Как говорится в заголовке, всякий раз, когда я пытаюсь открыть "новое" подменю контекстного меню, вызываемого правой кнопкой мыши в проводнике Windows 10, он блокируется, а через несколько мгновений вылетает. Эта проблема появилась только в последние пару дней, и я подозреваю, что это результат обновления Создателя. Я бы предпочел исправить эту проблему без отката обновления. У кого-нибудь есть опыт с этим вопросом?
Я пытался использовать CCleaner и другие программы, чтобы отключить все мои сторонние расширения оболочки безрезультатно. Перезагрузка в безопасном режиме также не устраняет проблему. Я также запустил sfc /scannow в командной строке с повышенными правами, но проблем не обнаружено.
Я сгенерировал файл аварийного дампа, и вот вывод, который я запускаю!проанализировать -v в WinDbg (поле текста стека опущено из-за ограничения текста):
*******************************************************************************
* *
* Exception Analysis *
* *
*******************************************************************************
*** ERROR: Symbol file could not be found. Defaulted to export symbols for sppc.dll -
*** WARNING: Unable to verify timestamp for nvwgf2umx_cfg.dll
*** ERROR: Module load completed but symbols could not be loaded for nvwgf2umx_cfg.dll
GetUrlPageData2 (WinHttp) failed: 12002.
DUMP_CLASS: 2
DUMP_QUALIFIER: 400
CONTEXT: (.ecxr)
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=000000001969b898 rsi=000000001025016c rdi=000000001969b8f0
rip=00007fff71a55616 rsp=000000001969b850 rbp=000000001969b929
r8=0000000000cd3c00 r9=0000000000008000 r10=00000fffee105183
r11=2200880000020008 r12=0000000000000000 r13=0000000000000002
r14=000000001969c080 r15=000000001969c890
iopl=0 nv up ei pl nz na po nc
cs=0033 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010206
shell32!CheckFileTypeForShellNew+0x32:
00007fff`71a55616 488b03 mov rax,qword ptr [rbx] ds:00000000`00000000=????????????????
Resetting default scope
FAULTING_IP:
shell32!CheckFileTypeForShellNew+32
00007fff`71a55616 488b03 mov rax,qword ptr [rbx]
EXCEPTION_RECORD: (.exr -1)
ExceptionAddress: 00007fff71a55616 (shell32!CheckFileTypeForShellNew+0x0000000000000032)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000000
Attempt to read from address 0000000000000000
PROCESS_NAME: explorer.exe
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
FOLLOWUP_IP:
shell32!CheckFileTypeForShellNew+32
00007fff`71a55616 488b03 mov rax,qword ptr [rbx]
READ_ADDRESS: 0000000000000000
WATSON_BKT_PROCSTAMP: 951324bb
WATSON_BKT_PROCVER: 10.0.15063.447
PROCESS_VER_PRODUCT: Microsoft® Windows® Operating System
WATSON_BKT_MODULE: shell32.dll
WATSON_BKT_MODSTAMP: 944613c6
WATSON_BKT_MODOFFSET: 435616
WATSON_BKT_MODVER: 10.0.15063.502
MODULE_VER_PRODUCT: Microsoft® Windows® Operating System
BUILD_VERSION_STRING: 10.0.15063.246 (WinBuild.160101.0800)
MODLIST_WITH_TSCHKSUM_HASH: 0c3165ab5fc02cacaf383ed161d65631e0ff52c8
MODLIST_SHA1_HASH: c9ff83ef7d8837c392de03e5e41584a58e60ea5a
NTGLOBALFLAG: 0
APPLICATION_VERIFIER_FLAGS: 0
DUMP_FLAGS: 94
DUMP_TYPE: 1
ANALYSIS_SESSION_HOST: ******-PC
ANALYSIS_SESSION_TIME: 09-03-2017 20:41:48.0842
ANALYSIS_VERSION: 10.0.15063.468 amd64fre
THREAD_ATTRIBUTES:
OS_LOCALE: ENU
PROBLEM_CLASSES:
ID: [0n292]
Type: [@ACCESS_VIOLATION]
Class: Addendum
Scope: BUCKET_ID
Name: Omit
Data: Omit
PID: [Unspecified]
TID: [0x2b2c]
Frame: [0] : shell32!CheckFileTypeForShellNew
ID: [0n264]
Type: [INVALID_POINTER_READ]
Class: Primary
Scope: BUCKET_ID
Name: Add
Data: Omit
PID: [Unspecified]
TID: [0x2b2c]
Frame: [0] : shell32!CheckFileTypeForShellNew
ID: [0n279]
Type: [NULL_POINTER_READ]
Class: Primary
Scope: DEFAULT_BUCKET_ID (Failure Bucket ID prefix)
BUCKET_ID
Name: Add
Data: Omit
PID: [0x2cd0]
TID: [0x2b2c]
Frame: [0] : shell32!CheckFileTypeForShellNew
ID: [0n105]
Type: [AFTER_CALL]
Class: Addendum
Scope: DEFAULT_BUCKET_ID (Failure Bucket ID prefix)
BUCKET_ID
Name: Add
Data: Omit
PID: [0x2cd0]
TID: [0x2b2c]
Frame: [0] : shell32!CheckFileTypeForShellNew
BUGCHECK_STR: APPLICATION_FAULT_NULL_POINTER_READ_INVALID_POINTER_READ_AFTER_CALL
DEFAULT_BUCKET_ID: NULL_POINTER_READ_AFTER_CALL
PRIMARY_PROBLEM_CLASS: APPLICATION_FAULT
LAST_CONTROL_TRANSFER: from 00007fff71a565b8 to 00007fff71a55616
THREAD_SHA1_HASH_MOD_FUNC: 063c29b48983480c91fd071b8c8f53e2156ff3b6
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 69135dc43bf3fdccf1b214fa3444b4c42daee17b
THREAD_SHA1_HASH_MOD: 7674f6f908a3f0f7306b7269a4b5f1bc7c621392
FAULT_INSTR_CODE: 4c038b48
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: shell32!CheckFileTypeForShellNew+32
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: shell32
IMAGE_NAME: shell32.dll
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .ecxr ; kb
FAILURE_BUCKET_ID: NULL_POINTER_READ_AFTER_CALL_c0000005_shell32.dll!CheckFileTypeForShellNew
BUCKET_ID: APPLICATION_FAULT_NULL_POINTER_READ_INVALID_POINTER_READ_AFTER_CALL_shell32!CheckFileTypeForShellNew+32
FAILURE_EXCEPTION_CODE: c0000005
FAILURE_IMAGE_NAME: shell32.dll
BUCKET_ID_IMAGE_STR: shell32.dll
FAILURE_MODULE_NAME: shell32
BUCKET_ID_MODULE_STR: shell32
FAILURE_FUNCTION_NAME: CheckFileTypeForShellNew
BUCKET_ID_FUNCTION_STR: CheckFileTypeForShellNew
BUCKET_ID_OFFSET: 32
BUCKET_ID_MODTIMEDATESTAMP: 0
BUCKET_ID_MODCHECKSUM: 146b7f9
BUCKET_ID_MODVER_STR: 10.0.15063.502
BUCKET_ID_PREFIX_STR: APPLICATION_FAULT_NULL_POINTER_READ_INVALID_POINTER_READ_AFTER_CALL_
FAILURE_PROBLEM_CLASS: APPLICATION_FAULT
FAILURE_SYMBOL_NAME: shell32.dll!CheckFileTypeForShellNew
WATSON_STAGEONE_URL: http://watson.microsoft.com/StageOne/explorer.exe/10.0.15063.447/951324bb/shell32.dll/10.0.15063.502/944613c6/c0000005/00435616.htm?Retriage=1
TARGET_TIME: 2017-09-04T01:41:00.000Z
OSBUILD: 15063
OSSERVICEPACK: 296
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 256
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt SingleUserTS
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.15063.246
ANALYSIS_SESSION_ELAPSED_TIME: 88f4
ANALYSIS_SOURCE: UM
FAILURE_ID_HASH_STRING: um:null_pointer_read_after_call_c0000005_shell32.dll!checkfiletypeforshellnew
FAILURE_ID_HASH: {0f88b991-6467-c004-1402-e5afe6fe01dd}
Followup: MachineOwner
*******************************************************************************
* *
* Exception Analysis *
* *
*******************************************************************************
*** ERROR: Symbol file could not be found. Defaulted to export symbols for sppc.dll -
*** WARNING: Unable to verify timestamp for nvwgf2umx_cfg.dll
*** ERROR: Module load completed but symbols could not be loaded for nvwgf2umx_cfg.dll
GetUrlPageData2 (WinHttp) failed: 12002.
DUMP_CLASS: 2
DUMP_QUALIFIER: 400
CONTEXT: (.ecxr)
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=000000001969b898 rsi=000000001025016c rdi=000000001969b8f0
rip=00007fff71a55616 rsp=000000001969b850 rbp=000000001969b929
r8=0000000000cd3c00 r9=0000000000008000 r10=00000fffee105183
r11=2200880000020008 r12=0000000000000000 r13=0000000000000002
r14=000000001969c080 r15=000000001969c890
iopl=0 nv up ei pl nz na po nc
cs=0033 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010206
shell32!CheckFileTypeForShellNew+0x32:
00007fff`71a55616 488b03 mov rax,qword ptr [rbx] ds:00000000`00000000=????????????????
Resetting default scope
FAULTING_IP:
shell32!CheckFileTypeForShellNew+32
00007fff`71a55616 488b03 mov rax,qword ptr [rbx]
EXCEPTION_RECORD: (.exr -1)
ExceptionAddress: 00007fff71a55616 (shell32!CheckFileTypeForShellNew+0x0000000000000032)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000000
Attempt to read from address 0000000000000000
PROCESS_NAME: explorer.exe
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
FOLLOWUP_IP:
shell32!CheckFileTypeForShellNew+32
00007fff`71a55616 488b03 mov rax,qword ptr [rbx]
READ_ADDRESS: 0000000000000000
WATSON_BKT_PROCSTAMP: 951324bb
WATSON_BKT_PROCVER: 10.0.15063.447
PROCESS_VER_PRODUCT: Microsoft® Windows® Operating System
WATSON_BKT_MODULE: shell32.dll
WATSON_BKT_MODSTAMP: 944613c6
WATSON_BKT_MODOFFSET: 435616
WATSON_BKT_MODVER: 10.0.15063.502
MODULE_VER_PRODUCT: Microsoft® Windows® Operating System
BUILD_VERSION_STRING: 10.0.15063.246 (WinBuild.160101.0800)
MODLIST_WITH_TSCHKSUM_HASH: 0c3165ab5fc02cacaf383ed161d65631e0ff52c8
MODLIST_SHA1_HASH: c9ff83ef7d8837c392de03e5e41584a58e60ea5a
NTGLOBALFLAG: 0
APPLICATION_VERIFIER_FLAGS: 0
DUMP_FLAGS: 94
DUMP_TYPE: 1
ANALYSIS_SESSION_HOST: WESTON-PC
ANALYSIS_SESSION_TIME: 09-03-2017 20:41:48.0842
ANALYSIS_VERSION: 10.0.15063.468 amd64fre
THREAD_ATTRIBUTES:
OS_LOCALE: ENU
PROBLEM_CLASSES:
ID: [0n292]
Type: [@ACCESS_VIOLATION]
Class: Addendum
Scope: BUCKET_ID
Name: Omit
Data: Omit
PID: [Unspecified]
TID: [0x2b2c]
Frame: [0] : shell32!CheckFileTypeForShellNew
ID: [0n264]
Type: [INVALID_POINTER_READ]
Class: Primary
Scope: BUCKET_ID
Name: Add
Data: Omit
PID: [Unspecified]
TID: [0x2b2c]
Frame: [0] : shell32!CheckFileTypeForShellNew
ID: [0n279]
Type: [NULL_POINTER_READ]
Class: Primary
Scope: DEFAULT_BUCKET_ID (Failure Bucket ID prefix)
BUCKET_ID
Name: Add
Data: Omit
PID: [0x2cd0]
TID: [0x2b2c]
Frame: [0] : shell32!CheckFileTypeForShellNew
ID: [0n105]
Type: [AFTER_CALL]
Class: Addendum
Scope: DEFAULT_BUCKET_ID (Failure Bucket ID prefix)
BUCKET_ID
Name: Add
Data: Omit
PID: [0x2cd0]
TID: [0x2b2c]
Frame: [0] : shell32!CheckFileTypeForShellNew
BUGCHECK_STR: APPLICATION_FAULT_NULL_POINTER_READ_INVALID_POINTER_READ_AFTER_CALL
DEFAULT_BUCKET_ID: NULL_POINTER_READ_AFTER_CALL
PRIMARY_PROBLEM_CLASS: APPLICATION_FAULT
LAST_CONTROL_TRANSFER: from 00007fff71a565b8 to 00007fff71a55616
STACK_TEXT:
00000000`1969b850 00007fff`71a565b8 : 00000000`00000000 00000000`00000000 00000000`00000000 00007fff`73e4ac20 : shell32!CheckFileTypeForShellNew+0x32
00000000`1969b8c0 00007fff`71a5676d : 00000000`1025016c 00000000`1969ba90 00007fff`71b73448 00000000`1709ae80 : shell32!GetShellNewFileTypeAndFTAFromStateRepository+0x2d0
00000000`1969b990 00007fff`71a5b2f5 : 00000000`00000000 00000000`1969c1f0 00000000`00001f52 00000000`00001f52 : shell32!GetShellNewInfoFromStateRepository+0x111
00000000`1969c0f0 00007fff`71a56df3 : 00000000`0000000d 00000000`00000000 00000000`00000000 00000000`00510295 : shell32!CNewMenu::_InitMenuPopup+0x1cd
00000000`1969ca90 00007fff`718202a6 : 00000000`173f5000 00000000`00000008 00000000`0000000d 00000000`00000000 : shell32!CNewMenu::HandleMenuMsg2+0x23
00000000`1969cac0 00007fff`71a956d7 : 00000000`80004005 00000000`1969cb90 00000000`1969cad8 00000000`057c6260 : shell32!CDefFolderMenu::HandleMenuMsg2+0x126
00000000`1969cb70 00007fff`71529c38 : 00000000`80004005 00000000`00000117 00000000`00000000 00007fff`73ff0f20 : shell32!CContextMenuOnContextMenuArray::HandleMenuMsg2+0x177
00000000`1969cc10 00007fff`717f25f3 : 00000000`ffffffff 00000000`1969cd79 00000000`00510295 00000000`00000000 : shlwapi!SHForwardContextMenuMsg+0x78
00000000`1969cca0 00007fff`717f731e : 00000000`0000000d 00000000`1969cd79 00000000`00510295 00000000`10291e40 : shell32!CDefView::_ForwardMenuMessages+0x97
00000000`1969cce0 00007fff`717f7530 : 00000000`000d01ee 00000000`01303270 00000000`00000121 00000000`0000000d : shell32!CDefView::_OnInitMenuPopup+0x2ee
00000000`1969cde0 00007fff`717829c6 : 00000000`00000002 00000000`00000000 00000000`10291e40 00000000`002b03ae : shell32!CDefView::_OnMenuMessage+0xe4
00000000`1969ce80 00007fff`716b7536 : 00000000`00000001 00000000`0000000d 00000000`002b03ae 00000000`00000001 : shell32!CDefView::WndProc+0xc781e
00000000`1969cf90 00007fff`72a6bc50 : 00000000`00000001 00000000`00000001 00000000`00510295 00000000`00000001 : shell32!CDefView::s_WndProc+0x56
00000000`1969cfe0 00007fff`72a6b80b : 00000000`002b03ae 00007fff`716b74e0 00000000`002b03ae 00000000`00000117 : user32!UserCallWinProcCheckWow+0x280
00000000`1969d140 00007fff`4ccd01e5 : 00000000`10325400 00000000`0000000d 00000000`00000000 00000000`00000000 : user32!CallWindowProcW+0x8b
00000000`1969d190 00007fff`649612d8 : 00002520`802d14c5 00000000`00000000 00000000`002b03ae 00000000`00000117 : duser!WndBridge::RawWndProc+0xa5
00000000`1969d210 00007fff`72a6bc50 : 00000000`80000022 00000000`1969d2c8 00000000`00000001 00000000`00030000 : atlthunk!AtlThunk_DataToCode+0xffffffff`ffffe2c8
00000000`1969d250 00007fff`72a6b94c : 00000000`40000388 00007fff`649612c0 00000000`002b03ae 00000000`80000000 : user32!UserCallWinProcCheckWow+0x280
00000000`1969d3b0 00007fff`72a811f3 : 00000000`00000000 00000000`00000000 00000000`00510295 00000000`00000000 : user32!DispatchClientMessage+0x9c
00000000`1969d410 00007fff`740690a4 : 00000000`00000000 00007fff`740690a4 00007fff`70ba9a84 00007fff`740690a4 : user32!_fnDWORD+0x33
00000000`1969d470 00007fff`70ba9a84 : 00007fff`72ace96a 00000000`00000028 00007fff`72a6f1e4 00000000`00000000 : ntdll!KiUserCallbackDispatcherContinue
00000000`1969d4f8 00007fff`72ace96a : 00000000`00000028 00007fff`72a6f1e4 00000000`00000000 00000000`00000000 : win32u!NtUserTrackPopupMenuEx+0x14
00000000`1969d500 00007fff`717263b1 : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : user32!TrackPopupMenu+0x1a
00000000`1969d540 00007fff`717e9220 : 00000000`1969da90 00000000`1969db08 00000000`10291f88 00007fff`7081bacf : shell32!CDefView::_DoContextMenuPopup+0x521
00000000`1969da80 00007fff`67aa9fd8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`1969dff8 : shell32!CDefView::OnBackgroundContextMenu+0x1c0
00000000`1969db30 00007fff`67aa6d77 : 00000000`00a06000 00000000`1969ddb1 00000000`10291e40 00000000`00000000 : explorerframe!UIItemsView::ShowContextMenu+0x2dc
00000000`1969dc30 00007fff`717f1bec : 00000000`00000000 00007fff`67aa679a 00000125`00000067 00000000`00000002 : explorerframe!CItemsView::ShowContextMenu+0x17
00000000`1969dc60 00007fff`717f6ffe : 00000125`00000067 00000000`10291e40 00000000`10291e40 00000000`00000000 : shell32!CDefView::_DoContextMenu+0x88
00000000`1969dca0 00007fff`7178295f : 00000000`1969de0c 00000000`00000000 00000000`00200580 00000000`1969ded4 : shell32!CDefView::_OnContextMenu+0xd2
00000000`1969dd00 00007fff`716b7536 : 00000000`00000001 00000000`02bc03ff 00000000`002b03ae 00000000`1969e250 : shell32!CDefView::WndProc+0xc77b7
00000000`1969de10 00007fff`72a6bc50 : 00000000`00000001 00000000`00002406 00000000`00200580 00000000`00000000 : shell32!CDefView::s_WndProc+0x56
00000000`1969de60 00007fff`72a6b80b : 00000000`002b03ae 00007fff`716b74e0 00000000`002b03ae 00000000`0000007b : user32!UserCallWinProcCheckWow+0x280
00000000`1969dfc0 00007fff`4ccd01e5 : 00000000`10325400 00000000`02bc03ff 00000000`00000000 00000000`010f0000 : user32!CallWindowProcW+0x8b
00000000`1969e010 00007fff`649612d8 : 00000000`0fc678c0 00000000`00000000 00000000`002b03ae 00000000`0000007b : duser!WndBridge::RawWndProc+0xa5
00000000`1969e090 00007fff`72a6bc50 : 00000000`80000022 00000000`00000004 00000009`00000000 00000000`00000000 : atlthunk!AtlThunk_DataToCode+0xffffffff`ffffe2c8
00000000`1969e0d0 00007fff`72a6b94c : 00000000`00000388 00007fff`649612c0 00000000`002b03ae 00000000`80000000 : user32!UserCallWinProcCheckWow+0x280
00000000`1969e230 00007fff`72a811f3 : 00000000`00000000 00000000`00000000 00000000`00200580 00000000`00000000 : user32!DispatchClientMessage+0x9c
00000000`1969e290 00007fff`740690a4 : 00000000`1969e698 00007fff`7081d607 00000000`c0000034 00007fff`73feaf7e : user32!_fnDWORD+0x33
00000000`1969e2f0 00007fff`70ba1164 : 00007fff`72a69eaa 00000000`00000000 00000000`00de48a0 00000000`00000000 : ntdll!KiUserCallbackDispatcherContinue
00000000`1969e378 00007fff`72a69eaa : 00000000`00000000 00000000`00de48a0 00000000`00000000 00000000`1969e7d0 : win32u!NtUserMessageCall+0x14
00000000`1969e380 00007fff`72a696d2 : 00000000`0000007b 00000000`1969e5b0 00000000`00000000 00000000`012dfd40 : user32!RealDefWindowProcWorker+0x1ba
00000000`1969e470 00007fff`6eb2f599 : 00007fff`72a69680 00000000`02bc03ff 00000000`0000007b 00000000`00000000 : user32!RealDefWindowProcW+0x52
00000000`1969e4b0 00007fff`6eb2e3f1 : 00000000`00200580 00000000`00000000 00000000`00000000 00000000`02bc03ff : uxtheme!_ThemeDefWindowProc+0x559
00000000`1969e630 00007fff`72a69be7 : 00000000`00000000 00000000`00000000 00000000`1969e6e0 00000000`00000000 : uxtheme!ThemeDefWindowProcW+0x11
00000000`1969e670 00007fff`67a0e743 : 00000000`0000007b 00000000`00000000 00000000`02bc03ff 00000000`00000000 : user32!DefWindowProcW+0x1b7
00000000`1969e6e0 00007fff`4f97939d : 00000000`00200580 00000000`00000000 00000000`02bc03ff 00000000`1969e9e0 : explorerframe!UIItemsView::WndProc+0x78263
00000000`1969e940 00007fff`72a6bc50 : 00000000`00000001 00000000`00000000 00000000`00000000 00007fff`73fe87ef : dui70!DirectUI::HWNDElement::StaticWndProc+0x4d
00000000`1969e980 00007fff`72a6b80b : 00000000`00200580 00007fff`4f979350 00000000`00200580 00000000`0000007b : user32!UserCallWinProcCheckWow+0x280
00000000`1969eae0 00007fff`4ccdc37a : 00000000`00200580 00000000`00000000 00000000`02bc03ff 00000000`ffffff80 : user32!CallWindowProcW+0x8b
00000000`1969eb30 00007fff`72a6bc50 : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`80000022 : duser!ExtraInfoWndProc+0x8a
00000000`1969eb80 00007fff`72a6b80b : 00000000`00200580 00007fff`4ccdc2f0 00000000`00200580 00000000`0000007b : user32!UserCallWinProcCheckWow+0x280
00000000`1969ece0 00007fff`657f48d0 : 00000000`1969f310 00000000`02bc03ff 00000000`00000000 00007fff`4ccd7590 : user32!CallWindowProcW+0x8b
00000000`1969ed30 00007fff`657f46a7 : 00000000`02bc03ff 00000000`00200580 00000000`0000007b 00000011`00000001 : comctl32!CallNextSubclassProc+0xb0
00000000`1969ee00 00007fff`679961b7 : 00000000`0000007b 00000000`02bc03ff 00000000`00000000 00000000`00000000 : comctl32!DefSubclassProc+0x77
00000000`1969ee50 00007fff`67993656 : 00000000`00000000 00000000`00000003 00040001`00000001 00000000`10291e40 : explorerframe!UIItemsView::_UIItemsViewSubclassProc+0x77
00000000`1969ef30 00007fff`657f4929 : 00000000`1969f268 00007fff`489dcc60 00000000`00000000 0000b844`ea009a52 : explorerframe!UIItemsView::s_UIItemsViewSubclassProc+0x26
00000000`1969ef70 00007fff`657f46a7 : 00000000`02bc03ff 00000000`00200580 00000000`0000007b 00000000`00000000 : comctl32!CallNextSubclassProc+0x109
00000000`1969f040 00007fff`6797cd57 : 00000000`0000007b 00000000`00000000 00000000`00200580 00007fff`48a6c3b9 : comctl32!DefSubclassProc+0x77
00000000`1969f090 00007fff`6797cc96 : 00000000`1969f310 00000000`00000001 00000000`00000000 00000000`00000001 : explorerframe!CToolTipManager::_PropertyToolTipSubclassProc+0x67
00000000`1969f0e0 00007fff`657f4929 : 00000000`00a06000 00007fff`72a73bb2 00000000`00000000 00000000`00000000 : explorerframe!CToolTipManager::s_PropertyToolTipSubclassProc+0x26
00000000`1969f120 00007fff`657f49ea : 00000000`00000001 00000000`00000000 00000000`1969f310 00000000`00000000 : comctl32!CallNextSubclassProc+0x109
00000000`1969f1f0 00007fff`657f4772 : 00000000`00000001 00000000`00200580 00000000`00000000 00000000`00000113 : comctl32!CallNextSubclassProc+0x1ca
00000000`1969f2c0 00007fff`72a6bc50 : 00000000`80000022 00007fff`4ccd1442 00000000`063607c0 00000000`1969f428 : comctl32!MasterSubclassProc+0xa2
00000000`1969f360 00007fff`72a6b5cf : 00000000`012dfd40 00007fff`657f46d0 00000000`00200580 00000000`00200580 : user32!UserCallWinProcCheckWow+0x280
00000000`1969f4c0 00007fff`679b34e3 : 00000000`1969f570 00000000`ffffffff 00000000`04cf1b60 00000000`00000000 : user32!DispatchMessageWorker+0x19f
00000000`1969f540 00007fff`67978c4a : 00000000`04cf1b60 00000000`1969f6e9 00000000`00000002 00000000`00000000 : explorerframe!CExplorerFrame::FrameMessagePump+0xe3
00000000`1969f5d0 00007fff`679784ca : 00000000`04cf1b60 00000000`04d043f0 00000000`1007f5f0 00000000`00000000 : explorerframe!BrowserThreadProc+0x76
00000000`1969f620 00007fff`67978482 : 1041b3e2`00000001 00000000`0fe68a80 00000000`0000ea60 00007fff`70cf47d5 : explorerframe!BrowserNewThreadProc+0x3a
00000000`1969f650 00007fff`679c47ee : 00000000`00000001 00007fff`73fd4571 00000000`1969f7b0 00000000`1005eea0 : explorerframe!CExplorerTask::InternalResumeRT+0x12
00000000`1969f680 00007fff`70cf5847 : 00000000`00002cd0 00000000`00002b2c 00000000`0000000f 00000000`0000000b : explorerframe!CRunnableTask::Run+0x57e
00000000`1969f750 00007fff`70cf4567 : 00000000`0499dea0 00000000`0fe67b80 ffffffff`fffffffe 00000000`00000000 : windows_storage!CShellTask::TT_Run+0x4f
00000000`1969f780 00007fff`70d77c5f : 00000000`0499dea0 00000000`0499dea0 00000000`1969f8d9 00000000`00000000 : windows_storage!CShellTaskThread::ThreadProc+0xcb
00000000`1969f830 00007fff`73b3c8e3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : windows_storage!CShellTaskThread::s_ThreadProc+0x2f
00000000`1969f860 00007fff`71582774 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : SHCore!_WrapperThreadProc+0xe3
00000000`1969f940 00007fff`74030d51 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : kernel32!BaseThreadInitThunk+0x14
00000000`1969f970 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x21
THREAD_SHA1_HASH_MOD_FUNC: 063c29b48983480c91fd071b8c8f53e2156ff3b6
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 69135dc43bf3fdccf1b214fa3444b4c42daee17b
THREAD_SHA1_HASH_MOD: 7674f6f908a3f0f7306b7269a4b5f1bc7c621392
FAULT_INSTR_CODE: 4c038b48
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: shell32!CheckFileTypeForShellNew+32
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: shell32
IMAGE_NAME: shell32.dll
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .ecxr ; kb
FAILURE_BUCKET_ID: NULL_POINTER_READ_AFTER_CALL_c0000005_shell32.dll!CheckFileTypeForShellNew
BUCKET_ID: APPLICATION_FAULT_NULL_POINTER_READ_INVALID_POINTER_READ_AFTER_CALL_shell32!CheckFileTypeForShellNew+32
FAILURE_EXCEPTION_CODE: c0000005
FAILURE_IMAGE_NAME: shell32.dll
BUCKET_ID_IMAGE_STR: shell32.dll
FAILURE_MODULE_NAME: shell32
BUCKET_ID_MODULE_STR: shell32
FAILURE_FUNCTION_NAME: CheckFileTypeForShellNew
BUCKET_ID_FUNCTION_STR: CheckFileTypeForShellNew
BUCKET_ID_OFFSET: 32
BUCKET_ID_MODTIMEDATESTAMP: 0
BUCKET_ID_MODCHECKSUM: 146b7f9
BUCKET_ID_MODVER_STR: 10.0.15063.502
BUCKET_ID_PREFIX_STR: APPLICATION_FAULT_NULL_POINTER_READ_INVALID_POINTER_READ_AFTER_CALL_
FAILURE_PROBLEM_CLASS: APPLICATION_FAULT
FAILURE_SYMBOL_NAME: shell32.dll!CheckFileTypeForShellNew
WATSON_STAGEONE_URL: http://watson.microsoft.com/StageOne/explorer.exe/10.0.15063.447/951324bb/shell32.dll/10.0.15063.502/944613c6/c0000005/00435616.htm?Retriage=1
TARGET_TIME: 2017-09-04T01:41:00.000Z
OSBUILD: 15063
OSSERVICEPACK: 296
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 256
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt SingleUserTS
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.15063.246
ANALYSIS_SESSION_ELAPSED_TIME: 88f4
ANALYSIS_SOURCE: UM
FAILURE_ID_HASH_STRING: um:null_pointer_read_after_call_c0000005_shell32.dll!checkfiletypeforshellnew
FAILURE_ID_HASH: {0f88b991-6467-c004-1402-e5afe6fe01dd}
Followup: MachineOwner