none
"Windows 7" Windows Explorer stürzt sporadisch ab und wird neu gestartet RRS feed

  • Allgemeine Diskussion

  • Ich möchte gerne herausfinden warum mein "Windows Explorer" sporadisch abstürzt. Die Festplatte und den Speicher habe ich bereits überprüft und beide Komponenten sind fehlerfrei.

    Ich habe ein Notebook auf dem läuft Windows 7 64 Bit. Der Windows Explorer stürzt oft ab und wird dann sofort neu gestartet. Ich habe das Debugging tool for Windows (x64) installiert und das System so eingestellt das es einen Dump im Verzeichniss \localdump erstellt. In diesem Verzeichniss habe ich nun von 2 Abstürzen des Windows Explorers jeweils eine Dump Datei mit dem Namen "explorer.exe.3512" und "explorer.exe.6788" Die Datei "explorer.exe.3512" habe ich in das Tool geladen über den Menüpunkt "Open Crash Dump File" und anschliessend noch den Befehl !analyze -v eingegeben. Ich bekomme nun folgenden Inhalt angezeigt:


    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.


    Loading Dump File [C:\LocalDumps\explorer.exe.3512.dmp]
    User Mini Dump File: Only registers, stack and portions of memory are available

    Symbol search path is: SRV*C:\Windows\Symbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: c:\windows\system32
    Windows 7 Version 7601 (Service Pack 1) MP (4 procs) Free x64
    Product: WinNt, suite: SingleUserTS Personal
    Machine Name:
    Debug session time: Thu Dec 15 23:29:03.000 2011 (UTC + 1:00)
    System Uptime: not available
    Process Uptime: 0 days 7:33:18.000
    ................................................................
    ................................................................
    ................................................................
    ......................
    Loading unloaded module list
    ................................................................
    This dump file has an exception of interest stored in it.
    The stored exception information can be accessed via .ecxr.
    (db8.2288): Unknown exception - code c0000374 (first/second chance not available)
    ntdll!NtWaitForSingleObject+0xa:
    00000000`76fa135a c3              ret
    0:034> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Exception Analysis                                   *
    *                                                                             *
    *******************************************************************************

    *** ERROR: Symbol file could not be found.  Defaulted to export symbols for urlmon.dll -
    *** ERROR: Symbol file could not be found.  Defaulted to export symbols for ieframe.dll -
    GetPageUrlData failed, server returned HTTP status 404
    URL requested: http://watson.microsoft.com/StageOne/explorer_exe/6_1_7601_17567/4d672ee4/ntdll_dll/6_1_7601_17514/4ce7c8f9/c0000374/000c40f2.htm?Retriage=1

    FAULTING_IP:
    ntdll!RtlReportCriticalFailure+62
    00000000`770140f2 eb00            jmp     ntdll!RtlReportCriticalFailure+0x64 (00000000`770140f4)

    EXCEPTION_RECORD:  ffffffffffffffff -- (.exr 0xffffffffffffffff)
    ExceptionAddress: 00000000770140f2 (ntdll!RtlReportCriticalFailure+0x0000000000000062)
       ExceptionCode: c0000374
      ExceptionFlags: 00000001
    NumberParameters: 1
       Parameter[0]: 000000007708b450

    DEFAULT_BUCKET_ID:  STATUS_HEAP_CORRUPTION

    PROCESS_NAME:  explorer.exe

    ERROR_CODE: (NTSTATUS) 0xc0000374 - Ein Heap wurde besch digt.

    EXCEPTION_CODE: (NTSTATUS) 0xc0000374 - Ein Heap wurde besch digt.

    EXCEPTION_PARAMETER1:  000000007708b450

    MOD_LIST: <ANALYSIS/>

    NTGLOBALFLAG:  0

    APPLICATION_VERIFIER_FLAGS:  0

    FAULTING_THREAD:  0000000000002288

    PRIMARY_PROBLEM_CLASS:  STATUS_HEAP_CORRUPTION

    BUGCHECK_STR:  APPLICATION_FAULT_STATUS_HEAP_CORRUPTION

    LAST_CONTROL_TRANSFER:  from 0000000077014736 to 00000000770140f2

    STACK_TEXT: 
    00000000`0624c550 00000000`77014736 : 00000000`00000002 00000000`00000023 00000000`00000003 00000000`00000003 : ntdll!RtlReportCriticalFailure+0x62
    00000000`0624c620 00000000`77015942 : 00000000`0624cfd8 000007fe`fb3f7e55 00000000`00000000 00000000`00000000 : ntdll!RtlpReportHeapFailure+0x26
    00000000`0624c650 00000000`770175f4 : 00000000`003f0000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlpHeapHandleError+0x12
    00000000`0624c680 00000000`76fbdc8f : 00000000`08dfe5b0 00000000`003f0000 00000000`08dfe5c0 000007fe`fd651625 : ntdll!RtlpLogHeapFailure+0xa4
    00000000`0624c6b0 000007fe`fd651582 : 00000000`0624c790 00000000`08dfe5c0 00000000`00000040 00000000`00000000 : ntdll! ?? ::FNODOBFM::`string'+0x10c54
    00000000`0624c730 00000000`76e6b57a : 00000000`08dfe5c0 00000000`00000000 00000000`047eff50 00000000`18000000 : KERNELBASE!LocalFree+0x2e
    00000000`0624c770 00000000`76e0fa39 : 00000000`0624d5e0 00000000`0624d500 00000000`00000000 00000000`0624d5e0 : urlmon!Ordinal114+0x1b5ba
    00000000`0624ce10 00000000`76e0f9bf : 00000000`0624d5e0 00000000`00000000 00000000`0624d4a0 00000000`0bd28650 : urlmon!Ordinal108+0x2425
    00000000`0624ce70 00000000`76e12dc1 : 00000000`0bd28650 00000000`00000005 00000000`0bd28650 00000000`00000000 : urlmon!Ordinal108+0x23ab
    00000000`0624cee0 00000000`76e12ccd : 00000000`0bd284d0 00000000`0624d4c0 00000000`00000000 00000000`0624d5e0 : urlmon!CoInternetGetSecurityUrlEx+0x639
    00000000`0624d460 00000000`76e1ee97 : 00000000`00000000 00000000`0bd284d0 00000000`00000000 00000000`00000000 : urlmon!CoInternetGetSecurityUrlEx+0x545
    00000000`0624d4f0 00000000`76e14127 : 00000000`0bd284d0 00000000`0624d5e0 00000000`00000083 00000000`0912c4f0 : urlmon!CreateURLMoniker+0xb87
    00000000`0624d550 000007fe`ef87d10f : 00000000`047c0d40 00000000`00000000 00000000`0bd284d0 00000000`00000000 : urlmon!CoInternetGetSecurityUrlEx+0x199f
    00000000`0624d5b0 000007fe`ef87d28c : 00000000`00000000 00000000`00000000 00000000`0624e6a0 000007fe`fbdd11ce : EXPLORERFRAME!CShellBrowser::_GetTempZone+0x11e
    00000000`0624e670 000007fe`ef879a8a : 00000000`00000000 00000000`0624ea60 00000000`00000000 00000000`80040100 : EXPLORERFRAME!CShellBrowser::_UpdateZonesPane+0x164
    00000000`0624e950 000007fe`fe2e1d8c : 00000000`80004005 000007fe`0000026f 00000000`0624ea68 000007fe`fe540a36 : EXPLORERFRAME!CShellBrowser::Exec+0x476
    00000000`0624ea20 000007fe`ef87a90c : 00000000`047c0ae0 00000000`00000001 00000000`00000000 00000000`beef0016 : shlwapi!IUnknown_Exec+0x74
    00000000`0624eaa0 000007fe`ef87a122 : 00000000`00000000 00000000`0624edd0 00000000`0624edd0 00000000`00000000 : EXPLORERFRAME!CShellBrowser::_SwitchNavigationState+0x21c
    00000000`0624ed30 000007fe`ef879fcb : 00000000`00000005 00000000`00000000 00000000`045107e0 00000000`047c0ae0 : EXPLORERFRAME!CShellBrowser::_ActivateNavigation+0xfd
    00000000`0624ed70 000007fe`ef879c18 : 00000000`047c0bc8 00000000`00000000 00000003`00000008 00000000`047c0bc8 : EXPLORERFRAME!CShellBrowser::_OnConnectionCreated+0x2b5
    00000000`0624ee90 000007fe`ef879b71 : 00000000`09326bb0 00000000`00000000 00000000`00160460 00000000`0bc52398 : EXPLORERFRAME!CShellBrowser::OnNavigationResult+0x98
    00000000`0624ef00 000007fe`ef8793c9 : 00000000`091d03f0 00000000`80004005 00000000`00160460 00000000`0bc52398 : EXPLORERFRAME!CPendingNavigation::OnConnectionCreated+0x4d
    00000000`0624ef60 000007fe`ef8799c2 : 00000000`00000000 00000000`0000001a 00000000`00000000 00000000`045107e0 : EXPLORERFRAME!CShellViewFactory::BeginCreateConnection+0x116
    00000000`0624efd0 000007fe`ef87961e : 00000000`092f8ed0 00000000`092f8ed0 00000000`092f8ed0 00000000`092f8ed0 : EXPLORERFRAME!CShellBrowser::_CreateConnectionForItem+0x36d
    00000000`0624f190 000007fe`ef879522 : 00000000`00000000 00000000`09251c10 00000000`00200011 00000000`00000000 : EXPLORERFRAME!CShellBrowser::_CreateNewConnection+0xd9
    00000000`0624f1e0 000007fe`ef8d1e5d : 00000000`0bc52398 00000000`00000000 00000000`09251c10 000007fe`fe838768 : EXPLORERFRAME!CShellBrowser::_NavigateToPidl+0x167
    00000000`0624f230 000007fe`ef8d1d89 : 00000000`047c0ae0 00000000`00000700 00000000`00000700 00000000`0624f330 : EXPLORERFRAME!CShellBrowser::_OnGoto+0xeb
    00000000`0624f270 000007fe`ef8705dd : 0000bb3a`00000000 000007fe`fba614e6 00000000`00000000 00000000`00000000 : EXPLORERFRAME!CShellBrowser::WndProcBS+0xc26
    00000000`0624f340 00000000`76a99bd1 : 00000000`00000000 00000000`0256ae80 00000000`00000001 00000000`00000030 : EXPLORERFRAME!IEFrameWndProc+0xef
    00000000`0624f390 00000000`76a998da : 00000000`0624f500 000007fe`ef870570 000007fe`ef9ab550 00000000`00834b10 : user32!UserCallWinProcCheckWow+0x1ad
    00000000`0624f450 000007fe`ef8704b0 : 00000000`0256ae04 00000000`0256ae04 000007fe`ef870570 00000000`00000000 : user32!DispatchMessageWorker+0x3b5
    00000000`0624f4d0 000007fe`ef874925 : 00000000`0256ae80 00000000`00000007 00000000`00000000 00000000`00000000 : EXPLORERFRAME!CExplorerFrame::FrameMessagePump+0x436
    00000000`0624f550 000007fe`ef87509b : 00000000`0256ae80 00000000`046dc7d0 00000000`00000000 00000000`00000000 : EXPLORERFRAME!BrowserThreadProc+0x180
    00000000`0624f5d0 000007fe`ef875032 : 120f1d5a`00000001 00000000`04738fc0 00000000`7fffffff 000007fe`fd659110 : EXPLORERFRAME!BrowserNewThreadProc+0x53
    00000000`0624f600 000007fe`ef86be50 : 00000000`047394a0 00000000`0455fa80 00000000`00000000 000007fe`fe48f19c : EXPLORERFRAME!CExplorerTask::InternalResumeRT+0x12
    00000000`0624f630 000007fe`fe48f0eb : 80000000`01000000 00000000`0624f6c0 00000000`047394a0 00000000`0000000b : EXPLORERFRAME!CRunnableTask::Run+0xda
    00000000`0624f660 000007fe`fe492c8a : 00000000`047394a0 00000000`00000000 00000000`047394a0 00000000`00000002 : shell32!CShellTask::TT_Run+0x124
    00000000`0624f690 000007fe`fe492de2 : 00000000`03e045f0 00000000`03e045f0 00000000`00000000 00000000`00000010 : shell32!CShellTaskThread::ThreadProc+0x1d2
    00000000`0624f730 000007fe`fe2dc71e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!CShellTaskThread::s_ThreadProc+0x22
    00000000`0624f760 00000000`76cf652d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shlwapi!WrapperThreadProc+0x19b
    00000000`0624f860 00000000`76f7c521 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : kernel32!BaseThreadInitThunk+0xd
    00000000`0624f890 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x1d


    FOLLOWUP_IP:
    urlmon!Ordinal114+1b5ba
    00000000`76e6b57a 498bcc          mov     rcx,r12

    SYMBOL_STACK_INDEX:  6

    SYMBOL_NAME:  urlmon!Ordinal114+1b5ba

    FOLLOWUP_NAME:  MachineOwner

    MODULE_NAME: urlmon

    IMAGE_NAME:  urlmon.dll

    DEBUG_FLR_IMAGE_TIMESTAMP:  4eb343db

    STACK_COMMAND:  !heap ; ~34s; .ecxr ; kb

    FAILURE_BUCKET_ID:  STATUS_HEAP_CORRUPTION_c0000374_urlmon.dll!Ordinal114

    BUCKET_ID:  X64_APPLICATION_FAULT_STATUS_HEAP_CORRUPTION_urlmon!Ordinal114+1b5ba

    WATSON_STAGEONE_URL:  http://watson.microsoft.com/StageOne/explorer_exe/6_1_7601_17567/4d672ee4/ntdll_dll/6_1_7601_17514/4ce7c8f9/c0000374/000c40f2.htm?Retriage=1

    Followup: MachineOwner

     

    ==========> kann mir jemand bei diesem Problem helfen?

     

     

    Freitag, 16. Dezember 2011 13:52

Alle Antworten