Instant Online Crash Analysis, brought to you by OSR Open Systems Resources, Inc.
Show DivPrimary Analysis
Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (
http://www.osr.com)
Online Crash Dump Analysis Service
See
http://www.osronline.com for more information
Windows 7 Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: SingleUserTS Personal
kernel32.dll version: 6.1.7601.23418 (win7sp1_ldr.160408-2045)
Machine Name:
Debug session time: Fri Aug 5 20:53:55.000 2016 (UTC - 4:00)
System Uptime: not available
Process Uptime: 0 days 0:22:30.000
Kernel time: 0 days 0:00:05.000
User time: 0 days 0:00:06.000
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\oca.ini, error 2
TRIAGER: Could not open triage file : e:\dump_analysis\program\winxp\triage.ini, error 2
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\user.ini, error 2
*******************************************************************************
* *
* Exception Analysis *
* *
*******************************************************************************
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\guids.ini, error 2
*** WARNING: Unable to verify timestamp for DropboxExt64.40.dll
*** ERROR: Module load completed but symbols could not be loaded for DropboxExt64.40.dll
*** WARNING: Unable to verify timestamp for WZSHLS64.DLL
*** ERROR: Module load completed but symbols could not be loaded for WZSHLS64.DLL
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
FAULTING_IP:
shell32!HDXA_GetCommandString+f4
000007fe`fe4e0476 41ff5228 call qword ptr [r10+28h]
EXCEPTION_RECORD: ffffffffffffffff -- (.exr 0xffffffffffffffff)
ExceptionAddress: 000007fefe4e0476 (shell32!HDXA_GetCommandString+0x00000000000000f4)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000110052018
Attempt to read from address 0000000110052018
PROCESS_NAME: explorer.exe
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000110052018
READ_ADDRESS: 0000000110052018
FOLLOWUP_IP:
shell32!HDXA_GetCommandString+f4
000007fe`fe4e0476 41ff5228 call qword ptr [r10+28h]
NTGLOBALFLAG: 0
APPLICATION_VERIFIER_FLAGS: 0
MANAGED_STACK: !dumpstack -EE
No export dumpstack found
MANAGED_BITNESS_MISMATCH:
Managed code needs matching platform of sos.dll for proper analysis. Use 'x64' debugger.
FAULTING_THREAD: 00000000000024ac
BUGCHECK_STR: APPLICATION_FAULT_WRONG_SYMBOLS_INVALID_POINTER_READ_NOSOS
PRIMARY_PROBLEM_CLASS: WRONG_SYMBOLS_NOSOS
DEFAULT_BUCKET_ID: WRONG_SYMBOLS_NOSOS
LAST_CONTROL_TRANSFER: from 000007fefe4e0391 to 000007fefe4e0476
STACK_TEXT:
00000000`20ddd570 000007fe`fe4e0391 : 00000000`00000000 00000000`25506e30 00000000`00000004 00000000`00000000 : shell32!HDXA_GetCommandString+0xf4
00000000`20ddd5d0 000007fe`e8833644 : 00000000`0000002f 00000000`03c807cb 00000000`00000048 000007fe`fe4dede5 : shell32!CDefFolderMenu::GetCommandString+0x1cf
00000000`20ddd890 000007fe`e883d4f0 : 00000000`0000000f 00000000`00000000 00000000`0000000f 00000000`03c807cb : EXPLORERFRAME!ContextMenu_GetCommandStringVerb+0xa8
00000000`20dddc30 000007fe`e8801c43 : 00000000`1d997790 00000000`2075d720 00000000`03c807cb 00000000`7737ca5b : EXPLORERFRAME!CContextMenuOnContextMenuArrayNoDuplicateVerbs::QueryContextMenu+0x134
00000000`20ddddf0 000007fe`e88024fd : 00000000`1d997790 00000000`00000008 00000000`0000006e 00000000`1be56c60 : EXPLORERFRAME!CNscTree::_CreateContextMenu+0x93
00000000`20ddde40 000007fe`e87b79ff : 00000000`1d997790 00000000`00000000 00000000`20ddec40 00000363`00000054 : EXPLORERFRAME!CNscTree::_OnContextMenu+0x341
00000000`20dddf10 000007fe`e8732e32 : 00000000`000105aa 00000000`77389ae6 00000000`1d997870 00000000`0000004e : EXPLORERFRAME!CNscTree::_OnNotify+0x851
00000000`20dde3b0 000007fe`e8731b54 : 00000000`1d997870 00000000`0000004e 00000000`20ddec40 00000000`c000000f : EXPLORERFRAME!CNscTree::v_WndProc+0xc2
00000000`20dde420 00000000`77389c11 : 000007fe`e8731af0 00000000`00000064 00000000`00000001 00000000`00000001 : EXPLORERFRAME!CImpWndProc::s_WndProc+0x91
00000000`20dde460 00000000`77383bd4 : 00000000`000105aa 000007fe`e8731af0 00000000`0000004e 00000000`00000064 : user32!UserCallWinProcCheckWow+0x1ad
00000000`20dde520 00000000`77383b50 : 00000000`20dde830 00000000`20ddec40 00000000`0000004e 00000000`000105ae : user32!CallWindowProcAorW+0xdc
00000000`20dde570 000007fe`fbce6205 : 00000000`20805740 00000000`000105ae 00000000`00000000 000007fe`fbce6758 : user32!CallWindowProcW+0x18
00000000`20dde5b0 000007fe`fbce6990 : 00000000`00000064 00000000`7738795a 00000000`000105aa 00000000`77389ae6 : comctl32!CallOriginalWndProc+0x1d
00000000`20dde5f0 000007fe`fbce6758 : 00000000`00000000 00000000`000105aa 00000000`00050420 00000000`00000001 : comctl32!CallNextSubclassProc+0x8c
00000000`20dde670 000007fe`e87319b6 : 00000000`20ddec40 00000000`000105aa 00000000`0000004e 00000000`000105aa : comctl32!DefSubclassProc+0x7c
00000000`20dde6c0 000007fe`e8732f36 : 00000000`00000000 00000000`1d997818 00000000`00000064 00000000`20ddec40 : EXPLORERFRAME!DefSubclassProc+0x56
00000000`20dde6f0 000007fe`fbce6990 : 00000000`20dde830 00000000`00000064 00000000`0000004e 00000000`00000001 : EXPLORERFRAME!CNotifySubclassWndProc::s_SubclassWndProc+0x114
00000000`20dde760 000007fe`fbce6867 : 00000000`00000000 00000000`000105aa 00000000`1be716e0 000007fe`fd764789 : comctl32!CallNextSubclassProc+0x8c
00000000`20dde7e0 00000000`77389c11 : 00000000`0000004e 000007fe`fe5e3abe 00000000`1be77b70 00000000`00000064 : comctl32!MasterSubclassProc+0xe7
00000000`20dde880 00000000`77383bd4 : 00000000`000105aa 000007fe`fbce6780 00000000`0000004e 00000000`00000064 : user32!UserCallWinProcCheckWow+0x1ad
00000000`20dde940 00000000`77383b50 : 00000000`20321e30 00000000`20ddec40 00000000`0000004e 00000000`000105ae : user32!CallWindowProcAorW+0xdc
00000000`20dde990 000007fe`fb771a0b : 00000000`00000007 00000000`20321e30 00000000`004e5343 00000000`20ddec40 : user32!CallWindowProcW+0x18
00000000`20dde9d0 00000000`77389c11 : 00000000`00000000 00000000`0000004e 00000000`000105aa 00000000`00000001 : duser!WndBridge::RawWndProc+0xd9
00000000`20ddea30 00000000`77386ab8 : 00000000`00816180 00000000`1cd20ec0 00000000`fffffe0e 00000000`20ddec40 : user32!UserCallWinProcCheckWow+0x1ad
00000000`20ddeaf0 00000000`77386bbd : 00000000`000105aa 00000000`0000004e 00000000`00000064 00000000`77380af2 : user32!SendMessageWorker+0x682
00000000`20ddeb80 000007fe`fbce9845 : 00000000`00000064 00000000`00000000 00000000`00000000 000007fe`00000001 : user32!SendMessageW+0x5c
00000000`20ddebd0 000007fe`fbd53d3a : 00000000`1d9cd000 00000000`1d9cd000 00000000`00000000 00000000`1be56c60 : comctl32!CCSendNotify+0xfbd
00000000`20ddecf0 000007fe`fbd58722 : 00000000`1beb1840 00000000`7759476d 00000000`201c47b0 00000000`000105ae : comctl32!TV_SendRButtonDown+0xba
00000000`20dded60 00000000`77389c11 : 00000000`02040001 000007fe`e8732d20 00000000`1d997790 00000000`000105ae : comctl32!TV_WndProc+0xa56
00000000`20ddee70 00000000`77383bd4 : 00000000`000105ae 000007fe`fbd57ccc 00000000`00000204 00000000`00000002 : user32!UserCallWinProcCheckWow+0x1ad
00000000`20ddef30 00000000`77383b50 : 00000000`20ddf280 00000000`030b0053 00000000`00000204 00000000`00000000 : user32!CallWindowProcAorW+0xdc
00000000`20ddef80 000007fe`fbce6205 : 00000000`00000020 00000000`00000000 00000000`00000000 00000000`77389c2f : user32!CallWindowProcW+0x18
00000000`20ddefc0 000007fe`fbce6990 : 00000000`00000002 00000000`7738795a 00000000`000105ae 00000000`77389ae6 : comctl32!CallOriginalWndProc+0x1d
00000000`20ddf000 000007fe`fbce6758 : 00000000`00000000 00000000`000105ae 00000000`00000000 00000000`773872f7 : comctl32!CallNextSubclassProc+0x8c
00000000`20ddf080 000007fe`e87319b6 : 00000000`030b0053 00000000`000105ae 00000000`00000204 00000000`7739862c : comctl32!DefSubclassProc+0x7c
00000000`20ddf0d0 000007fe`e8732c72 : 00000000`1d997790 00000000`00000204 00000000`030b0053 00000000`00000204 : EXPLORERFRAME!DefSubclassProc+0x56
00000000`20ddf100 000007fe`e8732d0e : 00000000`1d997790 00000000`000105ae 00000000`00000204 00000000`00000002 : EXPLORERFRAME!CNscTree::_SubClassTreeWndProc+0x505
00000000`20ddf170 000007fe`fbce6990 : 00000000`20ddf280 00000000`1d8fc430 00000000`00000204 00000000`00000001 : EXPLORERFRAME!CNscTree::s_SubClassTreeWndProc+0x5a
00000000`20ddf1b0 000007fe`fbce6867 : 00000000`00000000 00000000`000105ae 00000000`20ddf308 00000000`00000000 : comctl32!CallNextSubclassProc+0x8c
00000000`20ddf230 00000000`77389c11 : 00000000`00000000 00000000`00000001 00000000`00000001 000007fe`00000000 : comctl32!MasterSubclassProc+0xe7
00000000`20ddf2d0 00000000`7738992a : 00000000`20ddf450 000007fe`fbce6780 000007fe`e887b550 00000000`00816510 : user32!UserCallWinProcCheckWow+0x1ad
00000000`20ddf390 000007fe`e87408d0 : 00000000`1d8fc404 00000000`1d8fc430 00000000`00000001 000007fe`fbce6780 : user32!DispatchMessageWorker+0x3d0
00000000`20ddf420 000007fe`e8744da9 : 00000000`1d8fc430 00000000`00000002 00000000`00000000 00000000`00000000 : EXPLORERFRAME!CExplorerFrame::FrameMessagePump+0x436
00000000`20ddf4a0 000007fe`e874551b : 00000000`1d8fc430 00000000`1d799c70 00000000`00000000 00000000`00000000 : EXPLORERFRAME!BrowserThreadProc+0x180
00000000`20ddf520 000007fe`e87454b2 : 100c0482`00000001 00000000`1da1d060 00000000`20ddf618 000007fe`fd403790 : EXPLORERFRAME!BrowserNewThreadProc+0x53
00000000`20ddf550 000007fe`e873be50 : 00000000`0285a700 00000000`1d7bd760 00000000`00000000 00000000`00000ec8 : EXPLORERFRAME!CExplorerTask::InternalResumeRT+0x12
00000000`20ddf580 000007fe`fe52efcb : 80000000`01000000 00000000`20ddf610 ffffffff`fffffffe 00000000`0000000b : EXPLORERFRAME!CRunnableTask::Run+0xda
00000000`20ddf5b0 000007fe`fe52ef03 : 00000000`0285a7f0 00000000`2019e2b0 ffffffff`fffffffe 00000000`00000002 : shell32!CShellTask::TT_Run+0x124
00000000`20ddf5e0 000007fe`fe532bf2 : 00000000`0285a7f0 00000000`0285a7f0 00000000`00000000 00000000`00000010 : shell32!CShellTaskThread::ThreadProc+0xd0
00000000`20ddf680 000007fe`fd75c71e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!CShellTaskThread::s_ThreadProc+0x26
00000000`20ddf6b0 00000000`774859bd : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shlwapi!WrapperThreadProc+0x19b
00000000`20ddf7b0 00000000`775ba2e1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : kernel32!BaseThreadInitThunk+0xd
00000000`20ddf7e0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x1d
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: shell32!HDXA_GetCommandString+f4
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: shell32
IMAGE_NAME: shell32.dll
DEBUG_FLR_IMAGE_TIMESTAMP: 5708a7fc
STACK_COMMAND: ~25s; .ecxr ; kb
FAILURE_BUCKET_ID: WRONG_SYMBOLS_NOSOS_c0000005_shell32.dll!HDXA_GetCommandString
BUCKET_ID: X64_APPLICATION_FAULT_WRONG_SYMBOLS_INVALID_POINTER_READ_NOSOS_shell32!HDXA_GetCommandString+f4
WATSON_STAGEONE_URL:
http://watson.microsoft.com/StageOne/ex ... Retriage=1
Followup: MachineOwner
---------