Windows 10 Explorer crashes when opening "new" context menu, need help deciphering dump file

-1

As the title says, whenever I attempt to open the "new" sub-menu of the right click context menu in Windows 10 explorer locks up and then crashes a few moments later. This issue only appeared in the last couple days and I suspect it is a result of the Creator's update. I would prefer to fix this issue without having to roll-back the update. Does anyone have experience with this isssue?

I've tried using CCleaner and other programs to disable all my third party shell extensions to no avail. Rebooting in Safe Mode does not fix the issue either. I also ran sfc /scannow in an elevated command prompt, but no issues were found.

I generated I crash dump file and here is the output I get running !analyze -v in WinDbg (Stack Text field omitted due to text limit):

*******************************************************************************
*                                                                             *
*                        Exception Analysis                                   *
*                                                                             *
*******************************************************************************

*** ERROR: Symbol file could not be found.  Defaulted to export symbols for sppc.dll - 
*** WARNING: Unable to verify timestamp for nvwgf2umx_cfg.dll
*** ERROR: Module load completed but symbols could not be loaded for nvwgf2umx_cfg.dll
GetUrlPageData2 (WinHttp) failed: 12002.

DUMP_CLASS: 2

DUMP_QUALIFIER: 400

CONTEXT:  (.ecxr)
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=000000001969b898 rsi=000000001025016c rdi=000000001969b8f0
rip=00007fff71a55616 rsp=000000001969b850 rbp=000000001969b929
 r8=0000000000cd3c00  r9=0000000000008000 r10=00000fffee105183
r11=2200880000020008 r12=0000000000000000 r13=0000000000000002
r14=000000001969c080 r15=000000001969c890
iopl=0         nv up ei pl nz na po nc
cs=0033  ss=002b  ds=002b  es=002b  fs=0053  gs=002b             efl=00010206
shell32!CheckFileTypeForShellNew+0x32:
00007fff`71a55616 488b03          mov     rax,qword ptr [rbx] ds:00000000`00000000=????????????????
Resetting default scope

FAULTING_IP: 
shell32!CheckFileTypeForShellNew+32
00007fff`71a55616 488b03          mov     rax,qword ptr [rbx]

EXCEPTION_RECORD:  (.exr -1)
ExceptionAddress: 00007fff71a55616 (shell32!CheckFileTypeForShellNew+0x0000000000000032)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000000
Attempt to read from address 0000000000000000

PROCESS_NAME:  explorer.exe

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000000

FOLLOWUP_IP: 
shell32!CheckFileTypeForShellNew+32
00007fff`71a55616 488b03          mov     rax,qword ptr [rbx]

READ_ADDRESS:  0000000000000000 

WATSON_BKT_PROCSTAMP:  951324bb

WATSON_BKT_PROCVER:  10.0.15063.447

PROCESS_VER_PRODUCT:  Microsoft® Windows® Operating System

WATSON_BKT_MODULE:  shell32.dll

WATSON_BKT_MODSTAMP:  944613c6

WATSON_BKT_MODOFFSET:  435616

WATSON_BKT_MODVER:  10.0.15063.502

MODULE_VER_PRODUCT:  Microsoft® Windows® Operating System

BUILD_VERSION_STRING:  10.0.15063.246 (WinBuild.160101.0800)

MODLIST_WITH_TSCHKSUM_HASH:  0c3165ab5fc02cacaf383ed161d65631e0ff52c8

MODLIST_SHA1_HASH:  c9ff83ef7d8837c392de03e5e41584a58e60ea5a

NTGLOBALFLAG:  0

APPLICATION_VERIFIER_FLAGS:  0

DUMP_FLAGS:  94

DUMP_TYPE:  1

ANALYSIS_SESSION_HOST:  ******-PC

ANALYSIS_SESSION_TIME:  09-03-2017 20:41:48.0842

ANALYSIS_VERSION: 10.0.15063.468 amd64fre

THREAD_ATTRIBUTES: 
OS_LOCALE:  ENU

PROBLEM_CLASSES: 

    ID:     [0n292]
    Type:   [@ACCESS_VIOLATION]
    Class:  Addendum
    Scope:  BUCKET_ID
    Name:   Omit
    Data:   Omit
    PID:    [Unspecified]
    TID:    [0x2b2c]
    Frame:  [0] : shell32!CheckFileTypeForShellNew

    ID:     [0n264]
    Type:   [INVALID_POINTER_READ]
    Class:  Primary
    Scope:  BUCKET_ID
    Name:   Add
    Data:   Omit
    PID:    [Unspecified]
    TID:    [0x2b2c]
    Frame:  [0] : shell32!CheckFileTypeForShellNew

    ID:     [0n279]
    Type:   [NULL_POINTER_READ]
    Class:  Primary
    Scope:  DEFAULT_BUCKET_ID (Failure Bucket ID prefix)
            BUCKET_ID
    Name:   Add
    Data:   Omit
    PID:    [0x2cd0]
    TID:    [0x2b2c]
    Frame:  [0] : shell32!CheckFileTypeForShellNew

    ID:     [0n105]
    Type:   [AFTER_CALL]
    Class:  Addendum
    Scope:  DEFAULT_BUCKET_ID (Failure Bucket ID prefix)
            BUCKET_ID
    Name:   Add
    Data:   Omit
    PID:    [0x2cd0]
    TID:    [0x2b2c]
    Frame:  [0] : shell32!CheckFileTypeForShellNew

BUGCHECK_STR:  APPLICATION_FAULT_NULL_POINTER_READ_INVALID_POINTER_READ_AFTER_CALL

DEFAULT_BUCKET_ID:  NULL_POINTER_READ_AFTER_CALL

PRIMARY_PROBLEM_CLASS:  APPLICATION_FAULT

LAST_CONTROL_TRANSFER:  from 00007fff71a565b8 to 00007fff71a55616



THREAD_SHA1_HASH_MOD_FUNC:  063c29b48983480c91fd071b8c8f53e2156ff3b6

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  69135dc43bf3fdccf1b214fa3444b4c42daee17b

THREAD_SHA1_HASH_MOD:  7674f6f908a3f0f7306b7269a4b5f1bc7c621392

FAULT_INSTR_CODE:  4c038b48

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  shell32!CheckFileTypeForShellNew+32

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: shell32

IMAGE_NAME:  shell32.dll

DEBUG_FLR_IMAGE_TIMESTAMP:  0

STACK_COMMAND:  .ecxr ; kb

FAILURE_BUCKET_ID:  NULL_POINTER_READ_AFTER_CALL_c0000005_shell32.dll!CheckFileTypeForShellNew

BUCKET_ID:  APPLICATION_FAULT_NULL_POINTER_READ_INVALID_POINTER_READ_AFTER_CALL_shell32!CheckFileTypeForShellNew+32

FAILURE_EXCEPTION_CODE:  c0000005

FAILURE_IMAGE_NAME:  shell32.dll

BUCKET_ID_IMAGE_STR:  shell32.dll

FAILURE_MODULE_NAME:  shell32

BUCKET_ID_MODULE_STR:  shell32

FAILURE_FUNCTION_NAME:  CheckFileTypeForShellNew

BUCKET_ID_FUNCTION_STR:  CheckFileTypeForShellNew

BUCKET_ID_OFFSET:  32

BUCKET_ID_MODTIMEDATESTAMP:  0

BUCKET_ID_MODCHECKSUM:  146b7f9

BUCKET_ID_MODVER_STR:  10.0.15063.502

BUCKET_ID_PREFIX_STR:  APPLICATION_FAULT_NULL_POINTER_READ_INVALID_POINTER_READ_AFTER_CALL_

FAILURE_PROBLEM_CLASS:  APPLICATION_FAULT

FAILURE_SYMBOL_NAME:  shell32.dll!CheckFileTypeForShellNew

WATSON_STAGEONE_URL:  http://watson.microsoft.com/StageOne/explorer.exe/10.0.15063.447/951324bb/shell32.dll/10.0.15063.502/944613c6/c0000005/00435616.htm?Retriage=1

TARGET_TIME:  2017-09-04T01:41:00.000Z

OSBUILD:  15063

OSSERVICEPACK:  296

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  256

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt SingleUserTS

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  160101.0800

BUILDLAB_STR:  WinBuild

BUILDOSVER_STR:  10.0.15063.246

ANALYSIS_SESSION_ELAPSED_TIME:  88f4

ANALYSIS_SOURCE:  UM

FAILURE_ID_HASH_STRING:  um:null_pointer_read_after_call_c0000005_shell32.dll!checkfiletypeforshellnew

FAILURE_ID_HASH:  {0f88b991-6467-c004-1402-e5afe6fe01dd}

Followup:     MachineOwner
*******************************************************************************
*                                                                             *
*                        Exception Analysis                                   *
*                                                                             *
*******************************************************************************

*** ERROR: Symbol file could not be found.  Defaulted to export symbols for sppc.dll - 
*** WARNING: Unable to verify timestamp for nvwgf2umx_cfg.dll
*** ERROR: Module load completed but symbols could not be loaded for nvwgf2umx_cfg.dll
GetUrlPageData2 (WinHttp) failed: 12002.

DUMP_CLASS: 2

DUMP_QUALIFIER: 400

CONTEXT:  (.ecxr)
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=000000001969b898 rsi=000000001025016c rdi=000000001969b8f0
rip=00007fff71a55616 rsp=000000001969b850 rbp=000000001969b929
 r8=0000000000cd3c00  r9=0000000000008000 r10=00000fffee105183
r11=2200880000020008 r12=0000000000000000 r13=0000000000000002
r14=000000001969c080 r15=000000001969c890
iopl=0         nv up ei pl nz na po nc
cs=0033  ss=002b  ds=002b  es=002b  fs=0053  gs=002b             efl=00010206
shell32!CheckFileTypeForShellNew+0x32:
00007fff`71a55616 488b03          mov     rax,qword ptr [rbx] ds:00000000`00000000=????????????????
Resetting default scope

FAULTING_IP: 
shell32!CheckFileTypeForShellNew+32
00007fff`71a55616 488b03          mov     rax,qword ptr [rbx]

EXCEPTION_RECORD:  (.exr -1)
ExceptionAddress: 00007fff71a55616 (shell32!CheckFileTypeForShellNew+0x0000000000000032)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000000
Attempt to read from address 0000000000000000

PROCESS_NAME:  explorer.exe

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000000

FOLLOWUP_IP: 
shell32!CheckFileTypeForShellNew+32
00007fff`71a55616 488b03          mov     rax,qword ptr [rbx]

READ_ADDRESS:  0000000000000000 

WATSON_BKT_PROCSTAMP:  951324bb

WATSON_BKT_PROCVER:  10.0.15063.447

PROCESS_VER_PRODUCT:  Microsoft® Windows® Operating System

WATSON_BKT_MODULE:  shell32.dll

WATSON_BKT_MODSTAMP:  944613c6

WATSON_BKT_MODOFFSET:  435616

WATSON_BKT_MODVER:  10.0.15063.502

MODULE_VER_PRODUCT:  Microsoft® Windows® Operating System

BUILD_VERSION_STRING:  10.0.15063.246 (WinBuild.160101.0800)

MODLIST_WITH_TSCHKSUM_HASH:  0c3165ab5fc02cacaf383ed161d65631e0ff52c8

MODLIST_SHA1_HASH:  c9ff83ef7d8837c392de03e5e41584a58e60ea5a

NTGLOBALFLAG:  0

APPLICATION_VERIFIER_FLAGS:  0

DUMP_FLAGS:  94

DUMP_TYPE:  1

ANALYSIS_SESSION_HOST:  WESTON-PC

ANALYSIS_SESSION_TIME:  09-03-2017 20:41:48.0842

ANALYSIS_VERSION: 10.0.15063.468 amd64fre

THREAD_ATTRIBUTES: 
OS_LOCALE:  ENU

PROBLEM_CLASSES: 

    ID:     [0n292]
    Type:   [@ACCESS_VIOLATION]
    Class:  Addendum
    Scope:  BUCKET_ID
    Name:   Omit
    Data:   Omit
    PID:    [Unspecified]
    TID:    [0x2b2c]
    Frame:  [0] : shell32!CheckFileTypeForShellNew

    ID:     [0n264]
    Type:   [INVALID_POINTER_READ]
    Class:  Primary
    Scope:  BUCKET_ID
    Name:   Add
    Data:   Omit
    PID:    [Unspecified]
    TID:    [0x2b2c]
    Frame:  [0] : shell32!CheckFileTypeForShellNew

    ID:     [0n279]
    Type:   [NULL_POINTER_READ]
    Class:  Primary
    Scope:  DEFAULT_BUCKET_ID (Failure Bucket ID prefix)
            BUCKET_ID
    Name:   Add
    Data:   Omit
    PID:    [0x2cd0]
    TID:    [0x2b2c]
    Frame:  [0] : shell32!CheckFileTypeForShellNew

    ID:     [0n105]
    Type:   [AFTER_CALL]
    Class:  Addendum
    Scope:  DEFAULT_BUCKET_ID (Failure Bucket ID prefix)
            BUCKET_ID
    Name:   Add
    Data:   Omit
    PID:    [0x2cd0]
    TID:    [0x2b2c]
    Frame:  [0] : shell32!CheckFileTypeForShellNew

BUGCHECK_STR:  APPLICATION_FAULT_NULL_POINTER_READ_INVALID_POINTER_READ_AFTER_CALL

DEFAULT_BUCKET_ID:  NULL_POINTER_READ_AFTER_CALL

PRIMARY_PROBLEM_CLASS:  APPLICATION_FAULT

LAST_CONTROL_TRANSFER:  from 00007fff71a565b8 to 00007fff71a55616

STACK_TEXT:  
00000000`1969b850 00007fff`71a565b8 : 00000000`00000000 00000000`00000000 00000000`00000000 00007fff`73e4ac20 : shell32!CheckFileTypeForShellNew+0x32
00000000`1969b8c0 00007fff`71a5676d : 00000000`1025016c 00000000`1969ba90 00007fff`71b73448 00000000`1709ae80 : shell32!GetShellNewFileTypeAndFTAFromStateRepository+0x2d0
00000000`1969b990 00007fff`71a5b2f5 : 00000000`00000000 00000000`1969c1f0 00000000`00001f52 00000000`00001f52 : shell32!GetShellNewInfoFromStateRepository+0x111
00000000`1969c0f0 00007fff`71a56df3 : 00000000`0000000d 00000000`00000000 00000000`00000000 00000000`00510295 : shell32!CNewMenu::_InitMenuPopup+0x1cd
00000000`1969ca90 00007fff`718202a6 : 00000000`173f5000 00000000`00000008 00000000`0000000d 00000000`00000000 : shell32!CNewMenu::HandleMenuMsg2+0x23
00000000`1969cac0 00007fff`71a956d7 : 00000000`80004005 00000000`1969cb90 00000000`1969cad8 00000000`057c6260 : shell32!CDefFolderMenu::HandleMenuMsg2+0x126
00000000`1969cb70 00007fff`71529c38 : 00000000`80004005 00000000`00000117 00000000`00000000 00007fff`73ff0f20 : shell32!CContextMenuOnContextMenuArray::HandleMenuMsg2+0x177
00000000`1969cc10 00007fff`717f25f3 : 00000000`ffffffff 00000000`1969cd79 00000000`00510295 00000000`00000000 : shlwapi!SHForwardContextMenuMsg+0x78
00000000`1969cca0 00007fff`717f731e : 00000000`0000000d 00000000`1969cd79 00000000`00510295 00000000`10291e40 : shell32!CDefView::_ForwardMenuMessages+0x97
00000000`1969cce0 00007fff`717f7530 : 00000000`000d01ee 00000000`01303270 00000000`00000121 00000000`0000000d : shell32!CDefView::_OnInitMenuPopup+0x2ee
00000000`1969cde0 00007fff`717829c6 : 00000000`00000002 00000000`00000000 00000000`10291e40 00000000`002b03ae : shell32!CDefView::_OnMenuMessage+0xe4
00000000`1969ce80 00007fff`716b7536 : 00000000`00000001 00000000`0000000d 00000000`002b03ae 00000000`00000001 : shell32!CDefView::WndProc+0xc781e
00000000`1969cf90 00007fff`72a6bc50 : 00000000`00000001 00000000`00000001 00000000`00510295 00000000`00000001 : shell32!CDefView::s_WndProc+0x56
00000000`1969cfe0 00007fff`72a6b80b : 00000000`002b03ae 00007fff`716b74e0 00000000`002b03ae 00000000`00000117 : user32!UserCallWinProcCheckWow+0x280
00000000`1969d140 00007fff`4ccd01e5 : 00000000`10325400 00000000`0000000d 00000000`00000000 00000000`00000000 : user32!CallWindowProcW+0x8b
00000000`1969d190 00007fff`649612d8 : 00002520`802d14c5 00000000`00000000 00000000`002b03ae 00000000`00000117 : duser!WndBridge::RawWndProc+0xa5
00000000`1969d210 00007fff`72a6bc50 : 00000000`80000022 00000000`1969d2c8 00000000`00000001 00000000`00030000 : atlthunk!AtlThunk_DataToCode+0xffffffff`ffffe2c8
00000000`1969d250 00007fff`72a6b94c : 00000000`40000388 00007fff`649612c0 00000000`002b03ae 00000000`80000000 : user32!UserCallWinProcCheckWow+0x280
00000000`1969d3b0 00007fff`72a811f3 : 00000000`00000000 00000000`00000000 00000000`00510295 00000000`00000000 : user32!DispatchClientMessage+0x9c
00000000`1969d410 00007fff`740690a4 : 00000000`00000000 00007fff`740690a4 00007fff`70ba9a84 00007fff`740690a4 : user32!_fnDWORD+0x33
00000000`1969d470 00007fff`70ba9a84 : 00007fff`72ace96a 00000000`00000028 00007fff`72a6f1e4 00000000`00000000 : ntdll!KiUserCallbackDispatcherContinue
00000000`1969d4f8 00007fff`72ace96a : 00000000`00000028 00007fff`72a6f1e4 00000000`00000000 00000000`00000000 : win32u!NtUserTrackPopupMenuEx+0x14
00000000`1969d500 00007fff`717263b1 : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : user32!TrackPopupMenu+0x1a
00000000`1969d540 00007fff`717e9220 : 00000000`1969da90 00000000`1969db08 00000000`10291f88 00007fff`7081bacf : shell32!CDefView::_DoContextMenuPopup+0x521
00000000`1969da80 00007fff`67aa9fd8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`1969dff8 : shell32!CDefView::OnBackgroundContextMenu+0x1c0
00000000`1969db30 00007fff`67aa6d77 : 00000000`00a06000 00000000`1969ddb1 00000000`10291e40 00000000`00000000 : explorerframe!UIItemsView::ShowContextMenu+0x2dc
00000000`1969dc30 00007fff`717f1bec : 00000000`00000000 00007fff`67aa679a 00000125`00000067 00000000`00000002 : explorerframe!CItemsView::ShowContextMenu+0x17
00000000`1969dc60 00007fff`717f6ffe : 00000125`00000067 00000000`10291e40 00000000`10291e40 00000000`00000000 : shell32!CDefView::_DoContextMenu+0x88
00000000`1969dca0 00007fff`7178295f : 00000000`1969de0c 00000000`00000000 00000000`00200580 00000000`1969ded4 : shell32!CDefView::_OnContextMenu+0xd2
00000000`1969dd00 00007fff`716b7536 : 00000000`00000001 00000000`02bc03ff 00000000`002b03ae 00000000`1969e250 : shell32!CDefView::WndProc+0xc77b7
00000000`1969de10 00007fff`72a6bc50 : 00000000`00000001 00000000`00002406 00000000`00200580 00000000`00000000 : shell32!CDefView::s_WndProc+0x56
00000000`1969de60 00007fff`72a6b80b : 00000000`002b03ae 00007fff`716b74e0 00000000`002b03ae 00000000`0000007b : user32!UserCallWinProcCheckWow+0x280
00000000`1969dfc0 00007fff`4ccd01e5 : 00000000`10325400 00000000`02bc03ff 00000000`00000000 00000000`010f0000 : user32!CallWindowProcW+0x8b
00000000`1969e010 00007fff`649612d8 : 00000000`0fc678c0 00000000`00000000 00000000`002b03ae 00000000`0000007b : duser!WndBridge::RawWndProc+0xa5
00000000`1969e090 00007fff`72a6bc50 : 00000000`80000022 00000000`00000004 00000009`00000000 00000000`00000000 : atlthunk!AtlThunk_DataToCode+0xffffffff`ffffe2c8
00000000`1969e0d0 00007fff`72a6b94c : 00000000`00000388 00007fff`649612c0 00000000`002b03ae 00000000`80000000 : user32!UserCallWinProcCheckWow+0x280
00000000`1969e230 00007fff`72a811f3 : 00000000`00000000 00000000`00000000 00000000`00200580 00000000`00000000 : user32!DispatchClientMessage+0x9c
00000000`1969e290 00007fff`740690a4 : 00000000`1969e698 00007fff`7081d607 00000000`c0000034 00007fff`73feaf7e : user32!_fnDWORD+0x33
00000000`1969e2f0 00007fff`70ba1164 : 00007fff`72a69eaa 00000000`00000000 00000000`00de48a0 00000000`00000000 : ntdll!KiUserCallbackDispatcherContinue
00000000`1969e378 00007fff`72a69eaa : 00000000`00000000 00000000`00de48a0 00000000`00000000 00000000`1969e7d0 : win32u!NtUserMessageCall+0x14
00000000`1969e380 00007fff`72a696d2 : 00000000`0000007b 00000000`1969e5b0 00000000`00000000 00000000`012dfd40 : user32!RealDefWindowProcWorker+0x1ba
00000000`1969e470 00007fff`6eb2f599 : 00007fff`72a69680 00000000`02bc03ff 00000000`0000007b 00000000`00000000 : user32!RealDefWindowProcW+0x52
00000000`1969e4b0 00007fff`6eb2e3f1 : 00000000`00200580 00000000`00000000 00000000`00000000 00000000`02bc03ff : uxtheme!_ThemeDefWindowProc+0x559
00000000`1969e630 00007fff`72a69be7 : 00000000`00000000 00000000`00000000 00000000`1969e6e0 00000000`00000000 : uxtheme!ThemeDefWindowProcW+0x11
00000000`1969e670 00007fff`67a0e743 : 00000000`0000007b 00000000`00000000 00000000`02bc03ff 00000000`00000000 : user32!DefWindowProcW+0x1b7
00000000`1969e6e0 00007fff`4f97939d : 00000000`00200580 00000000`00000000 00000000`02bc03ff 00000000`1969e9e0 : explorerframe!UIItemsView::WndProc+0x78263
00000000`1969e940 00007fff`72a6bc50 : 00000000`00000001 00000000`00000000 00000000`00000000 00007fff`73fe87ef : dui70!DirectUI::HWNDElement::StaticWndProc+0x4d
00000000`1969e980 00007fff`72a6b80b : 00000000`00200580 00007fff`4f979350 00000000`00200580 00000000`0000007b : user32!UserCallWinProcCheckWow+0x280
00000000`1969eae0 00007fff`4ccdc37a : 00000000`00200580 00000000`00000000 00000000`02bc03ff 00000000`ffffff80 : user32!CallWindowProcW+0x8b
00000000`1969eb30 00007fff`72a6bc50 : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`80000022 : duser!ExtraInfoWndProc+0x8a
00000000`1969eb80 00007fff`72a6b80b : 00000000`00200580 00007fff`4ccdc2f0 00000000`00200580 00000000`0000007b : user32!UserCallWinProcCheckWow+0x280
00000000`1969ece0 00007fff`657f48d0 : 00000000`1969f310 00000000`02bc03ff 00000000`00000000 00007fff`4ccd7590 : user32!CallWindowProcW+0x8b
00000000`1969ed30 00007fff`657f46a7 : 00000000`02bc03ff 00000000`00200580 00000000`0000007b 00000011`00000001 : comctl32!CallNextSubclassProc+0xb0
00000000`1969ee00 00007fff`679961b7 : 00000000`0000007b 00000000`02bc03ff 00000000`00000000 00000000`00000000 : comctl32!DefSubclassProc+0x77
00000000`1969ee50 00007fff`67993656 : 00000000`00000000 00000000`00000003 00040001`00000001 00000000`10291e40 : explorerframe!UIItemsView::_UIItemsViewSubclassProc+0x77
00000000`1969ef30 00007fff`657f4929 : 00000000`1969f268 00007fff`489dcc60 00000000`00000000 0000b844`ea009a52 : explorerframe!UIItemsView::s_UIItemsViewSubclassProc+0x26
00000000`1969ef70 00007fff`657f46a7 : 00000000`02bc03ff 00000000`00200580 00000000`0000007b 00000000`00000000 : comctl32!CallNextSubclassProc+0x109
00000000`1969f040 00007fff`6797cd57 : 00000000`0000007b 00000000`00000000 00000000`00200580 00007fff`48a6c3b9 : comctl32!DefSubclassProc+0x77
00000000`1969f090 00007fff`6797cc96 : 00000000`1969f310 00000000`00000001 00000000`00000000 00000000`00000001 : explorerframe!CToolTipManager::_PropertyToolTipSubclassProc+0x67
00000000`1969f0e0 00007fff`657f4929 : 00000000`00a06000 00007fff`72a73bb2 00000000`00000000 00000000`00000000 : explorerframe!CToolTipManager::s_PropertyToolTipSubclassProc+0x26
00000000`1969f120 00007fff`657f49ea : 00000000`00000001 00000000`00000000 00000000`1969f310 00000000`00000000 : comctl32!CallNextSubclassProc+0x109
00000000`1969f1f0 00007fff`657f4772 : 00000000`00000001 00000000`00200580 00000000`00000000 00000000`00000113 : comctl32!CallNextSubclassProc+0x1ca
00000000`1969f2c0 00007fff`72a6bc50 : 00000000`80000022 00007fff`4ccd1442 00000000`063607c0 00000000`1969f428 : comctl32!MasterSubclassProc+0xa2
00000000`1969f360 00007fff`72a6b5cf : 00000000`012dfd40 00007fff`657f46d0 00000000`00200580 00000000`00200580 : user32!UserCallWinProcCheckWow+0x280
00000000`1969f4c0 00007fff`679b34e3 : 00000000`1969f570 00000000`ffffffff 00000000`04cf1b60 00000000`00000000 : user32!DispatchMessageWorker+0x19f
00000000`1969f540 00007fff`67978c4a : 00000000`04cf1b60 00000000`1969f6e9 00000000`00000002 00000000`00000000 : explorerframe!CExplorerFrame::FrameMessagePump+0xe3
00000000`1969f5d0 00007fff`679784ca : 00000000`04cf1b60 00000000`04d043f0 00000000`1007f5f0 00000000`00000000 : explorerframe!BrowserThreadProc+0x76
00000000`1969f620 00007fff`67978482 : 1041b3e2`00000001 00000000`0fe68a80 00000000`0000ea60 00007fff`70cf47d5 : explorerframe!BrowserNewThreadProc+0x3a
00000000`1969f650 00007fff`679c47ee : 00000000`00000001 00007fff`73fd4571 00000000`1969f7b0 00000000`1005eea0 : explorerframe!CExplorerTask::InternalResumeRT+0x12
00000000`1969f680 00007fff`70cf5847 : 00000000`00002cd0 00000000`00002b2c 00000000`0000000f 00000000`0000000b : explorerframe!CRunnableTask::Run+0x57e
00000000`1969f750 00007fff`70cf4567 : 00000000`0499dea0 00000000`0fe67b80 ffffffff`fffffffe 00000000`00000000 : windows_storage!CShellTask::TT_Run+0x4f
00000000`1969f780 00007fff`70d77c5f : 00000000`0499dea0 00000000`0499dea0 00000000`1969f8d9 00000000`00000000 : windows_storage!CShellTaskThread::ThreadProc+0xcb
00000000`1969f830 00007fff`73b3c8e3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : windows_storage!CShellTaskThread::s_ThreadProc+0x2f
00000000`1969f860 00007fff`71582774 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : SHCore!_WrapperThreadProc+0xe3
00000000`1969f940 00007fff`74030d51 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : kernel32!BaseThreadInitThunk+0x14
00000000`1969f970 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x21


THREAD_SHA1_HASH_MOD_FUNC:  063c29b48983480c91fd071b8c8f53e2156ff3b6

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  69135dc43bf3fdccf1b214fa3444b4c42daee17b

THREAD_SHA1_HASH_MOD:  7674f6f908a3f0f7306b7269a4b5f1bc7c621392

FAULT_INSTR_CODE:  4c038b48

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  shell32!CheckFileTypeForShellNew+32

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: shell32

IMAGE_NAME:  shell32.dll

DEBUG_FLR_IMAGE_TIMESTAMP:  0

STACK_COMMAND:  .ecxr ; kb

FAILURE_BUCKET_ID:  NULL_POINTER_READ_AFTER_CALL_c0000005_shell32.dll!CheckFileTypeForShellNew

BUCKET_ID:  APPLICATION_FAULT_NULL_POINTER_READ_INVALID_POINTER_READ_AFTER_CALL_shell32!CheckFileTypeForShellNew+32

FAILURE_EXCEPTION_CODE:  c0000005

FAILURE_IMAGE_NAME:  shell32.dll

BUCKET_ID_IMAGE_STR:  shell32.dll

FAILURE_MODULE_NAME:  shell32

BUCKET_ID_MODULE_STR:  shell32

FAILURE_FUNCTION_NAME:  CheckFileTypeForShellNew

BUCKET_ID_FUNCTION_STR:  CheckFileTypeForShellNew

BUCKET_ID_OFFSET:  32

BUCKET_ID_MODTIMEDATESTAMP:  0

BUCKET_ID_MODCHECKSUM:  146b7f9

BUCKET_ID_MODVER_STR:  10.0.15063.502

BUCKET_ID_PREFIX_STR:  APPLICATION_FAULT_NULL_POINTER_READ_INVALID_POINTER_READ_AFTER_CALL_

FAILURE_PROBLEM_CLASS:  APPLICATION_FAULT

FAILURE_SYMBOL_NAME:  shell32.dll!CheckFileTypeForShellNew

WATSON_STAGEONE_URL:  http://watson.microsoft.com/StageOne/explorer.exe/10.0.15063.447/951324bb/shell32.dll/10.0.15063.502/944613c6/c0000005/00435616.htm?Retriage=1

TARGET_TIME:  2017-09-04T01:41:00.000Z

OSBUILD:  15063

OSSERVICEPACK:  296

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  256

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt SingleUserTS

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  160101.0800

BUILDLAB_STR:  WinBuild

BUILDOSVER_STR:  10.0.15063.246

ANALYSIS_SESSION_ELAPSED_TIME:  88f4

ANALYSIS_SOURCE:  UM

FAILURE_ID_HASH_STRING:  um:null_pointer_read_after_call_c0000005_shell32.dll!checkfiletypeforshellnew

FAILURE_ID_HASH:  {0f88b991-6467-c004-1402-e5afe6fe01dd}

Followup:     MachineOwner
windows
windows-explorer
windows-update
context-menu
asked on Super User Aug 22, 2017 by Some Nerd • edited Sep 4, 2017 by Some Nerd

0 Answers

Nobody has answered this question yet.


User contributions licensed under CC BY-SA 3.0