 93 d7 e0 be 84 ce 11 - 96 41 44 45 53 54 00 00  .........ADEST..
039f0070  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
039f0080  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
039f0090  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
039f00a0  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
039f00b0  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
User avatar
nikos
Site Admin
Site Admin
Posts: 16296
Joined: 2002 Feb 07, 15:57
Location: UK

Post by nikos »

the crash is at address 41001fa4 which is not in x2, must be some extension dll of yours (you can check with process explorer to find out what lies in this address range)
murt
New Member
Posts: 3
Joined: 2006 Feb 19, 11:19

Xplore2 Lite crashing

Post by murt »

Hi Bob,
Have you got PGP v8.x service running on your PC?
Are you running xPlorer2 under a diferent user profile using the Windows XP Secondary logon service?

Regards,
Martin O'Donnell