Как говорится в заголовке, всякий раз, когда я пытаюсь открыть "новое" подменю контекстного меню, вызываемого правой кнопкой мыши в проводнике Windows 10, он блокируется, а через несколько мгновений вылетает. Эта проблема появилась только в последние пару дней, и я подозреваю, что это результат обновления Создателя. Я бы предпочел исправить эту проблему без отката обновления. У кого-нибудь есть опыт с этим вопросом?

Я пытался использовать CCleaner и другие программы, чтобы отключить все мои сторонние расширения оболочки безрезультатно. Перезагрузка в безопасном режиме также не устраняет проблему. Я также запустил sfc /scannow в командной строке с повышенными правами, но проблем не обнаружено.

Я сгенерировал файл аварийного дампа, и вот вывод, который я запускаю!проанализировать -v в WinDbg (поле текста стека опущено из-за ограничения текста):

*******************************************************************************
*                                                                             *
*                        Exception Analysis                                   *
*                                                                             *
*******************************************************************************

*** ERROR: Symbol file could not be found.  Defaulted to export symbols for sppc.dll - 
*** WARNING: Unable to verify timestamp for nvwgf2umx_cfg.dll
*** ERROR: Module load completed but symbols could not be loaded for nvwgf2umx_cfg.dll
GetUrlPageData2 (WinHttp) failed: 12002.

DUMP_CLASS: 2

DUMP_QUALIFIER: 400

CONTEXT:  (.ecxr)
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=000000001969b898 rsi=000000001025016c rdi=000000001969b8f0
rip=00007fff71a55616 rsp=000000001969b850 rbp=000000001969b929
 r8=0000000000cd3c00  r9=0000000000008000 r10=00000fffee105183
r11=2200880000020008 r12=0000000000000000 r13=0000000000000002
r14=000000001969c080 r15=000000001969c890
iopl=0         nv up ei pl nz na po nc
cs=0033  ss=002b  ds=002b  es=002b  fs=0053  gs=002b             efl=00010206
shell32!CheckFileTypeForShellNew+0x32:
00007fff`71a55616 488b03          mov     rax,qword ptr [rbx] ds:00000000`00000000=????????????????
Resetting default scope

FAULTING_IP: 
shell32!CheckFileTypeForShellNew+32
00007fff`71a55616 488b03          mov     rax,qword ptr [rbx]

EXCEPTION_RECORD:  (.exr -1)
ExceptionAddress: 00007fff71a55616 (shell32!CheckFileTypeForShellNew+0x0000000000000032)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000000
Attempt to read from address 0000000000000000

PROCESS_NAME:  explorer.exe

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000000

FOLLOWUP_IP: 
shell32!CheckFileTypeForShellNew+32
00007fff`71a55616 488b03          mov     rax,qword ptr [rbx]

READ_ADDRESS:  0000000000000000 

WATSON_BKT_PROCSTAMP:  951324bb

WATSON_BKT_PROCVER:  10.0.15063.447

PROCESS_VER_PRODUCT:  Microsoft® Windows® Operating System

WATSON_BKT_MODULE:  shell32.dll

WATSON_BKT_MODSTAMP:  944613c6

WATSON_BKT_MODOFFSET:  435616

WATSON_BKT_MODVER:  10.0.15063.502

MODULE_VER_PRODUCT:  Microsoft® Windows® Operating System

BUILD_VERSION_STRING:  10.0.15063.246 (WinBuild.160101.0800)

MODLIST_WITH_TSCHKSUM_HASH:  0c3165ab5fc02cacaf383ed161d65631e0ff52c8

MODLIST_SHA1_HASH:  c9ff83ef7d8837c392de03e5e41584a58e60ea5a

NTGLOBALFLAG:  0

APPLICATION_VERIFIER_FLAGS:  0

DUMP_FLAGS:  94

DUMP_TYPE:  1

ANALYSIS_SESSION_HOST:  ******-PC

ANALYSIS_SESSION_TIME:  09-03-2017 20:41:48.0842

ANALYSIS_VERSION: 10.0.15063.468 amd64fre

THREAD_ATTRIBUTES: 
OS_LOCALE:  ENU

PROBLEM_CLASSES: 

    ID:     [0n292]
    Type:   [@ACCESS_VIOLATION]
    Class:  Addendum
    Scope:  BUCKET_ID
    Name:   Omit
    Data:   Omit
    PID:    [Unspecified]
    TID:    [0x2b2c]
    Frame:  [0] : shell32!CheckFileTypeForShellNew

    ID:     [0n264]
    Type:   [INVALID_POINTER_READ]
    Class:  Primary
    Scope:  BUCKET_ID
    Name:   Add
    Data:   Omit
    PID:    [Unspecified]
    TID:    [0x2b2c]
    Frame:  [0] : shell32!CheckFileTypeForShellNew

    ID:     [0n279]
    Type:   [NULL_POINTER_READ]
    Class:  Primary
    Scope:  DEFAULT_BUCKET_ID (Failure Bucket ID prefix)
            BUCKET_ID
    Name:   Add
    Data:   Omit
    PID:    [0x2cd0]
    TID:    [0x2b2c]
    Frame:  [0] : shell32!CheckFileTypeForShellNew

    ID:     [0n105]
    Type:   [AFTER_CALL]
    Class:  Addendum
    Scope:  DEFAULT_BUCKET_ID (Failure Bucket ID prefix)
            BUCKET_ID
    Name:   Add
    Data:   Omit
    PID:    [0x2cd0]
    TID:    [0x2b2c]
    Frame:  [0] : shell32!CheckFileTypeForShellNew

BUGCHECK_STR:  APPLICATION_FAULT_NULL_POINTER_READ_INVALID_POINTER_READ_AFTER_CALL

DEFAULT_BUCKET_ID:  NULL_POINTER_READ_AFTER_CALL

PRIMARY_PROBLEM_CLASS:  APPLICATION_FAULT

LAST_CONTROL_TRANSFER:  from 00007fff71a565b8 to 00007fff71a55616



THREAD_SHA1_HASH_MOD_FUNC:  063c29b48983480c91fd071b8c8f53e2156ff3b6

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  69135dc43bf3fdccf1b214fa3444b4c42daee17b

THREAD_SHA1_HASH_MOD:  7674f6f908a3f0f7306b7269a4b5f1bc7c621392

FAULT_INSTR_CODE:  4c038b48

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  shell32!CheckFileTypeForShellNew+32

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: shell32

IMAGE_NAME:  shell32.dll

DEBUG_FLR_IMAGE_TIMESTAMP:  0

STACK_COMMAND:  .ecxr ; kb

FAILURE_BUCKET_ID:  NULL_POINTER_READ_AFTER_CALL_c0000005_shell32.dll!CheckFileTypeForShellNew

BUCKET_ID:  APPLICATION_FAULT_NULL_POINTER_READ_INVALID_POINTER_READ_AFTER_CALL_shell32!CheckFileTypeForShellNew+32

FAILURE_EXCEPTION_CODE:  c0000005

FAILURE_IMAGE_NAME:  shell32.dll

BUCKET_ID_IMAGE_STR:  shell32.dll

FAILURE_MODULE_NAME:  shell32

BUCKET_ID_MODULE_STR:  shell32

FAILURE_FUNCTION_NAME:  CheckFileTypeForShellNew

BUCKET_ID_FUNCTION_STR:  CheckFileTypeForShellNew

BUCKET_ID_OFFSET:  32

BUCKET_ID_MODTIMEDATESTAMP:  0

BUCKET_ID_MODCHECKSUM:  146b7f9

BUCKET_ID_MODVER_STR:  10.0.15063.502

BUCKET_ID_PREFIX_STR:  APPLICATION_FAULT_NULL_POINTER_READ_INVALID_POINTER_READ_AFTER_CALL_

FAILURE_PROBLEM_CLASS:  APPLICATION_FAULT

FAILURE_SYMBOL_NAME:  shell32.dll!CheckFileTypeForShellNew

WATSON_STAGEONE_URL:  http://watson.microsoft.com/StageOne/explorer.exe/10.0.15063.447/951324bb/shell32.dll/10.0.15063.502/944613c6/c0000005/00435616.htm?Retriage=1

TARGET_TIME:  2017-09-04T01:41:00.000Z

OSBUILD:  15063

OSSERVICEPACK:  296

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  256

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt SingleUserTS

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  160101.0800

BUILDLAB_STR:  WinBuild

BUILDOSVER_STR:  10.0.15063.246

ANALYSIS_SESSION_ELAPSED_TIME:  88f4

ANALYSIS_SOURCE:  UM

FAILURE_ID_HASH_STRING:  um:null_pointer_read_after_call_c0000005_shell32.dll!checkfiletypeforshellnew

FAILURE_ID_HASH:  {0f88b991-6467-c004-1402-e5afe6fe01dd}

Followup:     MachineOwner
*******************************************************************************
*                                                                             *
*                        Exception Analysis                                   *
*                                                                             *
*******************************************************************************

*** ERROR: Symbol file could not be found.  Defaulted to export symbols for sppc.dll - 
*** WARNING: Unable to verify timestamp for nvwgf2umx_cfg.dll
*** ERROR: Module load completed but symbols could not be loaded for nvwgf2umx_cfg.dll
GetUrlPageData2 (WinHttp) failed: 12002.

DUMP_CLASS: 2

DUMP_QUALIFIER: 400

CONTEXT:  (.ecxr)
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=000000001969b898 rsi=000000001025016c rdi=000000001969b8f0
rip=00007fff71a55616 rsp=000000001969b850 rbp=000000001969b929
 r8=0000000000cd3c00  r9=0000000000008000 r10=00000fffee105183
r11=2200880000020008 r12=0000000000000000 r13=0000000000000002
r14=000000001969c080 r15=000000001969c890
iopl=0         nv up ei pl nz na po nc
cs=0033  ss=002b  ds=002b  es=002b  fs=0053  gs=002b             efl=00010206
shell32!CheckFileTypeForShellNew+0x32:
00007fff`71a55616 488b03          mov     rax,qword ptr [rbx] ds:00000000`00000000=????????????????
Resetting default scope

FAULTING_IP: 
shell32!CheckFileTypeForShellNew+32
00007fff`71a55616 488b03          mov     rax,qword ptr [rbx]

EXCEPTION_RECORD:  (.exr -1)
ExceptionAddress: 00007fff71a55616 (shell32!CheckFileTypeForShellNew+0x0000000000000032)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000000
Attempt to read from address 0000000000000000

PROCESS_NAME:  explorer.exe

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000000

FOLLOWUP_IP: 
shell32!CheckFileTypeForShellNew+32
00007fff`71a55616 488b03          mov     rax,qword ptr [rbx]

READ_ADDRESS:  0000000000000000 

WATSON_BKT_PROCSTAMP:  951324bb

WATSON_BKT_PROCVER:  10.0.15063.447

PROCESS_VER_PRODUCT:  Microsoft® Windows® Operating System

WATSON_BKT_MODULE:  shell32.dll

WATSON_BKT_MODSTAMP:  944613c6

WATSON_BKT_MODOFFSET:  435616

WATSON_BKT_MODVER:  10.0.15063.502

MODULE_VER_PRODUCT:  Microsoft® Windows® Operating System

BUILD_VERSION_STRING:  10.0.15063.246 (WinBuild.160101.0800)

MODLIST_WITH_TSCHKSUM_HASH:  0c3165ab5fc02cacaf383ed161d65631e0ff52c8

MODLIST_SHA1_HASH:  c9ff83ef7d8837c392de03e5e41584a58e60ea5a

NTGLOBALFLAG:  0

APPLICATION_VERIFIER_FLAGS:  0

DUMP_FLAGS:  94

DUMP_TYPE:  1

ANALYSIS_SESSION_HOST:  WESTON-PC

ANALYSIS_SESSION_TIME:  09-03-2017 20:41:48.0842

ANALYSIS_VERSION: 10.0.15063.468 amd64fre

THREAD_ATTRIBUTES: 
OS_LOCALE:  ENU

PROBLEM_CLASSES: 

    ID:     [0n292]
    Type:   [@ACCESS_VIOLATION]
    Class:  Addendum
    Scope:  BUCKET_ID
    Name:   Omit
    Data:   Omit
    PID:    [Unspecified]
    TID:    [0x2b2c]
    Frame:  [0] : shell32!CheckFileTypeForShellNew

    ID:     [0n264]
    Type:   [INVALID_POINTER_READ]
    Class:  Primary
    Scope:  BUCKET_ID
    Name:   Add
    Data:   Omit
    PID:    [Unspecified]
    TID:    [0x2b2c]
    Frame:  [0] : shell32!CheckFileTypeForShellNew

    ID:     [0n279]
    Type:   [NULL_POINTER_READ]
    Class:  Primary
    Scope:  DEFAULT_BUCKET_ID (Failure Bucket ID prefix)
            BUCKET_ID
    Name:   Add
    Data:   Omit
    PID:    [0x2cd0]
    TID:    [0x2b2c]
    Frame:  [0] : shell32!CheckFileTypeForShellNew

    ID:     [0n105]
    Type:   [AFTER_CALL]
    Class:  Addendum
    Scope:  DEFAULT_BUCKET_ID (Failure Bucket ID prefix)
            BUCKET_ID
    Name:   Add
    Data:   Omit
    PID:    [0x2cd0]
    TID:    [0x2b2c]
    Frame:  [0] : shell32!CheckFileTypeForShellNew

BUGCHECK_STR:  APPLICATION_FAULT_NULL_POINTER_READ_INVALID_POINTER_READ_AFTER_CALL

DEFAULT_BUCKET_ID:  NULL_POINTER_READ_AFTER_CALL

PRIMARY_PROBLEM_CLASS:  APPLICATION_FAULT

LAST_CONTROL_TRANSFER:  from 00007fff71a565b8 to 00007fff71a55616

STACK_TEXT:  
00000000`1969b850 00007fff`71a565b8 : 00000000`00000000 00000000`00000000 00000000`00000000 00007fff`73e4ac20 : shell32!CheckFileTypeForShellNew+0x32
00000000`1969b8c0 00007fff`71a5676d : 00000000`1025016c 00000000`1969ba90 00007fff`71b73448 00000000`1709ae80 : shell32!GetShellNewFileTypeAndFTAFromStateRepository+0x2d0
00000000`1969b990 00007fff`71a5b2f5 : 00000000`00000000 00000000`1969c1f0 00000000`00001f52 00000000`00001f52 : shell32!GetShellNewInfoFromStateRepository+0x111
00000000`1969c0f0 00007fff`71a56df3 : 00000000`0000000d 00000000`00000000 00000000`00000000 00000000`00510295 : shell32!CNewMenu::_InitMenuPopup+0x1cd
00000000`1969ca90 00007fff`718202a6 : 00000000`173f5000 00000000`00000008 00000000`0000000d 00000000`00000000 : shell32!CNewMenu::HandleMenuMsg2+0x23
00000000`1969cac0 00007fff`71a956d7 : 00000000`80004005 00000000`1969cb90 00000000`1969cad8 00000000`057c6260 : shell32!CDefFolderMenu::HandleMenuMsg2+0x126
00000000`1969cb70 00007fff`71529c38 : 00000000`80004005 00000000`00000117 00000000`00000000 00007fff`73ff0f20 : shell32!CContextMenuOnContextMenuArray::HandleMenuMsg2+0x177
00000000`1969cc10 00007fff`717f25f3 : 00000000`ffffffff 00000000`1969cd79 00000000`00510295 00000000`00000000 : shlwapi!SHForwardContextMenuMsg+0x78
00000000`1969cca0 00007fff`717f731e : 00000000`0000000d 00000000`1969cd79 00000000`00510295 00000000`10291e40 : shell32!CDefView::_ForwardMenuMessages+0x97
00000000`1969cce0 00007fff`717f7530 : 00000000`000d01ee 00000000`01303270 00000000`00000121 00000000`0000000d : shell32!CDefView::_OnInitMenuPopup+0x2ee
00000000`1969cde0 00007fff`717829c6 : 00000000`00000002 00000000`00000000 00000000`10291e40 00000000`002b03ae : shell32!CDefView::_OnMenuMessage+0xe4
00000000`1969ce80 00007fff`716b7536 : 00000000`00000001 00000000`0000000d 00000000`002b03ae 00000000`00000001 : shell32!CDefView::WndProc+0xc781e
00000000`1969cf90 00007fff`72a6bc50 : 00000000`00000001 00000000`00000001 00000000`00510295 00000000`00000001 : shell32!CDefView::s_WndProc+0x56
00000000`1969cfe0 00007fff`72a6b80b : 00000000`002b03ae 00007fff`716b74e0 00000000`002b03ae 00000000`00000117 : user32!UserCallWinProcCheckWow+0x280
00000000`1969d140 00007fff`4ccd01e5 : 00000000`10325400 00000000`0000000d 00000000`00000000 00000000`00000000 : user32!CallWindowProcW+0x8b
00000000`1969d190 00007fff`649612d8 : 00002520`802d14c5 00000000`00000000 00000000`002b03ae 00000000`00000117 : duser!WndBridge::RawWndProc+0xa5
00000000`1969d210 00007fff`72a6bc50 : 00000000`80000022 00000000`1969d2c8 00000000`00000001 00000000`00030000 : atlthunk!AtlThunk_DataToCode+0xffffffff`ffffe2c8
00000000`1969d250 00007fff`72a6b94c : 00000000`40000388 00007fff`649612c0 00000000`002b03ae 00000000`80000000 : user32!UserCallWinProcCheckWow+0x280
00000000`1969d3b0 00007fff`72a811f3 : 00000000`00000000 00000000`00000000 00000000`00510295 00000000`00000000 : user32!DispatchClientMessage+0x9c
00000000`1969d410 00007fff`740690a4 : 00000000`00000000 00007fff`740690a4 00007fff`70ba9a84 00007fff`740690a4 : user32!_fnDWORD+0x33
00000000`1969d470 00007fff`70ba9a84 : 00007fff`72ace96a 00000000`00000028 00007fff`72a6f1e4 00000000`00000000 : ntdll!KiUserCallbackDispatcherContinue
00000000`1969d4f8 00007fff`72ace96a : 00000000`00000028 00007fff`72a6f1e4 00000000`00000000 00000000`00000000 : win32u!NtUserTrackPopupMenuEx+0x14
00000000`1969d500 00007fff`717263b1 : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : user32!TrackPopupMenu+0x1a
00000000`1969d540 00007fff`717e9220 : 00000000`1969da90 00000000`1969db08 00000000`10291f88 00007fff`7081bacf : shell32!CDefView::_DoContextMenuPopup+0x521
00000000`1969da80 00007fff`67aa9fd8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`1969dff8 : shell32!CDefView::OnBackgroundContextMenu+0x1c0
00000000`1969db30 00007fff`67aa6d77 : 00000000`00a06000 00000000`1969ddb1 00000000`10291e40 00000000`00000000 : explorerframe!UIItemsView::ShowContextMenu+0x2dc
00000000`1969dc30 00007fff`717f1bec : 00000000`00000000 00007fff`67aa679a 00000125`00000067 00000000`00000002 : explorerframe!CItemsView::ShowContextMenu+0x17
00000000`1969dc60 00007fff`717f6ffe : 00000125`00000067 00000000`10291e40 00000000`10291e40 00000000`00000000 : shell32!CDefView::_DoContextMenu+0x88
00000000`1969dca0 00007fff`7178295f : 00000000`1969de0c 00000000`00000000 00000000`00200580 00000000`1969ded4 : shell32!CDefView::_OnContextMenu+0xd2
00000000`1969dd00 00007fff`716b7536 : 00000000`00000001 00000000`02bc03ff 00000000`002b03ae 00000000`1969e250 : shell32!CDefView::WndProc+0xc77b7
00000000`1969de10 00007fff`72a6bc50 : 00000000`00000001 00000000`00002406 00000000`00200580 00000000`00000000 : shell32!CDefView::s_WndProc+0x56
00000000`1969de60 00007fff`72a6b80b : 00000000`002b03ae 00007fff`716b74e0 00000000`002b03ae 00000000`0000007b : user32!UserCallWinProcCheckWow+0x280
00000000`1969dfc0 00007fff`4ccd01e5 : 00000000`10325400 00000000`02bc03ff 00000000`00000000 00000000`010f0000 : user32!CallWindowProcW+0x8b
00000000`1969e010 00007fff`649612d8 : 00000000`0fc678c0 00000000`00000000 00000000`002b03ae 00000000`0000007b : duser!WndBridge::RawWndProc+0xa5
00000000`1969e090 00007fff`72a6bc50 : 00000000`80000022 00000000`00000004 00000009`00000000 00000000`00000000 : atlthunk!AtlThunk_DataToCode+0xffffffff`ffffe2c8
00000000`1969e0d0 00007fff`72a6b94c : 00000000`00000388 00007fff`649612c0 00000000`002b03ae 00000000`80000000 : user32!UserCallWinProcCheckWow+0x280
00000000`1969e230 00007fff`72a811f3 : 00000000`00000000 00000000`00000000 00000000`00200580 00000000`00000000 : user32!DispatchClientMessage+0x9c
00000000`1969e290 00007fff`740690a4 : 00000000`1969e698 00007fff`7081d607 00000000`c0000034 00007fff`73feaf7e : user32!_fnDWORD+0x33
00000000`1969e2f0 00007fff`70ba1164 : 00007fff`72a69eaa 00000000`00000000 00000000`00de48a0 00000000`00000000 : ntdll!KiUserCallbackDispatcherContinue
00000000`1969e378 00007fff`72a69eaa : 00000000`00000000 00000000`00de48a0 00000000`00000000 00000000`1969e7d0 : win32u!NtUserMessageCall+0x14
00000000`1969e380 00007fff`72a696d2 : 00000000`0000007b 00000000`1969e5b0 00000000`00000000 00000000`012dfd40 : user32!RealDefWindowProcWorker+0x1ba
00000000`1969e470 00007fff`6eb2f599 : 00007fff`72a69680 00000000`02bc03ff 00000000`0000007b 00000000`00000000 : user32!RealDefWindowProcW+0x52
00000000`1969e4b0 00007fff`6eb2e3f1 : 00000000`00200580 00000000`00000000 00000000`00000000 00000000`02bc03ff : uxtheme!_ThemeDefWindowProc+0x559
00000000`1969e630 00007fff`72a69be7 : 00000000`00000000 00000000`00000000 00000000`1969e6e0 00000000`00000000 : uxtheme!ThemeDefWindowProcW+0x11
00000000`1969e670 00007fff`67a0e743 : 00000000`0000007b 00000000`00000000 00000000`02bc03ff 00000000`00000000 : user32!DefWindowProcW+0x1b7
00000000`1969e6e0 00007fff`4f97939d : 00000000`00200580 00000000`00000000 00000000`02bc03ff 00000000`1969e9e0 : explorerframe!UIItemsView::WndProc+0x78263
00000000`1969e940 00007fff`72a6bc50 : 00000000`00000001 00000000`00000000 00000000`00000000 00007fff`73fe87ef : dui70!DirectUI::HWNDElement::StaticWndProc+0x4d
00000000`1969e980 00007fff`72a6b80b : 00000000`00200580 00007fff`4f979350 00000000`00200580 00000000`0000007b : user32!UserCallWinProcCheckWow+0x280
00000000`1969eae0 00007fff`4ccdc37a : 00000000`00200580 00000000`00000000 00000000`02bc03ff 00000000`ffffff80 : user32!CallWindowProcW+0x8b
00000000`1969eb30 00007fff`72a6bc50 : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`80000022 : duser!ExtraInfoWndProc+0x8a
00000000`1969eb80 00007fff`72a6b80b : 00000000`00200580 00007fff`4ccdc2f0 00000000`00200580 00000000`0000007b : user32!UserCallWinProcCheckWow+0x280
00000000`1969ece0 00007fff`657f48d0 : 00000000`1969f310 00000000`02bc03ff 00000000`00000000 00007fff`4ccd7590 : user32!CallWindowProcW+0x8b
00000000`1969ed30 00007fff`657f46a7 : 00000000`02bc03ff 00000000`00200580 00000000`0000007b 00000011`00000001 : comctl32!CallNextSubclassProc+0xb0
00000000`1969ee00 00007fff`679961b7 : 00000000`0000007b 00000000`02bc03ff 00000000`00000000 00000000`00000000 : comctl32!DefSubclassProc+0x77
00000000`1969ee50 00007fff`67993656 : 00000000`00000000 00000000`00000003 00040001`00000001 00000000`10291e40 : explorerframe!UIItemsView::_UIItemsViewSubclassProc+0x77
00000000`1969ef30 00007fff`657f4929 : 00000000`1969f268 00007fff`489dcc60 00000000`00000000 0000b844`ea009a52 : explorerframe!UIItemsView::s_UIItemsViewSubclassProc+0x26
00000000`1969ef70 00007fff`657f46a7 : 00000000`02bc03ff 00000000`00200580 00000000`0000007b 00000000`00000000 : comctl32!CallNextSubclassProc+0x109
00000000`1969f040 00007fff`6797cd57 : 00000000`0000007b 00000000`00000000 00000000`00200580 00007fff`48a6c3b9 : comctl32!DefSubclassProc+0x77
00000000`1969f090 00007fff`6797cc96 : 00000000`1969f310 00000000`00000001 00000000`00000000 00000000`00000001 : explorerframe!CToolTipManager::_PropertyToolTipSubclassProc+0x67
00000000`1969f0e0 00007fff`657f4929 : 00000000`00a06000 00007fff`72a73bb2 00000000`00000000 00000000`00000000 : explorerframe!CToolTipManager::s_PropertyToolTipSubclassProc+0x26
00000000`1969f120 00007fff`657f49ea : 00000000`00000001 00000000`00000000 00000000`1969f310 00000000`00000000 : comctl32!CallNextSubclassProc+0x109
00000000`1969f1f0 00007fff`657f4772 : 00000000`00000001 00000000`00200580 00000000`00000000 00000000`00000113 : comctl32!CallNextSubclassProc+0x1ca
00000000`1969f2c0 00007fff`72a6bc50 : 00000000`80000022 00007fff`4ccd1442 00000000`063607c0 00000000`1969f428 : comctl32!MasterSubclassProc+0xa2
00000000`1969f360 00007fff`72a6b5cf : 00000000`012dfd40 00007fff`657f46d0 00000000`00200580 00000000`00200580 : user32!UserCallWinProcCheckWow+0x280
00000000`1969f4c0 00007fff`679b34e3 : 00000000`1969f570 00000000`ffffffff 00000000`04cf1b60 00000000`00000000 : user32!DispatchMessageWorker+0x19f
00000000`1969f540 00007fff`67978c4a : 00000000`04cf1b60 00000000`1969f6e9 00000000`00000002 00000000`00000000 : explorerframe!CExplorerFrame::FrameMessagePump+0xe3
00000000`1969f5d0 00007fff`679784ca : 00000000`04cf1b60 00000000`04d043f0 00000000`1007f5f0 00000000`00000000 : explorerframe!BrowserThreadProc+0x76
00000000`1969f620 00007fff`67978482 : 1041b3e2`00000001 00000000`0fe68a80 00000000`0000ea60 00007fff`70cf47d5 : explorerframe!BrowserNewThreadProc+0x3a
00000000`1969f650 00007fff`679c47ee : 00000000`00000001 00007fff`73fd4571 00000000`1969f7b0 00000000`1005eea0 : explorerframe!CExplorerTask::InternalResumeRT+0x12
00000000`1969f680 00007fff`70cf5847 : 00000000`00002cd0 00000000`00002b2c 00000000`0000000f 00000000`0000000b : explorerframe!CRunnableTask::Run+0x57e
00000000`1969f750 00007fff`70cf4567 : 00000000`0499dea0 00000000`0fe67b80 ffffffff`fffffffe 00000000`00000000 : windows_storage!CShellTask::TT_Run+0x4f
00000000`1969f780 00007fff`70d77c5f : 00000000`0499dea0 00000000`0499dea0 00000000`1969f8d9 00000000`00000000 : windows_storage!CShellTaskThread::ThreadProc+0xcb
00000000`1969f830 00007fff`73b3c8e3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : windows_storage!CShellTaskThread::s_ThreadProc+0x2f
00000000`1969f860 00007fff`71582774 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : SHCore!_WrapperThreadProc+0xe3
00000000`1969f940 00007fff`74030d51 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : kernel32!BaseThreadInitThunk+0x14
00000000`1969f970 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x21


THREAD_SHA1_HASH_MOD_FUNC:  063c29b48983480c91fd071b8c8f53e2156ff3b6

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  69135dc43bf3fdccf1b214fa3444b4c42daee17b

THREAD_SHA1_HASH_MOD:  7674f6f908a3f0f7306b7269a4b5f1bc7c621392

FAULT_INSTR_CODE:  4c038b48

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  shell32!CheckFileTypeForShellNew+32

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: shell32

IMAGE_NAME:  shell32.dll

DEBUG_FLR_IMAGE_TIMESTAMP:  0

STACK_COMMAND:  .ecxr ; kb

FAILURE_BUCKET_ID:  NULL_POINTER_READ_AFTER_CALL_c0000005_shell32.dll!CheckFileTypeForShellNew

BUCKET_ID:  APPLICATION_FAULT_NULL_POINTER_READ_INVALID_POINTER_READ_AFTER_CALL_shell32!CheckFileTypeForShellNew+32

FAILURE_EXCEPTION_CODE:  c0000005

FAILURE_IMAGE_NAME:  shell32.dll

BUCKET_ID_IMAGE_STR:  shell32.dll

FAILURE_MODULE_NAME:  shell32

BUCKET_ID_MODULE_STR:  shell32

FAILURE_FUNCTION_NAME:  CheckFileTypeForShellNew

BUCKET_ID_FUNCTION_STR:  CheckFileTypeForShellNew

BUCKET_ID_OFFSET:  32

BUCKET_ID_MODTIMEDATESTAMP:  0

BUCKET_ID_MODCHECKSUM:  146b7f9

BUCKET_ID_MODVER_STR:  10.0.15063.502

BUCKET_ID_PREFIX_STR:  APPLICATION_FAULT_NULL_POINTER_READ_INVALID_POINTER_READ_AFTER_CALL_

FAILURE_PROBLEM_CLASS:  APPLICATION_FAULT

FAILURE_SYMBOL_NAME:  shell32.dll!CheckFileTypeForShellNew

WATSON_STAGEONE_URL:  http://watson.microsoft.com/StageOne/explorer.exe/10.0.15063.447/951324bb/shell32.dll/10.0.15063.502/944613c6/c0000005/00435616.htm?Retriage=1

TARGET_TIME:  2017-09-04T01:41:00.000Z

OSBUILD:  15063

OSSERVICEPACK:  296

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  256

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt SingleUserTS

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  160101.0800

BUILDLAB_STR:  WinBuild

BUILDOSVER_STR:  10.0.15063.246

ANALYSIS_SESSION_ELAPSED_TIME:  88f4

ANALYSIS_SOURCE:  UM

FAILURE_ID_HASH_STRING:  um:null_pointer_read_after_call_c0000005_shell32.dll!checkfiletypeforshellnew

FAILURE_ID_HASH:  {0f88b991-6467-c004-1402-e5afe6fe01dd}

Followup:     MachineOwner

0