Sysinternals Homepage
Forum Home Forum Home > Windows Discussions > Troubleshooting
  New Posts New Posts RSS Feed - Random Explorer Crashes Windows 7x64.
  FAQ FAQ  Forum Search   Events   Register Register  Login Login

Random Explorer Crashes Windows 7x64.

 Post Reply Post Reply
Author
Message
concretenomad View Drop Down
Newbie
Newbie


Joined: 08 February 2008
Status: Offline
Points: 12
Post Options Post Options   Thanks (0) Thanks(0)   Quote concretenomad Quote  Post ReplyReply Direct Link To This Post Topic: Random Explorer Crashes Windows 7x64.
    Posted: 17 August 2010 at 8:58pm
This is a rather interesting one.  Basically what happens is every now and again (no easy way to reproduce) explorer will just crash when I try and copy/cut and paste a file (CNTRL-C/V or X/V).  I have configured Windows 7 to drop a dump file any time an application crashes so I have a dump file, but the results of the dump file are rather cryptic and not much help.  Basically it tells me that there was an error in the shell32.dll.

I have run ShexView and Autoruns to make sure that I do not have any problematic shell DLLs.  The only ones that are non Microsoft are Synaptics-System, Intel-ContextMenu, my antivirus-Shell, iTunes-System, and BlueWire-PropertySheet.

I can upload the dump file if needed.  I will include the results of the !analyze in another post.


Edited by concretenomad - 17 August 2010 at 9:25pm
Back to Top
concretenomad View Drop Down
Newbie
Newbie


Joined: 08 February 2008
Status: Offline
Points: 12
Post Options Post Options   Thanks (0) Thanks(0)   Quote concretenomad Quote  Post ReplyReply Direct Link To This Post Posted: 17 August 2010 at 9:25pm
GetPageUrlData failed, server returned HTTP status 404
URL requested: http://watson.microsoft.com/StageOne/explorer_exe/6_1_7600_16450/4aebab8d/user32_dll/6_1_7600_16385/4a5be088/c000041d/0001c2cd.htm?Retriage=1

FAULTING_IP:
user32!UserCallWinProcCheckWow+29
00000000`770ac2cd 4883608000      and     qword ptr [rax-80h],0

EXCEPTION_RECORD:  ffffffffffffffff -- (.exr 0xffffffffffffffff)
ExceptionAddress: 00000000770ac2cd (user32!UserCallWinProcCheckWow+0x0000000000000029)
   ExceptionCode: c000041d
  ExceptionFlags: 00000001
NumberParameters: 0

DEFAULT_BUCKET_ID:  APPLICATION_FAULT

PROCESS_NAME:  explorer.exe

ERROR_CODE: (NTSTATUS) 0xc000041d - An unhandled exception was encountered during a user callback.

EXCEPTION_CODE: (NTSTATUS) 0xc000041d - An unhandled exception was encountered during a user callback.

MOD_LIST: <ANALYSIS/>

NTGLOBALFLAG:  0

APPLICATION_VERIFIER_FLAGS:  0

FAULTING_THREAD:  0000000000000694

PRIMARY_PROBLEM_CLASS:  APPLICATION_FAULT

BUGCHECK_STR:  APPLICATION_FAULT_APPLICATION_FAULT

LAST_CONTROL_TRANSFER:  from 00000000770a6484 to 00000000770ac2cd

STACK_TEXT:  
00000000`00133f60 00000000`770a6484 : 00000000`000100ec 000007fe`fdbd1180 00000000`00000308 00000000`003409c4 : user32!UserCallWinProcCheckWow+0x29
00000000`00134020 00000000`770a6400 : 00000000`001345d0 00000000`00000000 00000000`00000308 00000000`00000000 : user32!CallWindowProcAorW+0xdc
00000000`00134070 000007fe`fbcd61b9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : user32!CallWindowProcW+0x18
00000000`001340b0 000007fe`fbcd6944 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : comctl32!CallOriginalWndProc+0x1d
00000000`001340f0 000007fe`fbcd670c : 00000000`00000000 00000000`000100ec 00000000`00000000 00000000`00000000 : comctl32!CallNextSubclassProc+0x8c
00000000`00134170 000007fe`fdbd1012 : 00000000`00000000 00000000`000100ec 00000000`00000308 00000000`00000000 : comctl32!DefSubclassProc+0x7c
00000000`001341c0 000007fe`fdbd1433 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!DefSubclassProc+0x56
00000000`001341f0 000007fe`fdbd135f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!CListViewHost::_ViewSubclassWndProc+0x3e1
00000000`001344b0 000007fe`fbcd6944 : 00000000`001345d0 00000000`000100ec 00000000`00000308 00000000`00000000 : shell32!CListViewHost::s_ViewSubclassWndProc+0x4f
00000000`00134500 000007fe`fbcd681b : 00000000`00000000 00000000`000100ec 00000000`00000000 00000000`00000000 : comctl32!CallNextSubclassProc+0x8c
00000000`00134580 00000000`770ac3c1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : comctl32!MasterSubclassProc+0xe7
00000000`00134620 00000000`770aa6d8 : 00000000`007fe890 000007fe`fbcd6734 00000000`000000c8 00000000`00000000 : user32!UserCallWinProcCheckWow+0x1ad
00000000`001346e0 00000000`770aa85d : 00000000`000100ec 00000000`00000308 00000000`003409c4 00000000`00000000 : user32!SendMessageWorker+0x682
00000000`00134770 000007fe`fdcfcbe3 : 00000000`02b3f1c0 00000000`003409c4 00000000`00000000 00000000`00000000 : user32!SendMessageW+0x5c
00000000`001347c0 000007fe`fdbd11e3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!CDefView::WndProc+0xb88
00000000`00134990 00000000`770ac3c1 : 000007fe`fdbd1180 00000000`003409c4 00000000`00000001 00000000`00000001 : shell32!CDefView::s_WndProc+0x7c
00000000`001349d0 00000000`770a6484 : 00000000`000100ec 000007fe`fdbd1180 00000000`00000308 00000000`003409c4 : user32!UserCallWinProcCheckWow+0x1ad
00000000`00134a90 00000000`770a6400 : 00000000`00135040 00000000`00000000 00000000`00000308 00000000`00000000 : user32!CallWindowProcAorW+0xdc
00000000`00134ae0 000007fe`fbcd61b9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : user32!CallWindowProcW+0x18
00000000`00134b20 000007fe`fbcd6944 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : comctl32!CallOriginalWndProc+0x1d
00000000`00134b60 000007fe`fbcd670c : 00000000`00000000 00000000`000100ec 00000000`00000000 00000000`00000000 : comctl32!CallNextSubclassProc+0x8c
00000000`00134be0 000007fe`fdbd1012 : 00000000`00000000 00000000`000100ec 00000000`00000308 00000000`00000000 : comctl32!DefSubclassProc+0x7c
00000000`00134c30 000007fe`fdbd1433 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!DefSubclassProc+0x56
00000000`00134c60 000007fe`fdbd135f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!CListViewHost::_ViewSubclassWndProc+0x3e1
00000000`00134f20 000007fe`fbcd6944 : 00000000`00135040 00000000`000100ec 00000000`00000308 00000000`00000000 : shell32!CListViewHost::s_ViewSubclassWndProc+0x4f
00000000`00134f70 000007fe`fbcd681b : 00000000`00000000 00000000`000100ec 00000000`00000000 00000000`00000000 : comctl32!CallNextSubclassProc+0x8c
00000000`00134ff0 00000000`770ac3c1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : comctl32!MasterSubclassProc+0xe7
00000000`00135090 00000000`770aa6d8 : 00000000`007fe890 000007fe`fbcd6734 00000000`000000c8 00000000`00000000 : user32!UserCallWinProcCheckWow+0x1ad
00000000`00135150 00000000`770aa85d : 00000000`000100ec 00000000`00000308 00000000`003409c4 00000000`00000000 : user32!SendMessageWorker+0x682
00000000`001351e0 000007fe`fdcfcbe3 : 00000000`02b3f1c0 00000000`003409c4 00000000`00000000 00000000`00000000 : user32!SendMessageW+0x5c
00000000`00135230 000007fe`fdbd11e3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!CDefView::WndProc+0xb88
00000000`00135400 00000000`770ac3c1 : 000007fe`fdbd1180 00000000`003409c4 00000000`00000001 00000000`00000001 : shell32!CDefView::s_WndProc+0x7c
00000000`00135440 00000000`770a6484 : 00000000`000100ec 000007fe`fdbd1180 00000000`00000308 00000000`003409c4 : user32!UserCallWinProcCheckWow+0x1ad
00000000`00135500 00000000`770a6400 : 00000000`00135ab0 00000000`00000000 00000000`00000308 00000000`00000000 : user32!CallWindowProcAorW+0xdc
00000000`00135550 000007fe`fbcd61b9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : user32!CallWindowProcW+0x18
00000000`00135590 000007fe`fbcd6944 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : comctl32!CallOriginalWndProc+0x1d
00000000`001355d0 000007fe`fbcd670c : 00000000`00000000 00000000`000100ec 00000000`00000000 00000000`00000000 : comctl32!CallNextSubclassProc+0x8c
00000000`00135650 000007fe`fdbd1012 : 00000000`00000000 00000000`000100ec 00000000`00000308 00000000`00000000 : comctl32!DefSubclassProc+0x7c
00000000`001356a0 000007fe`fdbd1433 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!DefSubclassProc+0x56
00000000`001356d0 000007fe`fdbd135f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!CListViewHost::_ViewSubclassWndProc+0x3e1
00000000`00135990 000007fe`fbcd6944 : 00000000`00135ab0 00000000`000100ec 00000000`00000308 00000000`00000000 : shell32!CListViewHost::s_ViewSubclassWndProc+0x4f
00000000`001359e0 000007fe`fbcd681b : 00000000`00000000 00000000`000100ec 00000000`00000000 00000000`00000000 : comctl32!CallNextSubclassProc+0x8c
00000000`00135a60 00000000`770ac3c1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : comctl32!MasterSubclassProc+0xe7
00000000`00135b00 00000000`770aa6d8 : 00000000`007fe890 000007fe`fbcd6734 00000000`000000c8 00000000`00000000 : user32!UserCallWinProcCheckWow+0x1ad
00000000`00135bc0 00000000`770aa85d : 00000000`000100ec 00000000`00000308 00000000`003409c4 00000000`00000000 : user32!SendMessageWorker+0x682
00000000`00135c50 000007fe`fdcfcbe3 : 00000000`02b3f1c0 00000000`003409c4 00000000`00000000 00000000`00000000 : user32!SendMessageW+0x5c
00000000`00135ca0 000007fe`fdbd11e3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!CDefView::WndProc+0xb88
00000000`00135e70 00000000`770ac3c1 : 000007fe`fdbd1180 00000000`003409c4 00000000`00000001 00000000`00000001 : shell32!CDefView::s_WndProc+0x7c
00000000`00135eb0 00000000`770a6484 : 00000000`000100ec 000007fe`fdbd1180 00000000`00000308 00000000`003409c4 : user32!UserCallWinProcCheckWow+0x1ad
00000000`00135f70 00000000`770a6400 : 00000000`00136520 00000000`00000000 00000000`00000308 00000000`00000000 : user32!CallWindowProcAorW+0xdc
00000000`00135fc0 000007fe`fbcd61b9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : user32!CallWindowProcW+0x18
00000000`00136000 000007fe`fbcd6944 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : comctl32!CallOriginalWndProc+0x1d
00000000`00136040 000007fe`fbcd670c : 00000000`00000000 00000000`000100ec 00000000`00000000 00000000`00000000 : comctl32!CallNextSubclassProc+0x8c
00000000`001360c0 000007fe`fdbd1012 : 00000000`00000000 00000000`000100ec 00000000`00000308 00000000`00000000 : comctl32!DefSubclassProc+0x7c
00000000`00136110 000007fe`fdbd1433 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!DefSubclassProc+0x56
00000000`00136140 000007fe`fdbd135f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!CListViewHost::_ViewSubclassWndProc+0x3e1
00000000`00136400 000007fe`fbcd6944 : 00000000`00136520 00000000`000100ec 00000000`00000308 00000000`00000000 : shell32!CListViewHost::s_ViewSubclassWndProc+0x4f
00000000`00136450 000007fe`fbcd681b : 00000000`00000000 00000000`000100ec 00000000`00000000 00000000`00000000 : comctl32!CallNextSubclassProc+0x8c
00000000`001364d0 00000000`770ac3c1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : comctl32!MasterSubclassProc+0xe7
00000000`00136570 00000000`770aa6d8 : 00000000`007fe890 000007fe`fbcd6734 00000000`000000c8 00000000`00000000 : user32!UserCallWinProcCheckWow+0x1ad
00000000`00136630 00000000`770aa85d : 00000000`000100ec 00000000`00000308 00000000`003409c4 00000000`00000000 : user32!SendMessageWorker+0x682
00000000`001366c0 000007fe`fdcfcbe3 : 00000000`02b3f1c0 00000000`003409c4 00000000`00000000 00000000`00000000 : user32!SendMessageW+0x5c
00000000`00136710 000007fe`fdbd11e3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!CDefView::WndProc+0xb88
00000000`001368e0 00000000`770ac3c1 : 000007fe`fdbd1180 00000000`003409c4 00000000`00000001 00000000`00000001 : shell32!CDefView::s_WndProc+0x7c
00000000`00136920 00000000`770a6484 : 00000000`000100ec 000007fe`fdbd1180 00000000`00000308 00000000`003409c4 : user32!UserCallWinProcCheckWow+0x1ad
00000000`001369e0 00000000`770a6400 : 00000000`00136f90 00000000`00000000 00000000`00000308 00000000`00000000 : user32!CallWindowProcAorW+0xdc
00000000`00136a30 000007fe`fbcd61b9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : user32!CallWindowProcW+0x18
00000000`00136a70 000007fe`fbcd6944 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : comctl32!CallOriginalWndProc+0x1d
00000000`00136ab0 000007fe`fbcd670c : 00000000`00000000 00000000`000100ec 00000000`00000000 00000000`00000000 : comctl32!CallNextSubclassProc+0x8c
00000000`00136b30 000007fe`fdbd1012 : 00000000`00000000 00000000`000100ec 00000000`00000308 00000000`00000000 : comctl32!DefSubclassProc+0x7c
00000000`00136b80 000007fe`fdbd1433 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!DefSubclassProc+0x56
00000000`00136bb0 000007fe`fdbd135f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!CListViewHost::_ViewSubclassWndProc+0x3e1
00000000`00136e70 000007fe`fbcd6944 : 00000000`00136f90 00000000`000100ec 00000000`00000308 00000000`00000000 : shell32!CListViewHost::s_ViewSubclassWndProc+0x4f
00000000`00136ec0 000007fe`fbcd681b : 00000000`00000000 00000000`000100ec 00000000`00000000 00000000`00000000 : comctl32!CallNextSubclassProc+0x8c
00000000`00136f40 00000000`770ac3c1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : comctl32!MasterSubclassProc+0xe7
00000000`00136fe0 00000000`770aa6d8 : 00000000`007fe890 000007fe`fbcd6734 00000000`000000c8 00000000`00000000 : user32!UserCallWinProcCheckWow+0x1ad
00000000`001370a0 00000000`770aa85d : 00000000`000100ec 00000000`00000308 00000000`003409c4 00000000`00000000 : user32!SendMessageWorker+0x682
00000000`00137130 000007fe`fdcfcbe3 : 00000000`02b3f1c0 00000000`003409c4 00000000`00000000 00000000`00000000 : user32!SendMessageW+0x5c
00000000`00137180 000007fe`fdbd11e3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!CDefView::WndProc+0xb88
00000000`00137350 00000000`770ac3c1 : 000007fe`fdbd1180 00000000`003409c4 00000000`00000001 00000000`00000001 : shell32!CDefView::s_WndProc+0x7c
00000000`00137390 00000000`770a6484 : 00000000`000100ec 000007fe`fdbd1180 00000000`00000308 00000000`003409c4 : user32!UserCallWinProcCheckWow+0x1ad
00000000`00137450 00000000`770a6400 : 00000000`00137a00 00000000`00000000 00000000`00000308 00000000`00000000 : user32!CallWindowProcAorW+0xdc
00000000`001374a0 000007fe`fbcd61b9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : user32!CallWindowProcW+0x18
00000000`001374e0 000007fe`fbcd6944 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : comctl32!CallOriginalWndP

STACK_COMMAND:  ~0s; .ecxr ; kb

FOLLOWUP_IP:
shell32!DefSubclassProc+56
000007fe`fdbd1012 eb00            jmp     shell32!DefSubclassProc+0x5a (000007fe`fdbd1014)

SYMBOL_STACK_INDEX:  6

SYMBOL_NAME:  shell32!DefSubclassProc+56

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: shell32

IMAGE_NAME:  shell32.dll

DEBUG_FLR_IMAGE_TIMESTAMP:  4c4ef25d

FAILURE_BUCKET_ID:  APPLICATION_FAULT_c000041d_shell32.dll!DefSubclassProc

BUCKET_ID:  X64_APPLICATION_FAULT_APPLICATION_FAULT_shell32!DefSubclassProc+56

WATSON_STAGEONE_URL:  http://watson.microsoft.com/StageOne/explorer_exe/6_1_7600_16450/4aebab8d/user32_dll/6_1_7600_16385/4a5be088/c000041d/0001c2cd.htm?Retriage=1

Followup: MachineOwner
---------

Back to Top
concretenomad View Drop Down
Newbie
Newbie


Joined: 08 February 2008
Status: Offline
Points: 12
Post Options Post Options   Thanks (0) Thanks(0)   Quote concretenomad Quote  Post ReplyReply Direct Link To This Post Posted: 16 March 2011 at 6:43pm
Bump.  I just got a few more of these crashes.  Anyone else figure out what causes it?
Back to Top
concretenomad View Drop Down
Newbie
Newbie


Joined: 08 February 2008
Status: Offline
Points: 12
Post Options Post Options   Thanks (0) Thanks(0)   Quote concretenomad Quote  Post ReplyReply Direct Link To This Post Posted: 03 August 2011 at 8:00pm
Bump.  I just got another one of these.
 

Loading Dump File [C:\Users\andrewbuyuk\Desktop\Dumps\explorer.exe.3204.dmp]
User Mini Dump File: Only registers, stack and portions of memory are available
Symbol search path is: SRV*C:\Users\andrewbuyuk\Downloads\DebugSymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: SingleUserTS
Machine Name:
Debug session time: Wed Aug  3 14:57:53.000 2011 (UTC - 4:00)
System Uptime: not available
Process Uptime: 0 days 6:35:52.000
................................................................
................................................................
................................................................
..
Loading unloaded module list
................................................................
This dump file has an exception of interest stored in it.
The stored exception information can be accessed via .ecxr.
(c84.c88): Unknown exception - code c000041d (first/second chance not available)
shell32!CDefView::WndProc+0x3f:
000007fe`fd7a0cd7 48897c2440      mov     qword ptr [rsp+40h],rdi ss:00000000`001d3ed0=0000000000000000
0:000> !analyze -v
*******************************************************************************
*                                                                             *
*                        Exception Analysis                                   *
*                                                                             *
*******************************************************************************
FAULTING_IP:
shell32!CDefView::WndProc+3f
000007fe`fd7a0cd7 48897c2440      mov     qword ptr [rsp+40h],rdi
EXCEPTION_RECORD:  ffffffffffffffff -- (.exr 0xffffffffffffffff)
ExceptionAddress: 000007fefd7a0cd7 (shell32!CDefView::WndProc+0x000000000000003f)
   ExceptionCode: c000041d
  ExceptionFlags: 00000001
NumberParameters: 0
DEFAULT_BUCKET_ID:  APPLICATION_FAULT
PROCESS_NAME:  explorer.exe
ERROR_CODE: (NTSTATUS) 0xc000041d - An unhandled exception was encountered during a user callback.
EXCEPTION_CODE: (NTSTATUS) 0xc000041d - An unhandled exception was encountered during a user callback.
MOD_LIST: <ANALYSIS/>
NTGLOBALFLAG:  0
APPLICATION_VERIFIER_FLAGS:  0
FAULTING_THREAD:  0000000000000c88
PRIMARY_PROBLEM_CLASS:  APPLICATION_FAULT
BUGCHECK_STR:  APPLICATION_FAULT_APPLICATION_FAULT
LAST_CONTROL_TRANSFER:  from 000007fefd7a0c63 to 000007fefd7a0cd7
STACK_TEXT: 
00000000`001d3e90 000007fe`fd7a0c63 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!CDefView::WndProc+0x3f
00000000`001d4060 00000000`768e9bd1 : 000007fe`fd7a0c00 00000000`005105de 00000000`00000001 00000000`00000001 : shell32!CDefView::s_WndProc+0x7c
00000000`001d40a0 00000000`768e3bfc : 00000000`0001012c 000007fe`fd7a0c00 00000000`00000308 00000000`005105de : user32!UserCallWinProcCheckWow+0x1ad
00000000`001d4160 00000000`768e3b78 : 00000000`001d4710 00000000`00000000 00000000`00000308 00000000`00000000 : user32!CallWindowProcAorW+0xdc
00000000`001d41b0 000007fe`fb556215 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : user32!CallWindowProcW+0x18
00000000`001d41f0 000007fe`fb5569a0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : comctl32!CallOriginalWndProc+0x1d
00000000`001d4230 000007fe`fb556768 : 00000000`00000000 00000000`0001012c 00000000`00000000 00000000`00000000 : comctl32!CallNextSubclassProc+0x8c
00000000`001d42b0 000007fe`fd7a0a9e : 00000000`00000000 00000000`0001012c 00000000`00000308 00000000`00000000 : comctl32!DefSubclassProc+0x7c
00000000`001d4300 000007fe`fd7a0eb3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!DefSubclassProc+0x56
00000000`001d4330 000007fe`fd7a0ddf : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!CListViewHost::_ViewSubclassWndProc+0x3e1
00000000`001d45f0 000007fe`fb5569a0 : 00000000`001d4710 00000000`0001012c 00000000`00000308 00000000`00000000 : shell32!CListViewHost::s_ViewSubclassWndProc+0x4f
00000000`001d4640 000007fe`fb556877 : 00000000`00000000 00000000`0001012c 00000000`00000000 00000000`00000000 : comctl32!CallNextSubclassProc+0x8c
00000000`001d46c0 00000000`768e9bd1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : comctl32!MasterSubclassProc+0xe7
00000000`001d4760 00000000`768e6aa8 : 00000000`00865090 000007fe`fb556790 00000000`000000c8 00000000`00000000 : user32!UserCallWinProcCheckWow+0x1ad
00000000`001d4820 00000000`768e6bad : 00000000`0001012c 00000000`00000308 00000000`005105de 00000000`00000000 : user32!SendMessageWorker+0x682
00000000`001d48b0 000007fe`fd8bed93 : 00000000`003d8c10 00000000`005105de 00000000`00000000 00000000`00000000 : user32!SendMessageW+0x5c
00000000`001d4900 000007fe`fd7a0c63 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!CDefView::WndProc+0xb88
00000000`001d4ad0 00000000`768e9bd1 : 000007fe`fd7a0c00 00000000`005105de 00000000`00000001 00000000`00000001 : shell32!CDefView::s_WndProc+0x7c
00000000`001d4b10 00000000`768e3bfc : 00000000`0001012c 000007fe`fd7a0c00 00000000`00000308 00000000`005105de : user32!UserCallWinProcCheckWow+0x1ad
00000000`001d4bd0 00000000`768e3b78 : 00000000`001d5180 00000000`00000000 00000000`00000308 00000000`00000000 : user32!CallWindowProcAorW+0xdc
00000000`001d4c20 000007fe`fb556215 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : user32!CallWindowProcW+0x18
00000000`001d4c60 000007fe`fb5569a0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : comctl32!CallOriginalWndProc+0x1d
00000000`001d4ca0 000007fe`fb556768 : 00000000`00000000 00000000`0001012c 00000000`00000000 00000000`00000000 : comctl32!CallNextSubclassProc+0x8c
00000000`001d4d20 000007fe`fd7a0a9e : 00000000`00000000 00000000`0001012c 00000000`00000308 00000000`00000000 : comctl32!DefSubclassProc+0x7c
00000000`001d4d70 000007fe`fd7a0eb3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!DefSubclassProc+0x56
00000000`001d4da0 000007fe`fd7a0ddf : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!CListViewHost::_ViewSubclassWndProc+0x3e1
00000000`001d5060 000007fe`fb5569a0 : 00000000`001d5180 00000000`0001012c 00000000`00000308 00000000`00000000 : shell32!CListViewHost::s_ViewSubclassWndProc+0x4f
00000000`001d50b0 000007fe`fb556877 : 00000000`00000000 00000000`0001012c 00000000`00000000 00000000`00000000 : comctl32!CallNextSubclassProc+0x8c
00000000`001d5130 00000000`768e9bd1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : comctl32!MasterSubclassProc+0xe7
00000000`001d51d0 00000000`768e6aa8 : 00000000`00865090 000007fe`fb556790 00000000`000000c8 00000000`00000000 : user32!UserCallWinProcCheckWow+0x1ad
00000000`001d5290 00000000`768e6bad : 00000000`0001012c 00000000`00000308 00000000`005105de 00000000`00000000 : user32!SendMessageWorker+0x682
00000000`001d5320 000007fe`fd8bed93 : 00000000`003d8c10 00000000`005105de 00000000`00000000 00000000`00000000 : user32!SendMessageW+0x5c
00000000`001d5370 000007fe`fd7a0c63 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!CDefView::WndProc+0xb88
00000000`001d5540 00000000`768e9bd1 : 000007fe`fd7a0c00 00000000`005105de 00000000`00000001 00000000`00000001 : shell32!CDefView::s_WndProc+0x7c
00000000`001d5580 00000000`768e3bfc : 00000000`0001012c 000007fe`fd7a0c00 00000000`00000308 00000000`005105de : user32!UserCallWinProcCheckWow+0x1ad
00000000`001d5640 00000000`768e3b78 : 00000000`001d5bf0 00000000`00000000 00000000`00000308 00000000`00000000 : user32!CallWindowProcAorW+0xdc
00000000`001d5690 000007fe`fb556215 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : user32!CallWindowProcW+0x18
00000000`001d56d0 000007fe`fb5569a0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : comctl32!CallOriginalWndProc+0x1d
00000000`001d5710 000007fe`fb556768 : 00000000`00000000 00000000`0001012c 00000000`00000000 00000000`00000000 : comctl32!CallNextSubclassProc+0x8c
00000000`001d5790 000007fe`fd7a0a9e : 00000000`00000000 00000000`0001012c 00000000`00000308 00000000`00000000 : comctl32!DefSubclassProc+0x7c
00000000`001d57e0 000007fe`fd7a0eb3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!DefSubclassProc+0x56
00000000`001d5810 000007fe`fd7a0ddf : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!CListViewHost::_ViewSubclassWndProc+0x3e1
00000000`001d5ad0 000007fe`fb5569a0 : 00000000`001d5bf0 00000000`0001012c 00000000`00000308 00000000`00000000 : shell32!CListViewHost::s_ViewSubclassWndProc+0x4f
00000000`001d5b20 000007fe`fb556877 : 00000000`00000000 00000000`0001012c 00000000`00000000 00000000`00000000 : comctl32!CallNextSubclassProc+0x8c
00000000`001d5ba0 00000000`768e9bd1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : comctl32!MasterSubclassProc+0xe7
00000000`001d5c40 00000000`768e6aa8 : 00000000`00865090 000007fe`fb556790 00000000`000000c8 00000000`00000000 : user32!UserCallWinProcCheckWow+0x1ad
00000000`001d5d00 00000000`768e6bad : 00000000`0001012c 00000000`00000308 00000000`005105de 00000000`00000000 : user32!SendMessageWorker+0x682
00000000`001d5d90 000007fe`fd8bed93 : 00000000`003d8c10 00000000`005105de 00000000`00000000 00000000`00000000 : user32!SendMessageW+0x5c
00000000`001d5de0 000007fe`fd7a0c63 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!CDefView::WndProc+0xb88
00000000`001d5fb0 00000000`768e9bd1 : 000007fe`fd7a0c00 00000000`005105de 00000000`00000001 00000000`00000001 : shell32!CDefView::s_WndProc+0x7c
00000000`001d5ff0 00000000`768e3bfc : 00000000`0001012c 000007fe`fd7a0c00 00000000`00000308 00000000`005105de : user32!UserCallWinProcCheckWow+0x1ad
00000000`001d60b0 00000000`768e3b78 : 00000000`001d6660 00000000`00000000 00000000`00000308 00000000`00000000 : user32!CallWindowProcAorW+0xdc
00000000`001d6100 000007fe`fb556215 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : user32!CallWindowProcW+0x18
00000000`001d6140 000007fe`fb5569a0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : comctl32!CallOriginalWndProc+0x1d
00000000`001d6180 000007fe`fb556768 : 00000000`00000000 00000000`0001012c 00000000`00000000 00000000`00000000 : comctl32!CallNextSubclassProc+0x8c
00000000`001d6200 000007fe`fd7a0a9e : 00000000`00000000 00000000`0001012c 00000000`00000308 00000000`00000000 : comctl32!DefSubclassProc+0x7c
00000000`001d6250 000007fe`fd7a0eb3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!DefSubclassProc+0x56
00000000`001d6280 000007fe`fd7a0ddf : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!CListViewHost::_ViewSubclassWndProc+0x3e1
00000000`001d6540 000007fe`fb5569a0 : 00000000`001d6660 00000000`0001012c 00000000`00000308 00000000`00000000 : shell32!CListViewHost::s_ViewSubclassWndProc+0x4f
00000000`001d6590 000007fe`fb556877 : 00000000`00000000 00000000`0001012c 00000000`00000000 00000000`00000000 : comctl32!CallNextSubclassProc+0x8c
00000000`001d6610 00000000`768e9bd1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : comctl32!MasterSubclassProc+0xe7
00000000`001d66b0 00000000`768e6aa8 : 00000000`00865090 000007fe`fb556790 00000000`000000c8 00000000`00000000 : user32!UserCallWinProcCheckWow+0x1ad
00000000`001d6770 00000000`768e6bad : 00000000`0001012c 00000000`00000308 00000000`005105de 00000000`00000000 : user32!SendMessageWorker+0x682
00000000`001d6800 000007fe`fd8bed93 : 00000000`003d8c10 00000000`005105de 00000000`00000000 00000000`00000000 : user32!SendMessageW+0x5c
00000000`001d6850 000007fe`fd7a0c63 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!CDefView::WndProc+0xb88
00000000`001d6a20 00000000`768e9bd1 : 000007fe`fd7a0c00 00000000`005105de 00000000`00000001 00000000`00000001 : shell32!CDefView::s_WndProc+0x7c
00000000`001d6a60 00000000`768e3bfc : 00000000`0001012c 000007fe`fd7a0c00 00000000`00000308 00000000`005105de : user32!UserCallWinProcCheckWow+0x1ad
00000000`001d6b20 00000000`768e3b78 : 00000000`001d70d0 00000000`00000000 00000000`00000308 00000000`00000000 : user32!CallWindowProcAorW+0xdc
00000000`001d6b70 000007fe`fb556215 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : user32!CallWindowProcW+0x18
00000000`001d6bb0 000007fe`fb5569a0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : comctl32!CallOriginalWndProc+0x1d
00000000`001d6bf0 000007fe`fb556768 : 00000000`00000000 00000000`0001012c 00000000`00000000 00000000`00000000 : comctl32!CallNextSubclassProc+0x8c
00000000`001d6c70 000007fe`fd7a0a9e : 00000000`00000000 00000000`0001012c 00000000`00000308 00000000`00000000 : comctl32!DefSubclassProc+0x7c
00000000`001d6cc0 000007fe`fd7a0eb3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!DefSubclassProc+0x56
00000000`001d6cf0 000007fe`fd7a0ddf : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!CListViewHost::_ViewSubclassWndProc+0x3e1
00000000`001d6fb0 000007fe`fb5569a0 : 00000000`001d70d0 00000000`0001012c 00000000`00000308 00000000`00000000 : shell32!CListViewHost::s_ViewSubclassWndProc+0x4f
00000000`001d7000 000007fe`fb556877 : 00000000`00000000 00000000`0001012c 00000000`00000000 00000000`00000000 : comctl32!CallNextSubclassProc+0x8c
00000000`001d7080 00000000`768e9bd1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : comctl32!MasterSubclassProc+0xe7
00000000`001d7120 00000000`768e6aa8 : 00000000`00865090 000007fe`fb556790 00000000`000000c8 00000000`00000000 : user32!UserCallWinProcCheckWow+0x1ad
00000000`001d71e0 00000000`768e6bad : 00000000`0001012c 00000000`00000308 00000000`005105de 00000000`00000000 : user32!SendMessageWorker+0x682
00000000`001d7270 000007fe`fd8bed93 : 00000000`003d8c10 00000000`005105de 00000000`00000000 00000000`00000000 : user32!SendMessageW+0x5c
00000000`001d72c0 000007fe`fd7a0c63 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!CDefView::WndProc+0xb88
00000000`001d7490 00000000`768e9bd1 : 000007fe`fd7a0c00 00000000`005105de 00000000`00000001 00000000`00000001 : shell32!CDefView::s_WndProc+0x7c
00000000`001d74d0 00000000`768e3bfc : 00000000`0001012c 000007fe`fd7a0c00 00000000`00000308 00000000`005105de : user32!UserCallWinProcCheckWow+0x1ad
00000000`001d7590 00000000`768e3b78 : 00000000`001d7b40 00000000`00000000 00000000`00000308 00000000`00000000 : user32!CallWindowPr
STACK_COMMAND:  ~0s; .ecxr ; kb
FOLLOWUP_IP:
shell32!CDefView::WndProc+3f
000007fe`fd7a0cd7 48897c2440      mov     qword ptr [rsp+40h],rdi
SYMBOL_STACK_INDEX:  0
SYMBOL_NAME:  shell32!CDefView::WndProc+3f
FOLLOWUP_NAME:  MachineOwner
MODULE_NAME: shell32
IMAGE_NAME:  shell32.dll
DEBUG_FLR_IMAGE_TIMESTAMP:  4ce7c9a6
FAILURE_BUCKET_ID:  APPLICATION_FAULT_c000041d_shell32.dll!CDefView::WndProc
BUCKET_ID:  X64_APPLICATION_FAULT_APPLICATION_FAULT_shell32!CDefView::WndProc+3f
Followup: MachineOwner
---------
 
Back to Top
concretenomad View Drop Down
Newbie
Newbie


Joined: 08 February 2008
Status: Offline
Points: 12
Post Options Post Options   Thanks (0) Thanks(0)   Quote concretenomad Quote  Post ReplyReply Direct Link To This Post Posted: 09 October 2012 at 3:23pm
I am still getting these crashes.  It happens every time I copy a file over the network.  Since my last posting a new version of my AV client has been released and installed, but the issue persists.  Any ideas why?
 
FAULTING_IP:
shell32!CDefView::WndProc+3f
000007fe`fe890ca3 48897c2440      mov     qword ptr [rsp+40h],rdi
EXCEPTION_RECORD:  ffffffffffffffff -- (.exr 0xffffffffffffffff)
ExceptionAddress: 000007fefe890ca3 (shell32!CDefView::WndProc+0x000000000000003f)
   ExceptionCode: c000041d
  ExceptionFlags: 00000001
NumberParameters: 0
DEFAULT_BUCKET_ID:  APPLICATION_FAULT
PROCESS_NAME:  explorer.exe
ERROR_CODE: (NTSTATUS) 0xc000041d - An unhandled exception was encountered during a user callback.
EXCEPTION_CODE: (NTSTATUS) 0xc000041d - An unhandled exception was encountered during a user callback.
MOD_LIST: <ANALYSIS/>
NTGLOBALFLAG:  0
APPLICATION_VERIFIER_FLAGS:  0
FAULTING_THREAD:  000000000000271c
PRIMARY_PROBLEM_CLASS:  APPLICATION_FAULT
BUGCHECK_STR:  APPLICATION_FAULT_APPLICATION_FAULT
LAST_CONTROL_TRANSFER:  from 000007fefe890c2f to 000007fefe890ca3
STACK_TEXT: 
00000000`00043ee0 000007fe`fe890c2f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!CDefView::WndProc+0x3f
00000000`000440b0 00000000`778b9bd1 : 000007fe`fe890bcc 00000000`01130430 00000000`00000001 00000000`00000001 : shell32!CDefView::s_WndProc+0x7c
00000000`000440f0 00000000`778b3bfc : 00000000`0003038c 000007fe`fe890bcc 00000000`00000308 00000000`01130430 : user32!UserCallWinProcCheckWow+0x1ad
00000000`000441b0 00000000`778b3b78 : 00000000`00044760 00000000`00000000 00000000`00000308 00000000`00000000 : user32!CallWindowProcAorW+0xdc
00000000`00044200 000007fe`fc426215 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : user32!CallWindowProcW+0x18
00000000`00044240 000007fe`fc4269a0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : comctl32!CallOriginalWndProc+0x1d
00000000`00044280 000007fe`fc426768 : 00000000`00000000 00000000`0003038c 00000000`00000000 00000000`00000000 : comctl32!CallNextSubclassProc+0x8c
00000000`00044300 000007fe`fe890a6a : 00000000`00000000 00000000`0003038c 00000000`00000308 00000000`00000000 : comctl32!DefSubclassProc+0x7c
00000000`00044350 000007fe`fe890e73 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!DefSubclassProc+0x56
00000000`00044380 000007fe`fe890d9f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!CListViewHost::_ViewSubclassWndProc+0x3e1
00000000`00044640 000007fe`fc4269a0 : 00000000`00044760 00000000`0003038c 00000000`00000308 00000000`00000000 : shell32!CListViewHost::s_ViewSubclassWndProc+0x4f
00000000`00044690 000007fe`fc426877 : 00000000`00000000 00000000`0003038c 00000000`00000000 00000000`00000000 : comctl32!CallNextSubclassProc+0x8c
00000000`00044710 00000000`778b9bd1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : comctl32!MasterSubclassProc+0xe7
00000000`000447b0 00000000`778b6aa8 : 00000000`007699e0 000007fe`fc426790 00000000`000000c8 00000000`00000000 : user32!UserCallWinProcCheckWow+0x1ad
00000000`00044870 00000000`778b6bad : 00000000`0003038c 00000000`00000308 00000000`01130430 00000000`00000000 : user32!SendMessageWorker+0x682
00000000`00044900 000007fe`fe9aedf1 : 00000000`04e71770 00000000`01130430 00000000`00000000 00000000`00000000 : user32!SendMessageW+0x5c
00000000`00044950 000007fe`fe890c2f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!CDefView::WndProc+0xb88
00000000`00044b20 00000000`778b9bd1 : 000007fe`fe890bcc 00000000`01130430 00000000`00000001 00000000`00000001 : shell32!CDefView::s_WndProc+0x7c
00000000`00044b60 00000000`778b3bfc : 00000000`0003038c 000007fe`fe890bcc 00000000`00000308 00000000`01130430 : user32!UserCallWinProcCheckWow+0x1ad
00000000`00044c20 00000000`778b3b78 : 00000000`000451d0 00000000`00000000 00000000`00000308 00000000`00000000 : user32!CallWindowProcAorW+0xdc
00000000`00044c70 000007fe`fc426215 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : user32!CallWindowProcW+0x18
00000000`00044cb0 000007fe`fc4269a0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : comctl32!CallOriginalWndProc+0x1d
00000000`00044cf0 000007fe`fc426768 : 00000000`00000000 00000000`0003038c 00000000`00000000 00000000`00000000 : comctl32!CallNextSubclassProc+0x8c
00000000`00044d70 000007fe`fe890a6a : 00000000`00000000 00000000`0003038c 00000000`00000308 00000000`00000000 : comctl32!DefSubclassProc+0x7c
00000000`00044dc0 000007fe`fe890e73 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!DefSubclassProc+0x56
00000000`00044df0 000007fe`fe890d9f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!CListViewHost::_ViewSubclassWndProc+0x3e1
00000000`000450b0 000007fe`fc4269a0 : 00000000`000451d0 00000000`0003038c 00000000`00000308 00000000`00000000 : shell32!CListViewHost::s_ViewSubclassWndProc+0x4f
00000000`00045100 000007fe`fc426877 : 00000000`00000000 00000000`0003038c 00000000`00000000 00000000`00000000 : comctl32!CallNextSubclassProc+0x8c
00000000`00045180 00000000`778b9bd1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : comctl32!MasterSubclassProc+0xe7
00000000`00045220 00000000`778b6aa8 : 00000000`007699e0 000007fe`fc426790 00000000`000000c8 00000000`00000000 : user32!UserCallWinProcCheckWow+0x1ad
00000000`000452e0 00000000`778b6bad : 00000000`0003038c 00000000`00000308 00000000`01130430 00000000`00000000 : user32!SendMessageWorker+0x682
00000000`00045370 000007fe`fe9aedf1 : 00000000`04e71770 00000000`01130430 00000000`00000000 00000000`00000000 : user32!SendMessageW+0x5c
00000000`000453c0 000007fe`fe890c2f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!CDefView::WndProc+0xb88
00000000`00045590 00000000`778b9bd1 : 000007fe`fe890bcc 00000000`01130430 00000000`00000001 00000000`00000001 : shell32!CDefView::s_WndProc+0x7c
00000000`000455d0 00000000`778b3bfc : 00000000`0003038c 000007fe`fe890bcc 00000000`00000308 00000000`01130430 : user32!UserCallWinProcCheckWow+0x1ad
00000000`00045690 00000000`778b3b78 : 00000000`00045c40 00000000`00000000 00000000`00000308 00000000`00000000 : user32!CallWindowProcAorW+0xdc
00000000`000456e0 000007fe`fc426215 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : user32!CallWindowProcW+0x18
00000000`00045720 000007fe`fc4269a0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : comctl32!CallOriginalWndProc+0x1d
00000000`00045760 000007fe`fc426768 : 00000000`00000000 00000000`0003038c 00000000`00000000 00000000`00000000 : comctl32!CallNextSubclassProc+0x8c
00000000`000457e0 000007fe`fe890a6a : 00000000`00000000 00000000`0003038c 00000000`00000308 00000000`00000000 : comctl32!DefSubclassProc+0x7c
00000000`00045830 000007fe`fe890e73 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!DefSubclassProc+0x56
00000000`00045860 000007fe`fe890d9f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!CListViewHost::_ViewSubclassWndProc+0x3e1
00000000`00045b20 000007fe`fc4269a0 : 00000000`00045c40 00000000`0003038c 00000000`00000308 00000000`00000000 : shell32!CListViewHost::s_ViewSubclassWndProc+0x4f
00000000`00045b70 000007fe`fc426877 : 00000000`00000000 00000000`0003038c 00000000`00000000 00000000`00000000 : comctl32!CallNextSubclassProc+0x8c
00000000`00045bf0 00000000`778b9bd1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : comctl32!MasterSubclassProc+0xe7
00000000`00045c90 00000000`778b6aa8 : 00000000`007699e0 000007fe`fc426790 00000000`000000c8 00000000`00000000 : user32!UserCallWinProcCheckWow+0x1ad
00000000`00045d50 00000000`778b6bad : 00000000`0003038c 00000000`00000308 00000000`01130430 00000000`00000000 : user32!SendMessageWorker+0x682
00000000`00045de0 000007fe`fe9aedf1 : 00000000`04e71770 00000000`01130430 00000000`00000000 00000000`00000000 : user32!SendMessageW+0x5c
00000000`00045e30 000007fe`fe890c2f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!CDefView::WndProc+0xb88
00000000`00046000 00000000`778b9bd1 : 000007fe`fe890bcc 00000000`01130430 00000000`00000001 00000000`00000001 : shell32!CDefView::s_WndProc+0x7c
00000000`00046040 00000000`778b3bfc : 00000000`0003038c 000007fe`fe890bcc 00000000`00000308 00000000`01130430 : user32!UserCallWinProcCheckWow+0x1ad
00000000`00046100 00000000`778b3b78 : 00000000`000466b0 00000000`00000000 00000000`00000308 00000000`00000000 : user32!CallWindowProcAorW+0xdc
00000000`00046150 000007fe`fc426215 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : user32!CallWindowProcW+0x18
00000000`00046190 000007fe`fc4269a0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : comctl32!CallOriginalWndProc+0x1d
00000000`000461d0 000007fe`fc426768 : 00000000`00000000 00000000`0003038c 00000000`00000000 00000000`00000000 : comctl32!CallNextSubclassProc+0x8c
00000000`00046250 000007fe`fe890a6a : 00000000`00000000 00000000`0003038c 00000000`00000308 00000000`00000000 : comctl32!DefSubclassProc+0x7c
00000000`000462a0 000007fe`fe890e73 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!DefSubclassProc+0x56
00000000`000462d0 000007fe`fe890d9f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!CListViewHost::_ViewSubclassWndProc+0x3e1
00000000`00046590 000007fe`fc4269a0 : 00000000`000466b0 00000000`0003038c 00000000`00000308 00000000`00000000 : shell32!CListViewHost::s_ViewSubclassWndProc+0x4f
00000000`000465e0 000007fe`fc426877 : 00000000`00000000 00000000`0003038c 00000000`00000000 00000000`00000000 : comctl32!CallNextSubclassProc+0x8c
00000000`00046660 00000000`778b9bd1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : comctl32!MasterSubclassProc+0xe7
00000000`00046700 00000000`778b6aa8 : 00000000`007699e0 000007fe`fc426790 00000000`000000c8 00000000`00000000 : user32!UserCallWinProcCheckWow+0x1ad
00000000`000467c0 00000000`778b6bad : 00000000`0003038c 00000000`00000308 00000000`01130430 00000000`00000000 : user32!SendMessageWorker+0x682
00000000`00046850 000007fe`fe9aedf1 : 00000000`04e71770 00000000`01130430 00000000`00000000 00000000`00000000 : user32!SendMessageW+0x5c
00000000`000468a0 000007fe`fe890c2f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!CDefView::WndProc+0xb88
00000000`00046a70 00000000`778b9bd1 : 000007fe`fe890bcc 00000000`01130430 00000000`00000001 00000000`00000001 : shell32!CDefView::s_WndProc+0x7c
00000000`00046ab0 00000000`778b3bfc : 00000000`0003038c 000007fe`fe890bcc 00000000`00000308 00000000`01130430 : user32!UserCallWinProcCheckWow+0x1ad
00000000`00046b70 00000000`778b3b78 : 00000000`00047120 00000000`00000000 00000000`00000308 00000000`00000000 : user32!CallWindowProcAorW+0xdc
00000000`00046bc0 000007fe`fc426215 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : user32!CallWindowProcW+0x18
00000000`00046c00 000007fe`fc4269a0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : comctl32!CallOriginalWndProc+0x1d
00000000`00046c40 000007fe`fc426768 : 00000000`00000000 00000000`0003038c 00000000`00000000 00000000`00000000 : comctl32!CallNextSubclassProc+0x8c
00000000`00046cc0 000007fe`fe890a6a : 00000000`00000000 00000000`0003038c 00000000`00000308 00000000`00000000 : comctl32!DefSubclassProc+0x7c
00000000`00046d10 000007fe`fe890e73 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!DefSubclassProc+0x56
00000000`00046d40 000007fe`fe890d9f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!CListViewHost::_ViewSubclassWndProc+0x3e1
00000000`00047000 000007fe`fc4269a0 : 00000000`00047120 00000000`0003038c 00000000`00000308 00000000`00000000 : shell32!CListViewHost::s_ViewSubclassWndProc+0x4f
00000000`00047050 000007fe`fc426877 : 00000000`00000000 00000000`0003038c 00000000`00000000 00000000`00000000 : comctl32!CallNextSubclassProc+0x8c
00000000`000470d0 00000000`778b9bd1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : comctl32!MasterSubclassProc+0xe7
00000000`00047170 00000000`778b6aa8 : 00000000`007699e0 000007fe`fc426790 00000000`000000c8 00000000`00000000 : user32!UserCallWinProcCheckWow+0x1ad
00000000`00047230 00000000`778b6bad : 00000000`0003038c 00000000`00000308 00000000`01130430 00000000`00000000 : user32!SendMessageWorker+0x682
00000000`000472c0 000007fe`fe9aedf1 : 00000000`04e71770 00000000`01130430 00000000`00000000 00000000`00000000 : user32!SendMessageW+0x5c
00000000`00047310 000007fe`fe890c2f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!CDefView::WndProc+0xb88
00000000`000474e0 00000000`778b9bd1 : 000007fe`fe890bcc 00000000`01130430 00000000`00000001 00000000`00000001 : shell32!CDefView::s_WndProc+0x7c
00000000`00047520 00000000`778b3bfc : 00000000`0003038c 000007fe`fe890bcc 00000000`00000308 00000000`01130430 : user32!UserCallWinProcCheckWow+0x1ad
00000000`000475e0 00000000`778b3b78 : 00000000`00047b90 00000000`00000000 00000000`00000308 00000000`00000000 : user32!CallWindowPr
STACK_COMMAND:  ~0s; .ecxr ; kb
FOLLOWUP_IP:
shell32!CDefView::WndProc+3f
000007fe`fe890ca3 48897c2440      mov     qword ptr [rsp+40h],rdi
SYMBOL_STACK_INDEX:  0
SYMBOL_NAME:  shell32!CDefView::WndProc+3f
FOLLOWUP_NAME:  MachineOwner
MODULE_NAME: shell32
IMAGE_NAME:  shell32.dll
DEBUG_FLR_IMAGE_TIMESTAMP:  4fd2dfec
FAILURE_BUCKET_ID:  APPLICATION_FAULT_c000041d_shell32.dll!CDefView::WndProc
BUCKET_ID:  X64_APPLICATION_FAULT_APPLICATION_FAULT_shell32!CDefView::WndProc+3f
Followup: MachineOwner
---------
Back to Top
MagicAndre1981 View Drop Down
Moderator Group
Moderator Group
Avatar

Joined: 08 January 2007
Location: Germany
Status: Offline
Points: 1894
Post Options Post Options   Thanks (0) Thanks(0)   Quote MagicAndre1981 Quote  Post ReplyReply Direct Link To This Post Posted: 09 October 2012 at 8:37pm
Run sfc /scannow to detect and fix broken files. I've seen several Explroer crahes with 0xc000041d exception code when files are damaged.
Back to Top
concretenomad View Drop Down
Newbie
Newbie


Joined: 08 February 2008
Status: Offline
Points: 12
Post Options Post Options   Thanks (0) Thanks(0)   Quote concretenomad Quote  Post ReplyReply Direct Link To This Post Posted: 11 July 2013 at 9:05pm
I have not checked this post in a while, but I just got a few random crashes the other week.  SFC has been run.  File integrity is fine.  All windows logs are clean.  The next time it happens I will be sure to upload the dump file for people to examine.
Back to Top
 Post Reply Post Reply
  Share Topic   

Forum Jump Forum Permissions View Drop Down