Why WinDbg doesn't show the actual file causing the problem with random crash explorer after eg opening any folder root drive. I know once a man gave a better command that ALWAYS showed the real file causing the problem. SFC indicates System is 100% integral CHKDSK /V (VERBOSE) /F /R also shows disks are ALWAYS OK (HDD / SSD)
This file is verified to be 100% good by SFC and other tools!
EXPLORERFRAME.dll
This is not a real problem file because even Windows shows "unknown" (module) in the log
Microsoft (R) Windows Debugger Version 10.0.19041.685 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\LocalDumps\explorer.exe.1248.dmp]
User Mini Dump File with Full Memory: Only application data is available
Symbol search path is: srv*
Executable search path is:
Windows 7 Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: SingleUserTS
Machine Name:
Debug session time: Tue Aug 31 04:35:23.000 2021 (UTC + 2:00)
System Uptime: 0 days 21:21:00.546
Process Uptime: 0 days 20:58:02.000
................................................................
................................................................
..
Loading unloaded module list
................................................................
This dump file has an exception of interest stored in it.
The stored exception information can be accessed via .ecxr.
(4e0.2adc): Access violation - code c0000005 (first/second chance not available)
For analysis of this file, run !analyze -v
ntdll!ZwWaitForMultipleObjects+0xa:
00000000`77bd9d5a c3 ret
0:007> !analyze -v
*******************************************************************************
* *
* Exception Analysis *
* *
*******************************************************************************
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Execute
Key : Analysis.CPU.Sec
Value: 1
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on MAKI
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 1
Key : Analysis.Memory.CommitPeak.Mb
Value: 143
Key : Analysis.System
Value: CreateObject
Key : Timeline.OS.Boot.DeltaSec
Value: 76860
Key : Timeline.Process.Start.DeltaSec
Value: 75482
NTGLOBALFLAG: 2000000
APPLICATION_VERIFIER_FLAGS: 0
APPLICATION_VERIFIER_LOADED: 1
CONTEXT: (.ecxr)
rax=000000000801f720 rbx=0000000000000000 rcx=0000000000020d92
rdx=000000000000c348 rsi=0000000000000001 rdi=0000000000000000
rip=00000000120c0fd8 rsp=000000000801f6b8 rbp=000000001853de70
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=000000000000c348
r14=0000000001b52df8 r15=0000000000020d92
iopl=0 nv up ei pl zr na po nc
cs=0033 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010246
00000000`120c0fd8 ?? ???
Resetting default scope
EXCEPTION_RECORD: (.exr -1)
ExceptionAddress: 00000000120c0fd8
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000008
Parameter[1]: 00000000120c0fd8
Attempt to execute non-executable address 00000000120c0fd8
PROCESS_NAME: explorer.exe
EXECUTE_ADDRESS: 120c0fd8
FAILED_INSTRUCTION_ADDRESS:
+0
00000000`120c0fd8 ?? ???
ERROR_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod 0x
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000008
EXCEPTION_PARAMETER2: 00000000120c0fd8
IP_ON_HEAP: 00000000120c0fd8
IP_IN_FREE_BLOCK: 120c0fd8
STACK_TEXT:
00000000`0801f6b8 00000000`77a89861 : 00000000`00000001 00000000`00000000 00000000`00000001 00000000`00000030 : 0x120c0fd8
00000000`0801f6c0 00000000`77a89572 : 00000000`0801f830 00000000`120c0fd8 000007fe`dc00c550 00000000`051a27a0 : user32!UserCallWinProcCheckWow+0x1ad
00000000`0801f780 000007fe`dbed0914 : 00000000`1853de04 00000000`1853de04 00000000`120c0fd8 00000000`00000000 : user32!DispatchMessageWorker+0x3b5
00000000`0801f800 000007fe`dbed4d89 : 00000000`1853de70 00000000`00000006 00000000`00000000 00000000`00000000 : EXPLORERFRAME!CExplorerFrame::FrameMessagePump+0x436
00000000`0801f880 000007fe`dbed54fb : 00000000`1853de70 00000000`24d13ea0 00000000`00000000 00000000`00000000 : EXPLORERFRAME!BrowserThreadProc+0x180
00000000`0801f900 000007fe`dbed5492 : 115008ec`00000001 00000000`0d1cefb0 00000000`0801f9f8 000007fe`fd783f40 : EXPLORERFRAME!BrowserNewThreadProc+0x53
00000000`0801f930 000007fe`dbecbe90 : 00000000`13614f00 00000000`02438f60 00000000`00000000 00000000`000001c8 : EXPLORERFRAME!CExplorerTask::InternalResumeRT+0x12
00000000`0801f960 000007fe`ff12f0b7 : 80000000`01000000 00000000`0801f9f0 ffffffff`fffffffe 00000000`00000009 : EXPLORERFRAME!CRunnableTask::Run+0xda
00000000`0801f990 000007fe`ff12eff7 : 00000000`13614ff0 00000000`136ddf90 ffffffff`fffffffe 000007fe`fe0ae734 : shell32!CShellTask::TT_Run+0x124
00000000`0801f9c0 000007fe`ff132cb6 : 00000000`13614ff0 00000000`13614ff0 00000000`00000000 00000000`00000010 : shell32!CShellTaskThread::ThreadProc+0xd0
00000000`0801fa60 000007fe`fdfac71e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!CShellTaskThread::s_ThreadProc+0x26
00000000`0801fa90 00000000`7796556d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shlwapi!WrapperThreadProc+0x19b
00000000`0801fb90 00000000`77bc372d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : kernel32!BaseThreadInitThunk+0xd
00000000`0801fbc0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x1d
SYMBOL_NAME: explorerframe!CExplorerFrame::FrameMessagePump+436
MODULE_NAME: EXPLORERFRAME
IMAGE_NAME: EXPLORERFRAME.dll
STACK_COMMAND: ~7s ; .ecxr ; kb
FAILURE_BUCKET_ID: SOFTWARE_NX_FAULT_AVRF_c0000005_EXPLORERFRAME.dll!CExplorerFrame::FrameMessagePump
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
FAILURE_ID_HASH: {345374cc-d70f-27f7-3b52-1c2def41b870}
Followup: MachineOwner
---------
This file is verified to be 100% good by SFC and other tools!
EXPLORERFRAME.dll
This is not a real problem file because even Windows shows "unknown" (module) in the log
Microsoft (R) Windows Debugger Version 10.0.19041.685 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\LocalDumps\explorer.exe.1248.dmp]
User Mini Dump File with Full Memory: Only application data is available
Symbol search path is: srv*
Executable search path is:
Windows 7 Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: SingleUserTS
Machine Name:
Debug session time: Tue Aug 31 04:35:23.000 2021 (UTC + 2:00)
System Uptime: 0 days 21:21:00.546
Process Uptime: 0 days 20:58:02.000
................................................................
................................................................
..
Loading unloaded module list
................................................................
This dump file has an exception of interest stored in it.
The stored exception information can be accessed via .ecxr.
(4e0.2adc): Access violation - code c0000005 (first/second chance not available)
For analysis of this file, run !analyze -v
ntdll!ZwWaitForMultipleObjects+0xa:
00000000`77bd9d5a c3 ret
0:007> !analyze -v
*******************************************************************************
* *
* Exception Analysis *
* *
*******************************************************************************
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Execute
Key : Analysis.CPU.Sec
Value: 1
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on MAKI
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 1
Key : Analysis.Memory.CommitPeak.Mb
Value: 143
Key : Analysis.System
Value: CreateObject
Key : Timeline.OS.Boot.DeltaSec
Value: 76860
Key : Timeline.Process.Start.DeltaSec
Value: 75482
NTGLOBALFLAG: 2000000
APPLICATION_VERIFIER_FLAGS: 0
APPLICATION_VERIFIER_LOADED: 1
CONTEXT: (.ecxr)
rax=000000000801f720 rbx=0000000000000000 rcx=0000000000020d92
rdx=000000000000c348 rsi=0000000000000001 rdi=0000000000000000
rip=00000000120c0fd8 rsp=000000000801f6b8 rbp=000000001853de70
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=000000000000c348
r14=0000000001b52df8 r15=0000000000020d92
iopl=0 nv up ei pl zr na po nc
cs=0033 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010246
00000000`120c0fd8 ?? ???
Resetting default scope
EXCEPTION_RECORD: (.exr -1)
ExceptionAddress: 00000000120c0fd8
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000008
Parameter[1]: 00000000120c0fd8
Attempt to execute non-executable address 00000000120c0fd8
PROCESS_NAME: explorer.exe
EXECUTE_ADDRESS: 120c0fd8
FAILED_INSTRUCTION_ADDRESS:
+0
00000000`120c0fd8 ?? ???
ERROR_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod 0x
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000008
EXCEPTION_PARAMETER2: 00000000120c0fd8
IP_ON_HEAP: 00000000120c0fd8
IP_IN_FREE_BLOCK: 120c0fd8
STACK_TEXT:
00000000`0801f6b8 00000000`77a89861 : 00000000`00000001 00000000`00000000 00000000`00000001 00000000`00000030 : 0x120c0fd8
00000000`0801f6c0 00000000`77a89572 : 00000000`0801f830 00000000`120c0fd8 000007fe`dc00c550 00000000`051a27a0 : user32!UserCallWinProcCheckWow+0x1ad
00000000`0801f780 000007fe`dbed0914 : 00000000`1853de04 00000000`1853de04 00000000`120c0fd8 00000000`00000000 : user32!DispatchMessageWorker+0x3b5
00000000`0801f800 000007fe`dbed4d89 : 00000000`1853de70 00000000`00000006 00000000`00000000 00000000`00000000 : EXPLORERFRAME!CExplorerFrame::FrameMessagePump+0x436
00000000`0801f880 000007fe`dbed54fb : 00000000`1853de70 00000000`24d13ea0 00000000`00000000 00000000`00000000 : EXPLORERFRAME!BrowserThreadProc+0x180
00000000`0801f900 000007fe`dbed5492 : 115008ec`00000001 00000000`0d1cefb0 00000000`0801f9f8 000007fe`fd783f40 : EXPLORERFRAME!BrowserNewThreadProc+0x53
00000000`0801f930 000007fe`dbecbe90 : 00000000`13614f00 00000000`02438f60 00000000`00000000 00000000`000001c8 : EXPLORERFRAME!CExplorerTask::InternalResumeRT+0x12
00000000`0801f960 000007fe`ff12f0b7 : 80000000`01000000 00000000`0801f9f0 ffffffff`fffffffe 00000000`00000009 : EXPLORERFRAME!CRunnableTask::Run+0xda
00000000`0801f990 000007fe`ff12eff7 : 00000000`13614ff0 00000000`136ddf90 ffffffff`fffffffe 000007fe`fe0ae734 : shell32!CShellTask::TT_Run+0x124
00000000`0801f9c0 000007fe`ff132cb6 : 00000000`13614ff0 00000000`13614ff0 00000000`00000000 00000000`00000010 : shell32!CShellTaskThread::ThreadProc+0xd0
00000000`0801fa60 000007fe`fdfac71e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!CShellTaskThread::s_ThreadProc+0x26
00000000`0801fa90 00000000`7796556d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shlwapi!WrapperThreadProc+0x19b
00000000`0801fb90 00000000`77bc372d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : kernel32!BaseThreadInitThunk+0xd
00000000`0801fbc0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x1d
SYMBOL_NAME: explorerframe!CExplorerFrame::FrameMessagePump+436
MODULE_NAME: EXPLORERFRAME
IMAGE_NAME: EXPLORERFRAME.dll
STACK_COMMAND: ~7s ; .ecxr ; kb
FAILURE_BUCKET_ID: SOFTWARE_NX_FAULT_AVRF_c0000005_EXPLORERFRAME.dll!CExplorerFrame::FrameMessagePump
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
FAILURE_ID_HASH: {345374cc-d70f-27f7-3b52-1c2def41b870}
Followup: MachineOwner
---------