Tordex Community
TLB 4.2.2 Vista 64 explorer.exe crashes - Printable Version

+- Tordex Community (http://forum.tordex.com)
+-- Forum: True Launch Bar (http://forum.tordex.com/forum-3.html)
+--- Forum: Bugs (http://forum.tordex.com/forum-10.html)
+--- Thread: TLB 4.2.2 Vista 64 explorer.exe crashes (/thread-2882.html)

Pages: 1 2


TLB 4.2.2 Vista 64 explorer.exe crashes - CrazyCoder - 09-23-2007

I've read similar topics. I don't have Mail Monitor plug-in installed, the only plug-in I have is Spacer. This problem also happens to my friend on Vista 32, so I don't think that it's Vista 64 specific.

Explorer.exe crashes once a week or more frequently. I've disabled all the context menus in the TLB settings, didn't help.

See the crash dump:

Code:
Microsoft (R) Windows Debugger  Version 6.6.0007.5
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Serge\AppData\Local\Temp\WER9AD2.tmp\minidump.mdmp]
User Mini Dump File: Only registers, stack and portions of memory are available

Windows Vista Version 6000 MP (4 procs) Free x64
Product: WinNt, suite: SingleUserTS
Debug session time: Sun Sep 23 17:04:03.000 2007 (GMT+4)
System Uptime: 1 days 13:28:23.575
Process Uptime: 1 days 13:27:15.000
Symbol search path is: srv*d:\dev\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
..................................................................................................................................................................
Loading unloaded module list
................................................................
This dump file has an exception of interest stored in it.
The stored exception information can be accessed via .ecxr.
(4e4.aec): Access violation - code c0000005 (first/second chance not available)
00000000`051ac483 4a8b1409        mov     rdx,qword ptr [rcx+r9] ds:000007ff`00a001a2=????????????????
0:033> !analyze -v
*******************************************************************************
*                                                                             *
*                        Exception Analysis                                   *
*                                                                             *
*******************************************************************************

*** ERROR: Symbol file could not be found.  Defaulted to export symbols for tlb.dll -

FAULTING_IP:
+51ac483
00000000`051ac483 4a8b1409        mov     rdx,qword ptr [rcx+r9]

EXCEPTION_RECORD:  ffffffffffffffff -- (.exr ffffffffffffffff)
ExceptionAddress: 00000000051ac483
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 000007ff00a001a2
Attempt to read from address 000007ff00a001a2

DEFAULT_BUCKET_ID:  STACK_CORRUPTION

PROCESS_NAME:  explorer.exe

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

READ_ADDRESS:  000007ff00a001a2

BUGCHECK_STR:  ACCESS_VIOLATION

IP_ON_HEAP:  0000000005178676
The fault address in not in any loaded module, please check your build's rebase
log at <releasedir>\bin\build_logs\timebuild\ntrebase.log for module which may
contain the address if it were loaded.

FRAME ONE INVALID: 1800200000000a

LAST_CONTROL_TRANSFER:  from 0000000005178676 to 00000000051ac483

STACK_TEXT:  
00000000`099fee68 00000000`05178676 : 00000000`00000000 00000000`00000000 6365446c`74520000 746e696f`5065646f : 0x51ac483
00000000`099fee70 00000000`00000000 : 00000000`00000000 6365446c`74520000 746e696f`5065646f 00000000`00000000 : 0x5178676
00000000`099fee78 00000000`00000000 : 6365446c`74520000 746e696f`5065646f 00000000`00000000 00000000`00000000 : 0x0
00000000`099fee80 6365446c`74520000 : 746e696f`5065646f 00000000`00000000 00000000`00000000 00000000`099fef40 : 0x0
00000000`099fee88 746e696f`5065646f : 00000000`00000000 00000000`00000000 00000000`099fef40 00000000`00000000 : 0x6365446c`74520000
00000000`099fee90 00000000`00000000 : 00000000`00000000 00000000`099fef40 00000000`00000000 00000000`00000000 : 0x746e696f`5065646f
00000000`099fee98 00000000`00000000 : 00000000`099fef40 00000000`00000000 00000000`00000000 00000263`00000132 : 0x0
00000000`099feea0 00000000`099fef40 : 00000000`00000000 00000000`00000000 00000263`00000132 00000000`000001ca : 0x0
00000000`099feea8 00000000`00000000 : 00000000`00000000 00000263`00000132 00000000`000001ca 00000000`00000000 : 0x99fef40
00000000`099feeb0 00000000`00000000 : 00000263`00000132 00000000`000001ca 00000000`00000000 00000000`099ff078 : 0x0
00000000`099feeb8 00000263`00000132 : 00000000`000001ca 00000000`00000000 00000000`099ff078 00000001`801c351b : 0x0
00000000`099feec0 00000000`000001ca : 00000000`00000000 00000000`099ff078 00000001`801c351b 00000000`099fef40 : 0x263`00000132
00000000`099feec8 00000000`00000000 : 00000000`099ff078 00000001`801c351b 00000000`099fef40 00000000`0517e204 : 0x1ca
00000000`099feed0 00000000`099ff078 : 00000001`801c351b 00000000`099fef40 00000000`0517e204 00000000`099fef40 : 0x0
00000000`099feed8 00000001`801c351b : 00000000`099fef40 00000000`0517e204 00000000`099fef40 00000000`00000000 : 0x99ff078
00000000`099feee0 00000000`099fef40 : 00000000`0517e204 00000000`099fef40 00000000`00000000 00000000`099fef68 : tlb!SelfInstall+0x13ecbb
00000000`099feee8 00000000`0517e204 : 00000000`099fef40 00000000`00000000 00000000`099fef68 00000000`77b73fe6 : 0x99fef40
00000000`099feef0 00000000`099fef40 : 00000000`00000000 00000000`099fef68 00000000`77b73fe6 00000000`00000000 : 0x517e204
00000000`099feef8 00000000`00000000 : 00000000`099fef68 00000000`77b73fe6 00000000`00000000 00000000`05178342 : 0x99fef40
00000000`099fef00 00000000`099fef68 : 00000000`77b73fe6 00000000`00000000 00000000`05178342 00000000`05178370 : 0x0
00000000`099fef08 00000000`77b73fe6 : 00000000`00000000 00000000`05178342 00000000`05178370 00000000`099fef40 : 0x99fef68
00000000`099fef10 00000000`051dfd80 : 00000000`051dfb98 00000000`000002d8 65636f72`50746553 6e696b72`6f577373 : ntdll!LdrpSnapThunk+0x2c3
00000000`099ff010 00000000`051dfb98 : 00000000`000002d8 65636f72`50746553 6e696b72`6f577373 657a6953`74655367 : 0x51dfd80
00000000`099ff018 00000000`000002d8 : 65636f72`50746553 6e696b72`6f577373 657a6953`74655367 00000000`00009500 : 0x51dfb98
00000000`099ff020 65636f72`50746553 : 6e696b72`6f577373 657a6953`74655367 00000000`00009500 00000000`030cf800 : 0x2d8
00000000`099ff028 6e696b72`6f577373 : 657a6953`74655367 00000000`00009500 00000000`030cf800 00000000`00000000 : 0x65636f72`50746553
00000000`099ff030 657a6953`74655367 : 00000000`00009500 00000000`030cf800 00000000`00000000 00000000`099ff0a8 : 0x6e696b72`6f577373
00000000`099ff038 00000000`00009500 : 00000000`030cf800 00000000`00000000 00000000`099ff0a8 00000000`00000000 : 0x657a6953`74655367
00000000`099ff040 00000000`030cf800 : 00000000`00000000 00000000`099ff0a8 00000000`00000000 00000000`059fdd80 : 0x9500
00000000`099ff048 00000000`00000000 : 00000000`099ff0a8 00000000`00000000 00000000`059fdd80 00000000`77b93417 : 0x30cf800
00000000`099ff050 00000000`099ff0a8 : 00000000`00000000 00000000`059fdd80 00000000`77b93417 00000000`77a61b70 : 0x0
00000000`099ff058 00000000`00000000 : 00000000`059fdd80 00000000`77b93417 00000000`77a61b70 00000000`77b83cd0 : 0x99ff0a8
00000000`099ff060 00000000`059fdd80 : 00000000`77b93417 00000000`77a61b70 00000000`77b83cd0 00000000`00009593 : 0x0
00000000`099ff068 00000000`77b93417 : 00000000`77a61b70 00000000`77b83cd0 00000000`00009593 00000000`099ff208 : 0x59fdd80
00000000`099ff070 00000000`77a28739 : 000007ff`fffdd258 00000000`049fe2b0 00000000`00000000 00000000`00000018 : ntdll!RtlAnsiStringToUnicodeString+0x83
00000000`099ff0d0 00000000`0517d474 : 00000000`77a00000 00000000`000002d8 00000000`00000000 0000fca8`7bbc2fdc : kernel32!GetModuleHandleA+0x75
00000000`099ff110 00000000`77a00000 : 00000000`000002d8 00000000`00000000 0000fca8`7bbc2fdc 00000000`7e5b6882 : 0x517d474
00000000`099ff118 00000000`000002d8 : 00000000`00000000 0000fca8`7bbc2fdc 00000000`7e5b6882 00000001`800e375e : kernel32!_imp_memcpy <PERF> (kernel32+0x0)
00000000`099ff120 00000000`00000000 : 0000fca8`7bbc2fdc 00000000`7e5b6882 00000001`800e375e 00000000`77a00000 : 0x2d8
00000000`099ff128 0000fca8`7bbc2fdc : 00000000`7e5b6882 00000001`800e375e 00000000`77a00000 00000001`80114478 : 0x0
00000000`099ff130 00000000`7e5b6882 : 00000001`800e375e 00000000`77a00000 00000001`80114478 00000000`00000000 : 0xfca8`7bbc2fdc
00000000`099ff138 00000001`800e375e : 00000000`77a00000 00000001`80114478 00000000`00000000 00000001`80000000 : 0x7e5b6882
00000000`099ff140 00000000`77a00000 : 00000001`80114478 00000000`00000000 00000001`80000000 00000000`00000003 : tlb!SelfInstall+0x5eefe
00000000`099ff148 00000001`80114478 : 00000000`00000000 00000001`80000000 00000000`00000003 00000000`77c4f9a0 : kernel32!_imp_memcpy <PERF> (kernel32+0x0)
00000000`099ff150 00000000`00000000 : 00000001`80000000 00000000`00000003 00000000`77c4f9a0 00000001`80000000 : tlb!SelfInstall+0x8fc18
00000000`099ff158 00000001`80000000 : 00000000`00000003 00000000`77c4f9a0 00000001`80000000 00000001`800decc2 : 0x0
00000000`099ff160 00000000`00000003 : 00000000`77c4f9a0 00000001`80000000 00000001`800decc2 00000000`00000006 : tlb
00000000`099ff168 00000000`77c4f9a0 : 00000001`80000000 00000001`800decc2 00000000`00000006 00000000`059fdd80 : 0x3
00000000`099ff170 00000001`80000000 : 00000001`800decc2 00000000`00000006 00000000`059fdd80 00000000`00000000 : ntdll!PebLdr+0x20
00000000`099ff178 00000001`800decc2 : 00000000`00000006 00000000`059fdd80 00000000`00000000 00000000`00000002 : tlb
00000000`099ff180 00000000`00000006 : 00000000`059fdd80 00000000`00000000 00000000`00000002 00000000`030a7c50 : tlb!SelfInstall+0x5a462
00000000`099ff188 00000000`059fdd80 : 00000000`00000000 00000000`00000002 00000000`030a7c50 00000001`800ded73 : 0x6
00000000`099ff190 00000000`00000000 : 00000000`00000002 00000000`030a7c50 00000001`800ded73 00000001`801fcc30 : 0x59fdd80
00000000`099ff198 00000000`00000002 : 00000000`030a7c50 00000001`800ded73 00000001`801fcc30 00000000`77a38d30 : 0x0
00000000`099ff1a0 00000000`030a7c50 : 00000001`800ded73 00000001`801fcc30 00000000`77a38d30 000007ff`fffdd258 : 0x2
00000000`099ff1a8 00000001`800ded73 : 00000001`801fcc30 00000000`77a38d30 000007ff`fffdd258 00000000`000002d8 : 0x30a7c50
00000000`099ff1b0 00000001`801fcc30 : 00000000`77a38d30 000007ff`fffdd258 00000000`000002d8 00000000`00000000 : tlb!SelfInstall+0x5a513
00000000`099ff1b8 00000000`77a38d30 : 000007ff`fffdd258 00000000`000002d8 00000000`00000000 00000000`00000018 : tlb!SelfInstall+0x1783d0
00000000`099ff1c0 00000000`00000000 : 00000000`00000002 00000000`77b83cd0 00000000`05326470 00000000`00000000 : kernel32!GetProcAddress+0x60


FAULTING_THREAD:  0000000000000aec

PRIMARY_PROBLEM_CLASS:  STACK_CORRUPTION

FOLLOWUP_IP:
tlb!SelfInstall+13ecbb
00000001`801c351b eb18            jmp     tlb!SelfInstall+0x13ecd5 (00000001`801c3535)

SYMBOL_STACK_INDEX:  f

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: tlb

IMAGE_NAME:  tlb.dll

DEBUG_FLR_IMAGE_TIMESTAMP:  46e6f4f9

SYMBOL_NAME:  tlb!SelfInstall+13ecbb

STACK_COMMAND:  ~33s; .ecxr ; kb

FAILURE_BUCKET_ID:  X64_ACCESS_VIOLATION_tlb!SelfInstall+13ecbb

BUCKET_ID:  X64_ACCESS_VIOLATION_tlb!SelfInstall+13ecbb

Followup: MachineOwner
---------



- CrazyCoder - 09-23-2007

Code:
Problem signature
Problem Event Name:    APPCRASH
Application Name:    Explorer.EXE
Application Version:    6.0.6000.16386
Application Timestamp:    4549bacb
Fault Module Name:    StackHash_b8c8
Fault Module Version:    0.0.0.0
Fault Module Timestamp:    00000000
Exception Code:    c0000005
Exception Offset:    00000000051ac483
OS Version:    6.0.6000.2.0.0.256.1
Locale ID:    1049
Additional Information 1:    b8c8
Additional Information 2:    3f2f97363f2ea1f945e816e3accd71c0
Additional Information 3:    54aa
Additional Information 4:    b435683bd2af62f882b9af9c973d82eb



- Yuri Kobets - 09-26-2007

When this crash appear?


- CrazyCoder - 09-26-2007

It happens totally randomly. Even when the PC is left overnight. Explorer has crashed like about 20 times for me in the last 2 days.


- CrazyCoder - 09-30-2007

4.2 crashes in the similar way:

Code:
Microsoft (R) Windows Debugger  Version 6.6.0007.5
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Serge\AppData\Local\Temp\WER15E6.tmp\minidump.mdmp]
User Mini Dump File: Only registers, stack and portions of memory are available

Windows Vista Version 6000 MP (4 procs) Free x64
Product: WinNt, suite: SingleUserTS
Debug session time: Sun Sep 30 20:49:38.000 2007 (GMT+4)
System Uptime: 0 days 5:33:43.787
Process Uptime: 0 days 1:15:44.000
Symbol search path is: srv*d:\dev\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
...........................................................................................................................................................
Loading unloaded module list
...............................................
This dump file has an exception of interest stored in it.
The stored exception information can be accessed via .ecxr.
(16ac.1694): Access violation - code c0000005 (first/second chance not available)
00000000`04248d83 4a8b1409        mov     rdx,qword ptr [rcx+r9] ds:00000001`76e13da4=????????????????
0:032> !analyze -v
*******************************************************************************
*                                                                             *
*                        Exception Analysis                                   *
*                                                                             *
*******************************************************************************

*** ERROR: Symbol file could not be found.  Defaulted to export symbols for tlb.dll -

FAULTING_IP:
+4248d83
00000000`04248d83 4a8b1409        mov     rdx,qword ptr [rcx+r9]

EXCEPTION_RECORD:  ffffffffffffffff -- (.exr ffffffffffffffff)
ExceptionAddress: 0000000004248d83
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000176e13da4
Attempt to read from address 0000000176e13da4

DEFAULT_BUCKET_ID:  CODE_RUNNING_ON_HEAP

PROCESS_NAME:  explorer.exe

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

READ_ADDRESS:  0000000176e13da4

BUGCHECK_STR:  ACCESS_VIOLATION

IP_ON_HEAP:  0000000004215978
The fault address in not in any loaded module, please check your build's rebase
log at <releasedir>\bin\build_logs\timebuild\ntrebase.log for module which may
contain the address if it were loaded.

FRAME ONE INVALID: 1800200000000a

LAST_CONTROL_TRANSFER:  from 0000000004215978 to 0000000004248d83

STACK_TEXT:  
00000000`058ff048 00000000`04215978 : 00000000`04280a70 00000000`00000022 00000000`43b3d25c 00000000`76e90000 : 0x4248d83
00000000`058ff050 00000000`04280a70 : 00000000`00000022 00000000`43b3d25c 00000000`76e90000 00000000`051f0000 : 0x4215978
00000000`058ff058 00000000`00000022 : 00000000`43b3d25c 00000000`76e90000 00000000`051f0000 00000000`04202733 : 0x4280a70
00000000`058ff060 00000000`43b3d25c : 00000000`76e90000 00000000`051f0000 00000000`04202733 00000000`00000000 : 0x22
00000000`058ff068 00000000`76e90000 : 00000000`051f0000 00000000`04202733 00000000`00000000 000000bf`00000099 : 0x43b3d25c
00000000`058ff070 00000000`051f0000 : 00000000`04202733 00000000`00000000 000000bf`00000099 00000000`000000ac : kernel32!_imp_memcpy <PERF> (kernel32+0x0)
00000000`058ff078 00000000`04202733 : 00000000`00000000 000000bf`00000099 00000000`000000ac 00000000`00110010 : 0x51f0000
00000000`058ff080 00000000`00000000 : 000000bf`00000099 00000000`000000ac 00000000`00110010 00000000`04cd54d9 : 0x4202733
00000000`058ff088 000000bf`00000099 : 00000000`000000ac 00000000`00110010 00000000`04cd54d9 00000000`04215b00 : 0x0
00000000`058ff090 00000000`000000ac : 00000000`00110010 00000000`04cd54d9 00000000`04215b00 00000000`76e90000 : 0xbf`00000099
00000000`058ff098 00000000`00110010 : 00000000`04cd54d9 00000000`04215b00 00000000`76e90000 00000000`044f8ba0 : 0xac
00000000`058ff0a0 00000000`04cd54d9 : 00000000`04215b00 00000000`76e90000 00000000`044f8ba0 00000000`04280a01 : 0x110010
00000000`058ff0a8 00000000`04215b00 : 00000000`76e90000 00000000`044f8ba0 00000000`04280a01 00000000`00000000 : 0x4cd54d9
00000000`058ff0b0 00000000`76e90000 : 00000000`044f8ba0 00000000`04280a01 00000000`00000000 00000000`770d6fa0 : 0x4215b00
00000000`058ff0b8 00000000`044f8ba0 : 00000000`04280a01 00000000`00000000 00000000`770d6fa0 00000000`058ff140 : kernel32!_imp_memcpy <PERF> (kernel32+0x0)
00000000`058ff0c0 00000000`04280a01 : 00000000`00000000 00000000`770d6fa0 00000000`058ff140 00000000`771b9a98 : tlb!SelfInstall+0x93200
00000000`058ff0c8 00000000`00000000 : 00000000`770d6fa0 00000000`058ff140 00000000`771b9a98 00000000`04215d48 : 0x4280a01
00000000`058ff0d0 00000000`770d6f9f : 00000000`058ff140 00000000`771b9a98 00000000`04215d48 00000000`76e90000 : 0x0
00000000`058ff0d8 00000000`058ff140 : 00000000`771b9a98 00000000`04215d48 00000000`76e90000 00000000`044f8ba0 : ntdll!RtlpPopulateListIndex+0x1fc
00000000`058ff0e0 00000000`771b9a98 : 00000000`04215d48 00000000`76e90000 00000000`044f8ba0 00000000`00000100 : 0x58ff140
00000000`058ff0e8 00000000`04215d48 : 00000000`76e90000 00000000`044f8ba0 00000000`00000100 00000000`000002d8 : ntdll!RtlpInterceptorRoutines
00000000`058ff0f0 00000000`76e90000 : 00000000`044f8ba0 00000000`00000100 00000000`000002d8 00000000`00000000 : 0x4215d48
00000000`058ff0f8 00000000`044f8ba0 : 00000000`00000100 00000000`000002d8 00000000`00000000 00000000`0427b450 : kernel32!_imp_memcpy <PERF> (kernel32+0x0)
00000000`058ff100 00000000`00000100 : 00000000`000002d8 00000000`00000000 00000000`0427b450 00000000`00000000 : tlb!SelfInstall+0x93200
00000000`058ff108 00000000`000002d8 : 00000000`00000000 00000000`0427b450 00000000`00000000 00000000`0427bd70 : 0x100
00000000`058ff110 00000000`00000000 : 00000000`0427b450 00000000`00000000 00000000`0427bd70 00000000`0427bb88 : 0x2d8
00000000`058ff118 00000000`0427b450 : 00000000`00000000 00000000`0427bd70 00000000`0427bb88 00000000`770f714b : 0x0
00000000`058ff120 00000000`00000000 : 00000000`0427bd70 00000000`0427bb88 00000000`770f714b 65636f72`50746553 : 0x427b450
00000000`058ff128 00000000`0427bd70 : 00000000`0427bb88 00000000`770f714b 65636f72`50746553 6e696b72`6f577373 : 0x0
00000000`058ff130 00000000`0427bb88 : 00000000`770f714b 65636f72`50746553 6e696b72`6f577373 657a6953`74655367 : 0x427bd70
00000000`058ff138 00000000`770f714b : 65636f72`50746553 6e696b72`6f577373 657a6953`74655367 00000000`058ff100 : 0x427bb88
00000000`058ff140 00000000`00000002 : 00000000`739946bc 00000000`76e90000 00000000`00000003 00000000`771af9a0 : ntdll!LdrGetProcedureAddressEx+0x488
00000000`058ff2b0 00000000`739946bc : 00000000`76e90000 00000000`00000003 00000000`771af9a0 00000000`00000000 : 0x2
00000000`058ff2b8 00000000`76e90000 : 00000000`00000003 00000000`771af9a0 00000000`00000000 00000000`044c2d76 : 0x739946bc
00000000`058ff2c0 00000000`00000003 : 00000000`771af9a0 00000000`00000000 00000000`044c2d76 00000000`045dec10 : kernel32!_imp_memcpy <PERF> (kernel32+0x0)
00000000`058ff2c8 00000000`771af9a0 : 00000000`00000000 00000000`044c2d76 00000000`045dec10 00000000`76ec8d30 : 0x3
00000000`058ff2d0 00000000`00000000 : 00000000`044c2d76 00000000`045dec10 00000000`76ec8d30 000007ff`fffa3258 : ntdll!PebLdr+0x20
00000000`058ff2d8 00000000`044c2d76 : 00000000`045dec10 00000000`76ec8d30 000007ff`fffa3258 00000000`00341be0 : 0x0
00000000`058ff2e0 00000000`045dec10 : 00000000`76ec8d30 000007ff`fffa3258 00000000`00341be0 00000000`00000000 : tlb!SelfInstall+0x5d3d6
00000000`058ff2e8 00000000`76ec8d30 : 000007ff`fffa3258 00000000`00341be0 00000000`00000000 00000000`00000018 : tlb!SelfInstall+0x179270
00000000`058ff2f0 00000000`00000000 : 00000000`00000002 00000000`043e0000 00000000`04953a90 00000000`00000000 : kernel32!GetProcAddress+0x60


FAULTING_THREAD:  0000000000001694

FOLLOWUP_IP:
tlb!SelfInstall+93200
00000000`044f8ba0 44              ???

SYMBOL_STACK_INDEX:  f

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: tlb

IMAGE_NAME:  tlb.dll

DEBUG_FLR_IMAGE_TIMESTAMP:  46269ff1

SYMBOL_NAME:  tlb!SelfInstall+93200

STACK_COMMAND:  ~32s; .ecxr ; kb

FAILURE_BUCKET_ID:  X64_ACCESS_VIOLATION_tlb!SelfInstall+93200

BUCKET_ID:  X64_ACCESS_VIOLATION_tlb!SelfInstall+93200

Followup: MachineOwner
---------



- FlyingHorse - 11-01-2007

Yuri has there been any headway on this issue? I had this problem on Vista 32-bit and now the same thing happens on Vista 64-bit. This random but repeated crashing of explorer.exe has rendered TLB usless for me now.

I have created a completely new installation of TLB 4.2.2 with all new settings from the ground up. This is on a fresh install of Vista 64. The only plugin that I am using is Mail Monitor. I have noticed that most of the time the crashes occur when I try to open a folder or virtual folder. Also, when new mail is detected and the Mail Monitor icon changes. It does not happen all the time. I see no pattern with any particular programs being opened or not. I've disabled AV programs and even switched from Kaspersky to NOD32 to see if that might be the cause.

Please tell me what information you need to troubleshoot this problem. I'll be glad to help in any way that I can.


- FlyingHorse - 11-01-2007

This one happened just after a new e-mail was detected
Code:
Microsoft (R) Windows Debugger  Version 6.7.0005.1
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [H:\Test\WER9E78.tmp.mdmp]
User Mini Dump File: Only registers, stack and portions of memory are available

Symbol search path is: srv*G:\Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: srv*G:\Symbols*http://msdl.microsoft.com/download/symbols
Windows Vista Version 6000 MP (4 procs) Free x64
Product: WinNt, suite: SingleUserTS
Debug session time: Thu Nov  1 16:19:14.000 2007 (GMT-4)
System Uptime: 0 days 4:51:13.505
Process Uptime: 0 days 0:01:52.000
...................................................................................................................................................................
Loading unloaded module list
...............
This dump file has an exception of interest stored in it.
The stored exception information can be accessed via .ecxr.
(f9c.e24): Access violation - code c0000005 (first/second chance not available)
ntdll!NtWaitForMultipleObjects+0xa:
00000000`77c4082a c3              ret
0:035> kd: Reading initial command '!analyze -v; q'
*******************************************************************************
*                                                                             *
*                        Exception Analysis                                   *
*                                                                             *
*******************************************************************************

*** ERROR: Symbol file could not be found.  Defaulted to export symbols for tlb.dll -
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for mailmon.dll -

FAULTING_IP:
+54fc483
00000000`054fc483 4a8b1409        mov     rdx,qword ptr [rcx+r9]

EXCEPTION_RECORD:  ffffffffffffffff -- (.exr 0xffffffffffffffff)
ExceptionAddress: 00000000054fc483
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 000007ff09440f88
Attempt to read from address 000007ff09440f88

DEFAULT_BUCKET_ID:  BAD_INSTRUCTION_PTR

PROCESS_NAME:  explorer.exe

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

READ_ADDRESS:  000007ff09440f88

FAILED_INSTRUCTION_ADDRESS:
+54fc483
00000000`054fc483 4a8b1409        mov     rdx,qword ptr [rcx+r9]

NTGLOBALFLAG:  0

APPLICATION_VERIFIER_FLAGS:  0

IP_ON_HEAP:  00000000054c8676
The fault address in not in any loaded module, please check your build's rebase
log at <releasedir>\bin\build_logs\timebuild\ntrebase.log for module which may
contain the address if it were loaded.

FRAME_ONE_INVALID: 1

LAST_CONTROL_TRANSFER:  from 00000000054c8676 to 00000000054fc483

FOLLOWUP_IP:
tlb!SelfInstall+13ecbb
00000001`801c351b eb18            jmp     tlb!SelfInstall+0x13ecd5 (00000001`801c3535)

SYMBOL_STACK_INDEX:  f

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: tlb

IMAGE_NAME:  tlb.dll

DEBUG_FLR_IMAGE_TIMESTAMP:  46e6f4f9

FAULTING_THREAD:  0000000000000e24

PRIMARY_PROBLEM_CLASS:  BAD_INSTRUCTION_PTR

BUGCHECK_STR:  APPLICATION_FAULT_BAD_INSTRUCTION_PTR_STACK_CORRUPTION_CODE_RUNNING_ON_STACK

SYMBOL_NAME:  tlb!SelfInstall+13ecbb

STACK_COMMAND:  ~35s; .ecxr ; kb

FAILURE_BUCKET_ID:  X64_APPLICATION_FAULT_BAD_INSTRUCTION_PTR_STACK_CORRUPTION_CODE_RUNNING_ON_STACK_BAD_IP_tlb!SelfInstall+13ecbb

BUCKET_ID:  X64_APPLICATION_FAULT_BAD_INSTRUCTION_PTR_STACK_CORRUPTION_CODE_RUNNING_ON_STACK_BAD_IP_tlb!SelfInstall+13ecbb

Followup: MachineOwner
---------

quit:

HTH


- CrazyCoder - 11-01-2007

This problem is fixed now, Yuri provided me the new version which works correctly.


- FlyingHorse - 11-01-2007

CrazyCoder Wrote:This problem is fixed now, Yuri provided me the new version which works correctly.

Thanks for the heads up. I'll PM Yuri and see if I can't get my hands on the fixed version as well.


- FlyingHorse - 11-06-2007

Got the updated file from Yuri this morning and everything is working as it should so far.

Thanks Yuri.


- FlyingHorse - 11-17-2007

After 11 days I am still getting Explorer.exe crashes. Though they are far less frequent it does happen from time to time. Mostly the crash occurs during logon or when opening a virtual folder like 'Control Panel'.

I tried using tlbHost and it seemed fine at first but when I right clicked and hit 'Refresh' it crashed. One interesting thing to note is that the 'alpha' REG_DWORD entry at:
Code:
HKEY_CURRENT_USER\Software\True Software\tlbHost\toolbars\1
is marked as 'invalid DWORD (32-bit) value'

No matter what Translucency setting I use the alpha value is invalid. Perhaps this is a place to look into?


- Yuri Kobets - 11-18-2007

Quote:I tried using tlbHost and it seemed fine at first but when I right clicked and hit 'Refresh' it crashed.
Maybe the problem in one of plugins you are using?

Quote:One interesting thing to note is that the 'alpha' REG_DWORD entry at
Ok, thank you.


- FlyingHorse - 11-18-2007

Yuri Kobets Wrote:Maybe the problem in one of plugins you are using?

I am currently using only the Mail Monitor plugin. I'll take it out and see how things go.


- FlyingHorse - 11-19-2007

After removing the Mail Monitor plugin I still get crashes. 4 just today. Seems to happen the most when opening the Control Panel virtual folder.


So I am not the only one that has this going on - Mark_R - 11-20-2007

I get the random explorer.exe crash and restart at random times too. I wasnt sure at first but am sure TLB is causing this somehow, because when the explorer.exe errors and restarts TLB (the whole taskbar I guess seams to) is the only thing that restarts. Like mentioned above, it happens at different times. I dont think I ever had it happen when checking email, but definately when I highlight and copy something, using the control panel virtual folder and sometimes when opening the other virtual folders that take a few seconds to get the information like Service Manager and Device Manager.

Using Vista x64