Здравствуйте.
Сразу после запуска Windows при переходе в панель управления "Проводник" прекращает работу. Больше ни при каких действиях падений не наблюдалось.
Удалось снять дамп; помогите, пожалуйста, проанализировать. Пытался сам, но что-то как-то понятия не имею куда тут смотреть:
Скрытый текст
PHP код:

C:UsersKonstantinDesktopBIOS>kdfe_mod explorer.exe_180130_070513.dmp -v
Microsoft (R) Windows Debugger Version 6.3.9600.17336 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:UsersKonstantinDesktopBIOSexplorer.exe_180130_070513.dmp]
Comment: '
*** C:\ProcDump\procdump64.exe -accepteula -e explorer.exe C:\ProcDump\
*** Unhandled exception: C0000005.ACCESS_VIOLATION'
User Mini Dump File: Only registers, stack and portions of memory are available
************* Symbol Path validation summary **************
Response Time (ms) Location
Deferred srv*C:symbols*[url]http://msdl.microsoft.com/download/sym[/url]
bols
************* Symbol Path validation summary **************
Response Time (ms) Location
Deferred srv*C:symbols*[url]http://msdl.microsoft.com/download/sym[/url]
bols
Symbol search path is: srv*C:symbols*[url]http://msdl.microsoft.com/download/symbols[/url]
Executable search path is: srv*C:symbols*[url]http://msdl.microsoft.com/download/symbols[/url]
Windows 7 Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: SingleUserTS
Machine Name:
Debug session time: Tue Jan 30 07:05:13.000 2018 (UTC + 1:00)
System Uptime: not available
Process Uptime: 0 days 0:00:16.000
................................................................
................................................................
.....................................
Loading unloaded module list
......
This dump file has an exception of interest stored in it.
The stored exception information can be accessed via .ecxr.
(760.880): Access violation - code c0000005 (first/second chance not available)
shell32!ILGetSizeAndDepth+0x15:
000007fe`fddca5f9 66453919 cmp word ptr [r9],r11w ds:00000000`000000a9=????
0:019> kd: Reading initial command '!analyze -v; q'
*******************************************************************************
* *
* Exception Analysis *
* *
*******************************************************************************
GetUrlPageData2 (WinHttp) failed: 12002.
FAULTING_IP:
shell32!ILGetSizeAndDepth+15
000007fe`fddca5f9 66453919 cmp word ptr [r9],r11w
EXCEPTION_RECORD: ffffffffffffffff -- (.exr 0xffffffffffffffff)
ExceptionAddress: 000007fefddca5f9 (shell32!ILGetSizeAndDepth+0x0000000000000015)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 00000000000000a9
Attempt to read from address 00000000000000a9
CONTEXT: 0000000000000000 -- (.cxr 0x0;r)
rax=0000999048b37238 rbx=0000000000000000 rcx=00000000000000a9
rdx=0000000000000000 rsi=00000000083aeee8 rdi=00000000000000a9
rip=000007fefddca5f9 rsp=00000000083aed68 rbp=0000000000000000
r8=0000000000000002 r9=00000000000000a9 r10=0000000000000000
r11=0000000000000000 r12=00000000083aeee0 r13=000007fefe192890
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
cs=0033 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010204
shell32!ILGetSizeAndDepth+0x15:
000007fe`fddca5f9 66453919 cmp word ptr [r9],r11w ds:00000000`000000a9=????
DEFAULT_BUCKET_ID: NULL_CLASS_PTR_READ
PROCESS_NAME: explorer.exe
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 00000000000000a9
READ_ADDRESS: 00000000000000a9
FOLLOWUP_IP:
shell32!ILGetSizeAndDepth+15
000007fe`fddca5f9 66453919 cmp word ptr [r9],r11w
NTGLOBALFLAG: 0
APPLICATION_VERIFIER_FLAGS: 0
APP: explorer.exe
ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre
FAULTING_THREAD: 0000000000000880
PRIMARY_PROBLEM_CLASS: NULL_CLASS_PTR_READ
BUGCHECK_STR: APPLICATION_FAULT_NULL_CLASS_PTR_READ
LAST_CONTROL_TRANSFER: from 000007fefddca8b0 to 000007fefddca5f9
STACK_TEXT:
00000000`083aed68 000007fe`fddca8b0 : 00000000`0674e910 000007fe`fd979afa 00000000`0674e910 00000000
`083af0c0 : shell32!ILGetSizeAndDepth+0x15
00000000`083aed70 000007fe`fddcd5e3 : 00000000`083af0c0 00000000`083aee30 00000000`083aeee8 00000000
`02c32a30 : shell32!ILClone+0x20
00000000`083aeda0 000007fe`fddcd7ce : 00000000`02c32a30 000007fe`fd97959f 00000000`04206570 00000000
`083af0c0 : shell32!ILCloneParent+0xb
00000000`083aedd0 000007fe`fddcd757 : 00000000`083aef30 000007fe`fdabe622 00000000`083aef30 00000000
`0424a788 : shell32!SHILCloneParent+0xe
00000000`083aee00 000007fe`fde2260e : 00000000`00000000 00000000`083af180 00000000`083af180 00000000
`0424a788 : shell32!SHBindToFolderIDListParentEx+0x8a
00000000`083aee90 000007fe`fded1b65 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000
`00000108 : shell32!_GetFileInfoSections+0x5a
00000000`083aef50 000007fe`fde05763 : 00000000`002c69d0 00000000`00000000 00000000`00000000 000007fe
`fd491430 : shell32!SHGetFileInfoW+0x19f
00000000`083af1f0 000007fe`fde056b6 : 00000000`0bc6b160 00000000`0bc6b160 00000000`00000004 000007fe
`fdd94e6d : shell32!CControlPanelIconWorkItem::_LoadIcon+0x73
00000000`083af500 000007fe`fde91ef7 : 00000000`0bc77e40 000007fe`fddd2b0b 00000000`083af5f8 000007fe
`fd493790 : shell32!CControlPanelIconWorkItem::DoWork+0x3a
00000000`083af530 000007fe`fdd9c5c8 : 00000000`0672da00 00000000`0bc77e40 00000000`00000000 00000000
`00000cfc : shell32!CFrameTask::InternalResumeRT+0x17
00000000`083af560 000007fe`fddceffb : 80000000`01000000 00000000`083af5f0 ffffffff`fffffffe 00000000
`0000000a : shell32!CRunnableTask::Run+0xda
00000000`083af590 000007fe`fddcef37 : 00000000`0672da20 00000000`0bc2cb90 ffffffff`fffffffe 000007fe
`fd9707e4 : shell32!CShellTask::TT_Run+0x124
00000000`083af5c0 000007fe`fddd2b4e : 00000000`0672da20 00000000`0672da20 00000000`00000000 00000000
`00000000 : shell32!CShellTaskThread::ThreadProc+0xd0
00000000`083af660 000007fe`ff8f3843 : 00000000`02bc2f00 00000000`0672da40 00000000`00000000 00000000
`00000000 : shell32!CShellTaskThread::s_ThreadProc+0x26
00000000`083af690 00000000`777ad13b : 00000000`0666ee40 000007ff`fff90000 00000000`00000000 00000000
`0000000b : shlwapi!ExecuteWorkItemThreadProc+0xf
00000000`083af6c0 00000000`77899e87 : 00000000`00000000 00000000`0672da40 00000000`00312a50 00000000
`04271ad8 : ntdll!RtlpTpWorkCallback+0x16b
00000000`083af7a0 00000000`776959cd : 00000000`00000006 00000001`00010006 00000000`00312a50 00000000
`0666ee40 : ntdll!TppWorkerThread+0x6f7
00000000`083afa30 00000000`777f383d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000
`00000000 : kernel32!BaseThreadInitThunk+0xd
00000000`083afa60 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000
`00000000 : ntdll!RtlUserThreadStart+0x1d
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: shell32!ILGetSizeAndDepth+15
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: shell32
IMAGE_NAME: shell32.dll
DEBUG_FLR_IMAGE_TIMESTAMP: 5a499a78
STACK_COMMAND: ~19s; .ecxr ; kb
FAILURE_BUCKET_ID: NULL_CLASS_PTR_READ_c0000005_shell32.dll!ILGetSizeAndDepth
BUCKET_ID: X64_APPLICATION_FAULT_NULL_CLASS_PTR_READ_shell32!ILGetSizeAndDepth+15
ANALYSIS_SOURCE: UM
FAILURE_ID_HASH_STRING: um:null_class_ptr_read_c0000005_shell32.dll!ilgetsizeanddepth
FAILURE_ID_HASH: {201952d6-4b4c-2872-c9ef-c456d5adfb96}
Followup: MachineOwner
---------
quit:
Для продолжения нажмите любую клавишу . . .
Dump:
http://dropmefiles.com/MhVqY