09-23-2007, 05:17 AM -
I've read similar topics. I don't have Mail Monitor plug-in installed, the only plug-in I have is Spacer. This problem also happens to my friend on Vista 32, so I don't think that it's Vista 64 specific.
Explorer.exe crashes once a week or more frequently. I've disabled all the context menus in the TLB settings, didn't help.
See the crash dump:
Explorer.exe crashes once a week or more frequently. I've disabled all the context menus in the TLB settings, didn't help.
See the crash dump:
Code:
Microsoft (R) Windows Debugger Version 6.6.0007.5
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Serge\AppData\Local\Temp\WER9AD2.tmp\minidump.mdmp]
User Mini Dump File: Only registers, stack and portions of memory are available
Windows Vista Version 6000 MP (4 procs) Free x64
Product: WinNt, suite: SingleUserTS
Debug session time: Sun Sep 23 17:04:03.000 2007 (GMT+4)
System Uptime: 1 days 13:28:23.575
Process Uptime: 1 days 13:27:15.000
Symbol search path is: srv*d:\dev\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
..................................................................................................................................................................
Loading unloaded module list
................................................................
This dump file has an exception of interest stored in it.
The stored exception information can be accessed via .ecxr.
(4e4.aec): Access violation - code c0000005 (first/second chance not available)
00000000`051ac483 4a8b1409 mov rdx,qword ptr [rcx+r9] ds:000007ff`00a001a2=????????????????
0:033> !analyze -v
*******************************************************************************
* *
* Exception Analysis *
* *
*******************************************************************************
*** ERROR: Symbol file could not be found. Defaulted to export symbols for tlb.dll -
FAULTING_IP:
+51ac483
00000000`051ac483 4a8b1409 mov rdx,qword ptr [rcx+r9]
EXCEPTION_RECORD: ffffffffffffffff -- (.exr ffffffffffffffff)
ExceptionAddress: 00000000051ac483
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 000007ff00a001a2
Attempt to read from address 000007ff00a001a2
DEFAULT_BUCKET_ID: STACK_CORRUPTION
PROCESS_NAME: explorer.exe
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
READ_ADDRESS: 000007ff00a001a2
BUGCHECK_STR: ACCESS_VIOLATION
IP_ON_HEAP: 0000000005178676
The fault address in not in any loaded module, please check your build's rebase
log at <releasedir>\bin\build_logs\timebuild\ntrebase.log for module which may
contain the address if it were loaded.
FRAME ONE INVALID: 1800200000000a
LAST_CONTROL_TRANSFER: from 0000000005178676 to 00000000051ac483
STACK_TEXT:
00000000`099fee68 00000000`05178676 : 00000000`00000000 00000000`00000000 6365446c`74520000 746e696f`5065646f : 0x51ac483
00000000`099fee70 00000000`00000000 : 00000000`00000000 6365446c`74520000 746e696f`5065646f 00000000`00000000 : 0x5178676
00000000`099fee78 00000000`00000000 : 6365446c`74520000 746e696f`5065646f 00000000`00000000 00000000`00000000 : 0x0
00000000`099fee80 6365446c`74520000 : 746e696f`5065646f 00000000`00000000 00000000`00000000 00000000`099fef40 : 0x0
00000000`099fee88 746e696f`5065646f : 00000000`00000000 00000000`00000000 00000000`099fef40 00000000`00000000 : 0x6365446c`74520000
00000000`099fee90 00000000`00000000 : 00000000`00000000 00000000`099fef40 00000000`00000000 00000000`00000000 : 0x746e696f`5065646f
00000000`099fee98 00000000`00000000 : 00000000`099fef40 00000000`00000000 00000000`00000000 00000263`00000132 : 0x0
00000000`099feea0 00000000`099fef40 : 00000000`00000000 00000000`00000000 00000263`00000132 00000000`000001ca : 0x0
00000000`099feea8 00000000`00000000 : 00000000`00000000 00000263`00000132 00000000`000001ca 00000000`00000000 : 0x99fef40
00000000`099feeb0 00000000`00000000 : 00000263`00000132 00000000`000001ca 00000000`00000000 00000000`099ff078 : 0x0
00000000`099feeb8 00000263`00000132 : 00000000`000001ca 00000000`00000000 00000000`099ff078 00000001`801c351b : 0x0
00000000`099feec0 00000000`000001ca : 00000000`00000000 00000000`099ff078 00000001`801c351b 00000000`099fef40 : 0x263`00000132
00000000`099feec8 00000000`00000000 : 00000000`099ff078 00000001`801c351b 00000000`099fef40 00000000`0517e204 : 0x1ca
00000000`099feed0 00000000`099ff078 : 00000001`801c351b 00000000`099fef40 00000000`0517e204 00000000`099fef40 : 0x0
00000000`099feed8 00000001`801c351b : 00000000`099fef40 00000000`0517e204 00000000`099fef40 00000000`00000000 : 0x99ff078
00000000`099feee0 00000000`099fef40 : 00000000`0517e204 00000000`099fef40 00000000`00000000 00000000`099fef68 : tlb!SelfInstall+0x13ecbb
00000000`099feee8 00000000`0517e204 : 00000000`099fef40 00000000`00000000 00000000`099fef68 00000000`77b73fe6 : 0x99fef40
00000000`099feef0 00000000`099fef40 : 00000000`00000000 00000000`099fef68 00000000`77b73fe6 00000000`00000000 : 0x517e204
00000000`099feef8 00000000`00000000 : 00000000`099fef68 00000000`77b73fe6 00000000`00000000 00000000`05178342 : 0x99fef40
00000000`099fef00 00000000`099fef68 : 00000000`77b73fe6 00000000`00000000 00000000`05178342 00000000`05178370 : 0x0
00000000`099fef08 00000000`77b73fe6 : 00000000`00000000 00000000`05178342 00000000`05178370 00000000`099fef40 : 0x99fef68
00000000`099fef10 00000000`051dfd80 : 00000000`051dfb98 00000000`000002d8 65636f72`50746553 6e696b72`6f577373 : ntdll!LdrpSnapThunk+0x2c3
00000000`099ff010 00000000`051dfb98 : 00000000`000002d8 65636f72`50746553 6e696b72`6f577373 657a6953`74655367 : 0x51dfd80
00000000`099ff018 00000000`000002d8 : 65636f72`50746553 6e696b72`6f577373 657a6953`74655367 00000000`00009500 : 0x51dfb98
00000000`099ff020 65636f72`50746553 : 6e696b72`6f577373 657a6953`74655367 00000000`00009500 00000000`030cf800 : 0x2d8
00000000`099ff028 6e696b72`6f577373 : 657a6953`74655367 00000000`00009500 00000000`030cf800 00000000`00000000 : 0x65636f72`50746553
00000000`099ff030 657a6953`74655367 : 00000000`00009500 00000000`030cf800 00000000`00000000 00000000`099ff0a8 : 0x6e696b72`6f577373
00000000`099ff038 00000000`00009500 : 00000000`030cf800 00000000`00000000 00000000`099ff0a8 00000000`00000000 : 0x657a6953`74655367
00000000`099ff040 00000000`030cf800 : 00000000`00000000 00000000`099ff0a8 00000000`00000000 00000000`059fdd80 : 0x9500
00000000`099ff048 00000000`00000000 : 00000000`099ff0a8 00000000`00000000 00000000`059fdd80 00000000`77b93417 : 0x30cf800
00000000`099ff050 00000000`099ff0a8 : 00000000`00000000 00000000`059fdd80 00000000`77b93417 00000000`77a61b70 : 0x0
00000000`099ff058 00000000`00000000 : 00000000`059fdd80 00000000`77b93417 00000000`77a61b70 00000000`77b83cd0 : 0x99ff0a8
00000000`099ff060 00000000`059fdd80 : 00000000`77b93417 00000000`77a61b70 00000000`77b83cd0 00000000`00009593 : 0x0
00000000`099ff068 00000000`77b93417 : 00000000`77a61b70 00000000`77b83cd0 00000000`00009593 00000000`099ff208 : 0x59fdd80
00000000`099ff070 00000000`77a28739 : 000007ff`fffdd258 00000000`049fe2b0 00000000`00000000 00000000`00000018 : ntdll!RtlAnsiStringToUnicodeString+0x83
00000000`099ff0d0 00000000`0517d474 : 00000000`77a00000 00000000`000002d8 00000000`00000000 0000fca8`7bbc2fdc : kernel32!GetModuleHandleA+0x75
00000000`099ff110 00000000`77a00000 : 00000000`000002d8 00000000`00000000 0000fca8`7bbc2fdc 00000000`7e5b6882 : 0x517d474
00000000`099ff118 00000000`000002d8 : 00000000`00000000 0000fca8`7bbc2fdc 00000000`7e5b6882 00000001`800e375e : kernel32!_imp_memcpy <PERF> (kernel32+0x0)
00000000`099ff120 00000000`00000000 : 0000fca8`7bbc2fdc 00000000`7e5b6882 00000001`800e375e 00000000`77a00000 : 0x2d8
00000000`099ff128 0000fca8`7bbc2fdc : 00000000`7e5b6882 00000001`800e375e 00000000`77a00000 00000001`80114478 : 0x0
00000000`099ff130 00000000`7e5b6882 : 00000001`800e375e 00000000`77a00000 00000001`80114478 00000000`00000000 : 0xfca8`7bbc2fdc
00000000`099ff138 00000001`800e375e : 00000000`77a00000 00000001`80114478 00000000`00000000 00000001`80000000 : 0x7e5b6882
00000000`099ff140 00000000`77a00000 : 00000001`80114478 00000000`00000000 00000001`80000000 00000000`00000003 : tlb!SelfInstall+0x5eefe
00000000`099ff148 00000001`80114478 : 00000000`00000000 00000001`80000000 00000000`00000003 00000000`77c4f9a0 : kernel32!_imp_memcpy <PERF> (kernel32+0x0)
00000000`099ff150 00000000`00000000 : 00000001`80000000 00000000`00000003 00000000`77c4f9a0 00000001`80000000 : tlb!SelfInstall+0x8fc18
00000000`099ff158 00000001`80000000 : 00000000`00000003 00000000`77c4f9a0 00000001`80000000 00000001`800decc2 : 0x0
00000000`099ff160 00000000`00000003 : 00000000`77c4f9a0 00000001`80000000 00000001`800decc2 00000000`00000006 : tlb
00000000`099ff168 00000000`77c4f9a0 : 00000001`80000000 00000001`800decc2 00000000`00000006 00000000`059fdd80 : 0x3
00000000`099ff170 00000001`80000000 : 00000001`800decc2 00000000`00000006 00000000`059fdd80 00000000`00000000 : ntdll!PebLdr+0x20
00000000`099ff178 00000001`800decc2 : 00000000`00000006 00000000`059fdd80 00000000`00000000 00000000`00000002 : tlb
00000000`099ff180 00000000`00000006 : 00000000`059fdd80 00000000`00000000 00000000`00000002 00000000`030a7c50 : tlb!SelfInstall+0x5a462
00000000`099ff188 00000000`059fdd80 : 00000000`00000000 00000000`00000002 00000000`030a7c50 00000001`800ded73 : 0x6
00000000`099ff190 00000000`00000000 : 00000000`00000002 00000000`030a7c50 00000001`800ded73 00000001`801fcc30 : 0x59fdd80
00000000`099ff198 00000000`00000002 : 00000000`030a7c50 00000001`800ded73 00000001`801fcc30 00000000`77a38d30 : 0x0
00000000`099ff1a0 00000000`030a7c50 : 00000001`800ded73 00000001`801fcc30 00000000`77a38d30 000007ff`fffdd258 : 0x2
00000000`099ff1a8 00000001`800ded73 : 00000001`801fcc30 00000000`77a38d30 000007ff`fffdd258 00000000`000002d8 : 0x30a7c50
00000000`099ff1b0 00000001`801fcc30 : 00000000`77a38d30 000007ff`fffdd258 00000000`000002d8 00000000`00000000 : tlb!SelfInstall+0x5a513
00000000`099ff1b8 00000000`77a38d30 : 000007ff`fffdd258 00000000`000002d8 00000000`00000000 00000000`00000018 : tlb!SelfInstall+0x1783d0
00000000`099ff1c0 00000000`00000000 : 00000000`00000002 00000000`77b83cd0 00000000`05326470 00000000`00000000 : kernel32!GetProcAddress+0x60
FAULTING_THREAD: 0000000000000aec
PRIMARY_PROBLEM_CLASS: STACK_CORRUPTION
FOLLOWUP_IP:
tlb!SelfInstall+13ecbb
00000001`801c351b eb18 jmp tlb!SelfInstall+0x13ecd5 (00000001`801c3535)
SYMBOL_STACK_INDEX: f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: tlb
IMAGE_NAME: tlb.dll
DEBUG_FLR_IMAGE_TIMESTAMP: 46e6f4f9
SYMBOL_NAME: tlb!SelfInstall+13ecbb
STACK_COMMAND: ~33s; .ecxr ; kb
FAILURE_BUCKET_ID: X64_ACCESS_VIOLATION_tlb!SelfInstall+13ecbb
BUCKET_ID: X64_ACCESS_VIOLATION_tlb!SelfInstall+13ecbb
Followup: MachineOwner
---------