EXPLORER.EXE ulega losowej awarii - Log DUMP


(Djzon) #1

Pomoc w diagnozie problemu z EXPLORER.EXE

Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64Copyright (c) 
Microsoft Corporation. All rights reserved.Loading Dump File 
[C:\LocalDumps\explorer.exe.12236.dmp]User Mini Dump File with Full Memory: 
Only application data is availableSymbol search path is: 
SRV*C:\Symbols*http://msdl.microsoft.com/download/symbolsExecutable search 
path is:Windows 7 Version 7601 (Service Pack 1) MP (4 procs) Free 
x64Product: WinNt, suite: SingleUserTSMachine Name:Debug session 
time: Wed Oct 29 17:42:38.000 2014 (UTC + 1:00)System Uptime: 0 days 
8:44:35.281Process Uptime: 0 days 
1:47:14.000...............................................................................................................................................................................................Loading 
unloaded module 
list................................................................This 
dump file has an exception of interest stored in it.The stored exception 
information can be accessed via .ecxr.(2fcc.5b64): Access violation - code 
c0000005 (first/second chance not 
available)ntdll!ZwWaitForMultipleObjects+0xa:00000000`77a9186a c3 
ret0:022> !analyze 
-v ******************************************************************************** 
**Exception Analysis** 
*********************************************************************************** 
ERROR: Module load completed but symbols could not be loaded for 
a2hooks64.dllGetPageUrlData failed, server returned HTTP status 404URL 
requested: 
http://watson.microsoft.com/StageOne/explorer_exe/6_1_7601_17567/4d672ee4/unknown/0_0_0_0/bbbbbbb4/c0000005/06b60fd8.htm?Retriage=1FAULTING_IP:+43600000000`06b60fd8 
 
?EXCEPTION_RECORD: 
ffffffffffffffff -- (.exr 0xffffffffffffffff)ExceptionAddress: 
0000000006b60fd8ExceptionCode: c0000005 (Access 
violation)ExceptionFlags: 00000000NumberParameters: 2Parameter[0]: 
0000000000000008Parameter[1]: 0000000006b60fd8Attempt to execute 
non-executable address 0000000006b60fd8PROCESS_NAME: 
explorer.exeERROR_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod %08lx 
odwoEXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod %08lx 
odwoEXCEPTION_PARAMETER1: 0000000000000008EXCEPTION_PARAMETER2: 
0000000006b60fd8WRITE_ADDRESS: 
0000000006b60fd8FOLLOWUP_IP:EXPLORERFRAME!CExplorerFrame::FrameMessagePump+436000007fe`f33404b0 
eb00 jmp EXPLORERFRAME!CExplorerFrame::FrameMessagePump+0x468 
(000007fe`f33404b2)FAILED_INSTRUCTION_ADDRESS:+43600000000`06b60fd8 
 
?MOD_LIST: 
<ANALYSIS/>NTGLOBALFLAG: 0APPLICATION_VERIFIER_FLAGS: 
0FAULTING_THREAD: 0000000000005b64BUGCHECK_STR: 
APPLICATION_FAULT_SOFTWARE_NX_FAULT_INVALIDPRIMARY_PROBLEM_CLASS: 
SOFTWARE_NX_FAULT_INVALIDDEFAULT_BUCKET_ID: 
SOFTWARE_NX_FAULT_INVALIDLAST_CONTROL_TRANSFER: from 0000000077839bd1 to 
0000000006b60fd8STACK_TEXT:00000000`060ff508 00000000`77839bd1 : 
00000000`00000001 00000000`00000000 00000000`00000001 00000000`00000030 : 
0x6b60fd800000000`060ff510 00000000`778398da : 00000000`060ff680 
00000000`06b60fd8 000007fe`f347b550 00000000`00831450 : 
user32!UserCallWinProcCheckWow+0x1ad00000000`060ff5d0 000007fe`f33404b0 : 
00000000`054d7104 00000000`054d7104 00000000`06b60fd8 00000000`00000000 : 
user32!DispatchMessageWorker+0x3b500000000`060ff650 000007fe`f3344925 : 
00000000`054d7190 00000000`00000008 00000000`00000000 00000000`00000000 : 
EXPLORERFRAME!CExplorerFrame::FrameMessagePump+0x43600000000`060ff6d0 
000007fe`f334509b : 00000000`054d7190 00000000`04f12340 00000000`00000000 
00000000`00000000 : EXPLORERFRAME!BrowserThreadProc+0x18000000000`060ff750 
000007fe`f3345032 : 11835a18`00000001 00000000`08343050 00000000`7fffffff 
000007fe`fd992d40 : EXPLORERFRAME!BrowserNewThreadProc+0x5300000000`060ff780 
000007fe`f333be50 : 00000000`08342a50 00000000`051ed120 00000000`00000000 
000007fe`fe65f07c : 
EXPLORERFRAME!CExplorerTask::InternalResumeRT+0x1200000000`060ff7b0 
000007fe`fe65efcb : 80000000`01000000 00000000`060ff840 00000000`08342a50 
00000000`0000000a : EXPLORERFRAME!CRunnableTask::Run+0xda00000000`060ff7e0 
000007fe`fe662b56 : 00000000`08342a50 00000000`00000000 00000000`08342a50 
00000000`00000002 : shell32!CShellTask::TT_Run+0x12400000000`060ff810 
000007fe`fe662cb2 : 00000000`0830be70 00000000`0830be70 00000000`00000000 
00000000`00000010 : 
shell32!CShellTaskThread::ThreadProc+0x1d200000000`060ff8b0 
000007fe`ff7cc71e : 00000000`00000000 00000000`00000000 00000000`00000000 
00000000`00000000 : 
shell32!CShellTaskThread::s_ThreadProc+0x2200000000`060ff8e0 
00000000`779359ed : 00000000`00000000 00000000`00000000 00000000`00000000 
00000000`00000000 : shlwapi!WrapperThreadProc+0x19b00000000`060ff9e0 
00000000`77a6c541 : 00000000`00000000 00000000`00000000 00000000`00000000 
00000000`00000000 : kernel32!BaseThreadInitThunk+0xd00000000`060ffa10 
00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 
00000000`00000000 : ntdll!RtlUserThreadStart+0x1dSYMBOL_STACK_INDEX: 
3SYMBOL_NAME: 
explorerframe!CExplorerFrame::FrameMessagePump+436FOLLOWUP_NAME: 
MachineOwnerMODULE_NAME: EXPLORERFRAMEIMAGE_NAME: 
EXPLORERFRAME.dllDEBUG_FLR_IMAGE_TIMESTAMP: 
4ce7c6a8STACK_COMMAND: ~22s; .ecxr ; kbFAILURE_BUCKET_ID: 
SOFTWARE_NX_FAULT_INVALID_c0000005_EXPLORERFRAME.dll!CExplorerFrame::FrameMessagePumpBUCKET_ID: 
X64_APPLICATION_FAULT_SOFTWARE_NX_FAULT_INVALID_BAD_IP_explorerframe!CExplorerFrame::FrameMessagePump+436WATSON_STAGEONE_URL: 
http://watson.microsoft.com/StageOne/explorer_exe/6_1_7601_17567/4d672ee4/unknown/0_0_0_0/bbbbbbb4/c0000005/06b60fd8.htm?Retriage=1Followup: 
MachineOwner---------