[SOLVED] Windows 10 explorer crash on file operations

fopsolor

New member
Joined
Nov 6, 2020
Posts
2
Hello everyone,

since a few days I can't get file or folder properties without a crash of the windows explorer.
Not always but 90% of the time. I sometimes can't acces folders or copy files etc. So basically standard file operations.
I tried to get help on the official microsoft forum but I want to understand the problem and not safe boot the whole day with trail and error.
Maybe you could give me a hint about how to get some usefull information from the dump instead of DIM and sfc my PC to death.
Windows 10 - was updated today. DIM and sfc didn't show any error.
At first I was getting error events in the event log for ntdll.dll and now exclusively for shcore.dll
Anything usefull I can get from my crah dump?

Code:
*******************************************************************************
*                                                                             *
*                        Exception Analysis                                   *
*                                                                             *
*******************************************************************************


KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.Sec
    Value: 17

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on KNIRSCH

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 1676

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 342

    Key  : Analysis.System
    Value: CreateObject

    Key  : CLR.Engine
    Value: CLR

    Key  : CLR.NOSOS
    Value: 1

    Key  : CLR.Version
    Value: 4.0.30319.0

    Key  : Timeline.OS.Boot.DeltaSec
    Value: 433343

    Key  : Timeline.Process.Start.DeltaSec
    Value: 17270


NTGLOBALFLAG:  2000100

PROCESS_BAM_CURRENT_THROTTLED: 0

PROCESS_BAM_PREVIOUS_THROTTLED: 0

APPLICATION_VERIFIER_FLAGS:  48004

APPLICATION_VERIFIER_LOADED: 1

CONTEXT:  (.ecxr)
rax=00007ffb3c0b50f8 rbx=0000000080004005 rcx=00000000176adb40
rdx=00007ffb653230f0 rsi=0000000000000000 rdi=00000000176adb40
rip=00007ffb652c8417 rsp=000000000926dad0 rbp=000000000926dd20
 r8=000000000926db20  r9=0000000019a2c1d0 r10=00000fff65d398d4
r11=ffffffffffffffff r12=0000000000000000 r13=00000000000003e0
r14=0000000002360b15 r15=000000000963fb60
iopl=0         nv up ei pl nz na pe nc
cs=0033  ss=002b  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
SHCore!IUnknown_SetSite+0x27:
00007ffb`652c8417 488b00          mov     rax,qword ptr [rax] ds:00007ffb`3c0b50f8=????????????????
Resetting default scope

EXCEPTION_RECORD:  (.exr -1)
ExceptionAddress: 00007ffb652c8417 (SHCore!IUnknown_SetSite+0x0000000000000027)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 00007ffb3c0b50f8
Attempt to read from address 00007ffb3c0b50f8

PROCESS_NAME:  explorer.exe

READ_ADDRESS:  00007ffb3c0b50f8

ERROR_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%p verwies auf Arbeitsspeicher bei 0x%p. Der Vorgang %s konnte im Arbeitsspeicher nicht durchgef hrt werden.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  00007ffb3c0b50f8

MISSING_CLR_SYMBOL: 0

ADDITIONAL_DEBUG_TEXT:  SOS.DLL is not loaded for managed code. Analysis might be incomplete

STACK_TEXT: 
00000000`0926dad0 00007ffb`65d11228 : 00000000`00000000 00000000`0926dd20 00000000`00000000 00000000`02600000 : SHCore!IUnknown_SetSite+0x27
00000000`0926db10 00007ffb`65d111c1 : 00000000`0b47afa0 00007ffb`669bfb50 00000000`00000000 00007ffb`57201e1c : shell32!HDXA_SetSite+0x40
00000000`0926db40 00007ffb`652c8439 : 00000000`80004005 00007ffb`669bfb50 00007ffb`64b049b0 00007ffb`57224350 : shell32!CDefFolderMenu::SetSite+0x21
00000000`0926db70 00007ffb`44aa61fa : 00000000`00000000 00007ffb`57226168 00000000`0b47afa0 00000000`00000000 : SHCore!IUnknown_SetSite+0x49
00000000`0926dbb0 00007ffb`652c8439 : 00000000`80004005 00000000`00000000 00000000`0926dcc8 00000000`0deaf9b0 : explorerframe!CContextMenuOnContextMenuArray::SetSite+0x2a
00000000`0926dbe0 00007ffb`44a256c8 : 00000000`0deaf9b0 00000000`0963f980 00000000`19394000 00007ffb`44b16a10 : SHCore!IUnknown_SetSite+0x49
00000000`0926dc20 00007ffb`449dba0d : 00000000`0926f840 00007ffb`44b18600 00000000`00000004 00000000`0963f980 : explorerframe!CNscTree::_OnContextMenu+0x8a4
00000000`0926e030 00007ffb`4499ad23 : 00000000`00000000 00007ffb`57212abd 00000000`00000000 00000000`0926ee58 : explorerframe!CNscTree::_OnNotify+0x40b11
00000000`0926e240 00007ffb`449659ee : 00000000`0963fa68 00000000`00000064 00000000`001a08f6 00000000`00000001 : explorerframe!CNscTree::v_WndProc+0x43
00000000`0926e2b0 00007ffb`66375c1d : 00000000`00000001 00000000`00000064 00000000`00000000 00000000`80000022 : explorerframe!CImpWndProc::s_WndProc+0x6e
00000000`0926e2f0 00007ffb`663758ee : 00000000`001a08f6 00007ffb`44965980 00000000`001a08f6 00000000`0000004e : user32!UserCallWinProcCheckWow+0x2bd
00000000`0926e480 00007ffb`572ebc89 : 00000000`0926e710 00000000`0926ee58 00000000`00000064 00000000`037a0000 : user32!CallWindowProcW+0x8e
00000000`0926e4d0 00007ffb`572ebbd7 : 00000000`00000001 00000000`08b985b0 00000000`001a08f6 00007ffb`66a356a4 : comctl32!CallNextSubclassProc+0x89
00000000`0926e540 00007ffb`4496ad41 : 00000000`001a08f6 00000000`00000000 00000000`0000004e 00000000`11000003 : comctl32!DefSubclassProc+0x77
00000000`0926e590 00007ffb`449633ef : 00000000`ffffffff 00000000`0963fa10 00000000`00000000 00007ffb`57212abd : explorerframe!CNotifySubclassWndProc::_DefWindowProc+0x41
00000000`0926e5d0 00007ffb`572ebc89 : 00000000`001a08f6 00000000`0926e710 00000000`00000064 00000000`00000001 : explorerframe!CNotifySubclassWndProc::s_SubclassWndProc+0xcf
00000000`0926e650 00007ffb`572ebab2 : 00000000`00000001 00000000`00000064 00000000`001a08f6 00007ffb`57211bed : comctl32!CallNextSubclassProc+0x89
00000000`0926e6c0 00007ffb`66375c1d : 00000000`00000001 00000000`00000064 00000000`00000000 00000000`0926e980 : comctl32!MasterSubclassProc+0xa2
00000000`0926e760 00007ffb`663758ee : 00000000`001a08f6 00007ffb`572eba10 00000000`001a08f6 00000000`0000004e : user32!UserCallWinProcCheckWow+0x2bd
00000000`0926e8f0 00007ffb`4548df35 : 00000000`0c0bf710 00000000`0926ee58 00000000`00000000 00000000`0000004e : user32!CallWindowProcW+0x8e
00000000`0926e940 00007ffb`58251538 : 00000000`00000000 00000000`00000000 00000000`0000004e 00000000`001a08f6 : duser!WndBridge::RawWndProc+0xa5
00000000`0926e9c0 00007ffb`66375c1d : 00000000`00000001 00000000`0926ed40 00000000`00000000 00000000`00000000 : atlthunk!AtlThunk_0x1B+0x18
00000000`0926ea00 00007ffb`663757ec : 00000000`00000388 00007ffb`58251520 00000000`001a08f6 00000000`80000000 : user32!UserCallWinProcCheckWow+0x2bd
00000000`0926eb90 00007ffb`66381f83 : 00000000`00000000 00000000`00000000 00000000`00000064 00000000`00000007 : user32!DispatchClientMessage+0x9c
00000000`0926ebf0 00007ffb`66a1fe34 : 00000000`00000000 00007ffb`6637f775 00000000`00000001 00000000`00000000 : user32!_fnDWORD+0x33
00000000`0926ec50 00007ffb`63c11184 : 00007ffb`6637511b 00007ffb`66375ee0 00007ffb`57226be0 00005bc1`00000002 : ntdll!KiUserCallbackDispatcherContinue
00000000`0926ecd8 00007ffb`6637511b : 00007ffb`66375ee0 00007ffb`57226be0 00005bc1`00000002 00000000`0926ee69 : win32u!NtUserMessageCall+0x14
00000000`0926ece0 00007ffb`66374f98 : 00000000`00000000 00000000`00000000 00000000`00000064 00000000`061ac690 : user32!SendMessageWorker+0x11b
00000000`0926ed80 00007ffb`572f8325 : 00000000`0926ee58 00000000`00000001 00000000`0926ee99 00000000`001a08f6 : user32!SendMessageW+0xf8
00000000`0926ede0 00007ffb`5738ed32 : 00000000`0e992d20 00000000`0e992d20 00000000`0931a6c0 00000000`0931a6c0 : comctl32!CCSendNotify+0x105
00000000`0926ef00 00007ffb`5731bc1e : 00000000`00000004 00000000`00000001 00000000`0926eff9 00000000`00000000 : comctl32!TV_SendRButtonDown+0xb2
00000000`0926ef50 00007ffb`66375c1d : 00000000`00000001 00000000`00000002 00000000`00000000 00000000`00000000 : comctl32!TV_WndProc+0x9421e
00000000`0926f060 00007ffb`663758ee : 00000000`00340686 00007ffb`57287a00 00000000`00340686 00000000`00000204 : user32!UserCallWinProcCheckWow+0x2bd
00000000`0926f1f0 00007ffb`572ebc89 : 00000000`0926f480 00000000`0323008a 00000000`00000002 00000000`ffffffc4 : user32!CallWindowProcW+0x8e
00000000`0926f240 00007ffb`572ebbd7 : 00000000`00000001 00000000`0df3f390 00000000`00340686 00000000`00000204 : comctl32!CallNextSubclassProc+0x89
00000000`0926f2b0 00007ffb`4499e23b : 00000000`00000000 00000000`00000002 00000000`00000204 00007ffb`665ca9bc : comctl32!DefSubclassProc+0x77
00000000`0926f300 00007ffb`4499e17b : 00000000`0963f980 00000000`0963f980 00007ffb`66a1bf70 00000000`00000204 : explorerframe!CNscTree::_SubClassTreeWndProc+0x7b
00000000`0926f380 00007ffb`572ebc89 : 00000000`0926f480 00000000`00000001 00000000`00000002 00000000`00000001 : explorerframe!CNscTree::s_SubClassTreeWndProc+0x5b
00000000`0926f3c0 00007ffb`572ebab2 : 00000000`00000001 00000000`00000002 00000000`00340686 00007ffb`57211bed : comctl32!CallNextSubclassProc+0x89
00000000`0926f430 00007ffb`66375c1d : 00000000`00000001 00000000`00000001 00000000`00000000 00000000`00000001 : comctl32!MasterSubclassProc+0xa2
00000000`0926f4d0 00007ffb`66375612 : 00000000`06188980 00007ffb`572eba10 00000000`00340686 00000000`0926f710 : user32!UserCallWinProcCheckWow+0x2bd
00000000`0926f660 00007ffb`449488d3 : 00007ffb`572eba10 00000000`0e3f5050 00000000`0e4d32f0 00000000`19f982e0 : user32!DispatchMessageWorker+0x1e2
00000000`0926f6e0 00007ffb`449487d9 : 00000000`0e3f5050 00000000`00000003 00000000`00000000 00000000`0e4d32f0 : explorerframe!CExplorerFrame::FrameMessagePump+0xe3
00000000`0926f760 00007ffb`44947e92 : 00000000`0e3f5050 00000000`00000000 00000000`00000000 00007ffb`5721f6e4 : explorerframe!BrowserThreadProc+0x85
00000000`0926f7e0 00007ffb`44947e42 : 192fdce4`00000001 00000000`16da9bc0 00000000`00000000 00007ffb`57212d23 : explorerframe!BrowserNewThreadProc+0x3a
00000000`0926f810 00007ffb`4496a502 : 00000000`0c7d8e60 00000000`0926fa09 ffffffff`fffffffe 00000000`00000000 : explorerframe!CExplorerTask::InternalResumeRT+0x12
00000000`0926f840 00007ffb`641be1c4 : 00000000`00000000 00000000`00000000 00000000`0cac4250 00000000`00000009 : explorerframe!CRunnableTask::Run+0xb2
00000000`0926f880 00007ffb`641bde05 : 00000000`0c7d8e60 ffffffff`fffffffe 00000000`0926fa09 ffffffff`fffffffe : windows_storage!CShellTask::TT_Run+0x3c
00000000`0926f8b0 00007ffb`641bdce5 : 00000000`0c7d8e60 00000000`0c7d8e60 00000000`0926fa09 00000000`00000000 : windows_storage!CShellTaskThread::ThreadProc+0xdd
00000000`0926f960 00007ffb`652cc235 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : windows_storage!CShellTaskThread::s_ThreadProc+0x35
00000000`0926f990 00007ffb`5721e684 : 00000000`00000000 00000000`00000000 00000000`1feb7900 00000000`00000000 : SHCore!_WrapperThreadProc+0xf5
00000000`0926fa70 00007ffb`665c7c24 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : verifier!AVrfpStandardThreadFunction+0x44
00000000`0926fab0 00007ffb`669ecea1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : kernel32!BaseThreadInitThunk+0x14
00000000`0926fae0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x21


SYMBOL_NAME:  SHCore!IUnknown_SetSite+27

MODULE_NAME: SHCore

IMAGE_NAME:  SHCore.dll

STACK_COMMAND:  ~64s ; .ecxr ; kb

FAILURE_BUCKET_ID:  INVALID_POINTER_READ_NOSOS_AVRF_c0000005_SHCore.dll!IUnknown_SetSite

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {df6fdc38-1b30-7043-9686-5c72b13eb53e}

Followup:     MachineOwner
---------

0:064>
ExceptionAddress: 00007ffb652c8417 (SHCore!IUnknown_SetSite+0x0000000000000027)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 00007ffb3c0b50f8
Attempt to read from address 00007ffb3c0b50f8
 

Has Sysnative Forums helped you? Please consider donating to help us support the site!

Back
Top