Explorer radomly crashes
The (NTSTATUS) 0xc000041d - An unhandled exception was encountered during a user callback crashes are mostly caused by damaged Windows files. Please start the command prompt (cmd.exe) with admin rights [1] and run sfc [2]: sfc.exe /scannow Is it able to find and repair broken files (create the txt file shown under [2] and look if all files are restored)? Now look if the Explorer still crashes. If not, this fixed it. best regards André [1] http://windows.microsoft.com/en-US/windows7/How-do-I-run-an-application-once-with-a-full-administrator-access-token [2] http://support.microsoft.com/kb/929833 "A programmer is just a tool which converts caffeine into code" Want to install RSAT on Windows 7 Sp1? Check my HowTo: http://www.msfn.org/board/index.php?showtopic=150221
March 16th, 2011 7:54pm

This is a rather interesting one. Basically what happens is every now and again (no easy way to reproduce) explorer will just crash when I try and copy/cut and paste a file (CNTRL-C/V or X/V). I have configured Windows 7 to drop a dump file any time an application crashes so I have a dump file, but the results of the dump file are rather cryptic and not much help. Basically it tells me that there was an error in the shell32.dll. I have disable most of my shell extensions. The only one that is still active is my anti-virus. All of my other computers do not have this problem. GetPageUrlData failed, server returned HTTP status 404 URL requested: http://watson.microsoft.com/StageOne/explorer_exe/6_1_7601_17514/4ce7a144/shell32_dll/6_1_7601_17514/4ce7c9a6/c000041d/000a0e49.htm?Retriage=1 FAULTING_IP: shell32!CListViewHost::_ViewSubclassWndProc+39 000007fe`fda60e49 4889542430 mov qword ptr [rsp+30h],rdx EXCEPTION_RECORD: ffffffffffffffff -- (.exr 0xffffffffffffffff) ExceptionAddress: 000007fefda60e49 (shell32!CListViewHost::_ViewSubclassWndProc+0x0000000000000039) ExceptionCode: c000041d ExceptionFlags: 00000001 NumberParameters: 0 DEFAULT_BUCKET_ID: APPLICATION_FAULT PROCESS_NAME: explorer.exe ERROR_CODE: (NTSTATUS) 0xc000041d - An unhandled exception was encountered during a user callback. EXCEPTION_CODE: (NTSTATUS) 0xc000041d - An unhandled exception was encountered during a user callback. MOD_LIST: <ANALYSIS/> NTGLOBALFLAG: 0 APPLICATION_VERIFIER_FLAGS: 0 FAULTING_THREAD: 0000000000000bc0 PRIMARY_PROBLEM_CLASS: APPLICATION_FAULT BUGCHECK_STR: APPLICATION_FAULT_APPLICATION_FAULT LAST_CONTROL_TRANSFER: from 000007fefda60ddf to 000007fefda60e49 STACK_TEXT: 00000000`001f3e40 000007fe`fda60ddf : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!CListViewHost::_ViewSubclassWndProc+0x39 00000000`001f4100 000007fe`fbc569a0 : 00000000`001f4220 00000000`000100fc 00000000`00000308 00000000`00000000 : shell32!CListViewHost::s_ViewSubclassWndProc+0x4f 00000000`001f4150 000007fe`fbc56877 : 00000000`00000000 00000000`000100fc 00000000`00000000 00000000`00000000 : comctl32!CallNextSubclassProc+0x8c 00000000`001f41d0 00000000`76e79bd1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : comctl32!MasterSubclassProc+0xe7 00000000`001f4270 00000000`76e76aa8 : 00000000`0079ed70 000007fe`fbc56790 00000000`000000c8 00000000`00000000 : user32!UserCallWinProcCheckWow+0x1ad 00000000`001f4330 00000000`76e76bad : 00000000`000100fc 00000000`00000308 00000000`00040990 00000000`00000000 : user32!SendMessageWorker+0x682 00000000`001f43c0 000007fe`fdb7ed93 : 00000000`0286aeb0 00000000`00040990 00000000`00000000 00000000`00000000 : user32!SendMessageW+0x5c 00000000`001f4410 000007fe`fda60c63 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!CDefView::WndProc+0xb88 00000000`001f45e0 00000000`76e79bd1 : 000007fe`fda60c00 00000000`00040990 00000000`00000001 00000000`00000001 : shell32!CDefView::s_WndProc+0x7c 00000000`001f4620 00000000`76e73bfc : 00000000`000100fc 000007fe`fda60c00 00000000`00000308 00000000`00040990 : user32!UserCallWinProcCheckWow+0x1ad 00000000`001f46e0 00000000`76e73b78 : 00000000`001f4c90 00000000`00000000 00000000`00000308 00000000`00000000 : user32!CallWindowProcAorW+0xdc 00000000`001f4730 000007fe`fbc56215 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : user32!CallWindowProcW+0x18 00000000`001f4770 000007fe`fbc569a0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : comctl32!CallOriginalWndProc+0x1d 00000000`001f47b0 000007fe`fbc56768 : 00000000`00000000 00000000`000100fc 00000000`00000000 00000000`00000000 : comctl32!CallNextSubclassProc+0x8c 00000000`001f4830 000007fe`fda60a9e : 00000000`00000000 00000000`000100fc 00000000`00000308 00000000`00000000 : comctl32!DefSubclassProc+0x7c 00000000`001f4880 000007fe`fda60eb3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!DefSubclassProc+0x56 00000000`001f48b0 000007fe`fda60ddf : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!CListViewHost::_ViewSubclassWndProc+0x3e1 00000000`001f4b70 000007fe`fbc569a0 : 00000000`001f4c90 00000000`000100fc 00000000`00000308 00000000`00000000 : shell32!CListViewHost::s_ViewSubclassWndProc+0x4f 00000000`001f4bc0 000007fe`fbc56877 : 00000000`00000000 00000000`000100fc 00000000`00000000 00000000`00000000 : comctl32!CallNextSubclassProc+0x8c 00000000`001f4c40 00000000`76e79bd1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : comctl32!MasterSubclassProc+0xe7 00000000`001f4ce0 00000000`76e76aa8 : 00000000`0079ed70 000007fe`fbc56790 00000000`000000c8 00000000`00000000 : user32!UserCallWinProcCheckWow+0x1ad 00000000`001f4da0 00000000`76e76bad : 00000000`000100fc 00000000`00000308 00000000`00040990 00000000`00000000 : user32!SendMessageWorker+0x682 00000000`001f4e30 000007fe`fdb7ed93 : 00000000`0286aeb0 00000000`00040990 00000000`00000000 00000000`00000000 : user32!SendMessageW+0x5c 00000000`001f4e80 000007fe`fda60c63 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!CDefView::WndProc+0xb88 00000000`001f5050 00000000`76e79bd1 : 000007fe`fda60c00 00000000`00040990 00000000`00000001 00000000`00000001 : shell32!CDefView::s_WndProc+0x7c 00000000`001f5090 00000000`76e73bfc : 00000000`000100fc 000007fe`fda60c00 00000000`00000308 00000000`00040990 : user32!UserCallWinProcCheckWow+0x1ad 00000000`001f5150 00000000`76e73b78 : 00000000`001f5700 00000000`00000000 00000000`00000308 00000000`00000000 : user32!CallWindowProcAorW+0xdc 00000000`001f51a0 000007fe`fbc56215 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : user32!CallWindowProcW+0x18 00000000`001f51e0 000007fe`fbc569a0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : comctl32!CallOriginalWndProc+0x1d 00000000`001f5220 000007fe`fbc56768 : 00000000`00000000 00000000`000100fc 00000000`00000000 00000000`00000000 : comctl32!CallNextSubclassProc+0x8c 00000000`001f52a0 000007fe`fda60a9e : 00000000`00000000 00000000`000100fc 00000000`00000308 00000000`00000000 : comctl32!DefSubclassProc+0x7c 00000000`001f52f0 000007fe`fda60eb3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!DefSubclassProc+0x56 00000000`001f5320 000007fe`fda60ddf : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!CListViewHost::_ViewSubclassWndProc+0x3e1 00000000`001f55e0 000007fe`fbc569a0 : 00000000`001f5700 00000000`000100fc 00000000`00000308 00000000`00000000 : shell32!CListViewHost::s_ViewSubclassWndProc+0x4f 00000000`001f5630 000007fe`fbc56877 : 00000000`00000000 00000000`000100fc 00000000`00000000 00000000`00000000 : comctl32!CallNextSubclassProc+0x8c 00000000`001f56b0 00000000`76e79bd1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : comctl32!MasterSubclassProc+0xe7 00000000`001f5750 00000000`76e76aa8 : 00000000`0079ed70 000007fe`fbc56790 00000000`000000c8 00000000`00000000 : user32!UserCallWinProcCheckWow+0x1ad 00000000`001f5810 00000000`76e76bad : 00000000`000100fc 00000000`00000308 00000000`00040990 00000000`00000000 : user32!SendMessageWorker+0x682 00000000`001f58a0 000007fe`fdb7ed93 : 00000000`0286aeb0 00000000`00040990 00000000`00000000 00000000`00000000 : user32!SendMessageW+0x5c 00000000`001f58f0 000007fe`fda60c63 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!CDefView::WndProc+0xb88 00000000`001f5ac0 00000000`76e79bd1 : 000007fe`fda60c00 00000000`00040990 00000000`00000001 00000000`00000001 : shell32!CDefView::s_WndProc+0x7c 00000000`001f5b00 00000000`76e73bfc : 00000000`000100fc 000007fe`fda60c00 00000000`00000308 00000000`00040990 : user32!UserCallWinProcCheckWow+0x1ad 00000000`001f5bc0 00000000`76e73b78 : 00000000`001f6170 00000000`00000000 00000000`00000308 00000000`00000000 : user32!CallWindowProcAorW+0xdc 00000000`001f5c10 000007fe`fbc56215 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : user32!CallWindowProcW+0x18 00000000`001f5c50 000007fe`fbc569a0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : comctl32!CallOriginalWndProc+0x1d 00000000`001f5c90 000007fe`fbc56768 : 00000000`00000000 00000000`000100fc 00000000`00000000 00000000`00000000 : comctl32!CallNextSubclassProc+0x8c 00000000`001f5d10 000007fe`fda60a9e : 00000000`00000000 00000000`000100fc 00000000`00000308 00000000`00000000 : comctl32!DefSubclassProc+0x7c 00000000`001f5d60 000007fe`fda60eb3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!DefSubclassProc+0x56 00000000`001f5d90 000007fe`fda60ddf : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!CListViewHost::_ViewSubclassWndProc+0x3e1 00000000`001f6050 000007fe`fbc569a0 : 00000000`001f6170 00000000`000100fc 00000000`00000308 00000000`00000000 : shell32!CListViewHost::s_ViewSubclassWndProc+0x4f 00000000`001f60a0 000007fe`fbc56877 : 00000000`00000000 00000000`000100fc 00000000`00000000 00000000`00000000 : comctl32!CallNextSubclassProc+0x8c 00000000`001f6120 00000000`76e79bd1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : comctl32!MasterSubclassProc+0xe7 00000000`001f61c0 00000000`76e76aa8 : 00000000`0079ed70 000007fe`fbc56790 00000000`000000c8 00000000`00000000 : user32!UserCallWinProcCheckWow+0x1ad 00000000`001f6280 00000000`76e76bad : 00000000`000100fc 00000000`00000308 00000000`00040990 00000000`00000000 : user32!SendMessageWorker+0x682 00000000`001f6310 000007fe`fdb7ed93 : 00000000`0286aeb0 00000000`00040990 00000000`00000000 00000000`00000000 : user32!SendMessageW+0x5c 00000000`001f6360 000007fe`fda60c63 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!CDefView::WndProc+0xb88 00000000`001f6530 00000000`76e79bd1 : 000007fe`fda60c00 00000000`00040990 00000000`00000001 00000000`00000001 : shell32!CDefView::s_WndProc+0x7c 00000000`001f6570 00000000`76e73bfc : 00000000`000100fc 000007fe`fda60c00 00000000`00000308 00000000`00040990 : user32!UserCallWinProcCheckWow+0x1ad 00000000`001f6630 00000000`76e73b78 : 00000000`001f6be0 00000000`00000000 00000000`00000308 00000000`00000000 : user32!CallWindowProcAorW+0xdc 00000000`001f6680 000007fe`fbc56215 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : user32!CallWindowProcW+0x18 00000000`001f66c0 000007fe`fbc569a0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : comctl32!CallOriginalWndProc+0x1d 00000000`001f6700 000007fe`fbc56768 : 00000000`00000000 00000000`000100fc 00000000`00000000 00000000`00000000 : comctl32!CallNextSubclassProc+0x8c 00000000`001f6780 000007fe`fda60a9e : 00000000`00000000 00000000`000100fc 00000000`00000308 00000000`00000000 : comctl32!DefSubclassProc+0x7c 00000000`001f67d0 000007fe`fda60eb3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!DefSubclassProc+0x56 00000000`001f6800 000007fe`fda60ddf : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!CListViewHost::_ViewSubclassWndProc+0x3e1 00000000`001f6ac0 000007fe`fbc569a0 : 00000000`001f6be0 00000000`000100fc 00000000`00000308 00000000`00000000 : shell32!CListViewHost::s_ViewSubclassWndProc+0x4f 00000000`001f6b10 000007fe`fbc56877 : 00000000`00000000 00000000`000100fc 00000000`00000000 00000000`00000000 : comctl32!CallNextSubclassProc+0x8c 00000000`001f6b90 00000000`76e79bd1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : comctl32!MasterSubclassProc+0xe7 00000000`001f6c30 00000000`76e76aa8 : 00000000`0079ed70 000007fe`fbc56790 00000000`000000c8 00000000`00000000 : user32!UserCallWinProcCheckWow+0x1ad 00000000`001f6cf0 00000000`76e76bad : 00000000`000100fc 00000000`00000308 00000000`00040990 00000000`00000000 : user32!SendMessageWorker+0x682 00000000`001f6d80 000007fe`fdb7ed93 : 00000000`0286aeb0 00000000`00040990 00000000`00000000 00000000`00000000 : user32!SendMessageW+0x5c 00000000`001f6dd0 000007fe`fda60c63 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!CDefView::WndProc+0xb88 00000000`001f6fa0 00000000`76e79bd1 : 000007fe`fda60c00 00000000`00040990 00000000`00000001 00000000`00000001 : shell32!CDefView::s_WndProc+0x7c 00000000`001f6fe0 00000000`76e73bfc : 00000000`000100fc 000007fe`fda60c00 00000000`00000308 00000000`00040990 : user32!UserCallWinProcCheckWow+0x1ad 00000000`001f70a0 00000000`76e73b78 : 00000000`001f7650 00000000`00000000 00000000`00000308 00000000`00000000 : user32!CallWindowProcAorW+0xdc 00000000`001f70f0 000007fe`fbc56215 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : user32!CallWindowProcW+0x18 00000000`001f7130 000007fe`fbc569a0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : comctl32!CallOriginalWndProc+0x1d 00000000`001f7170 000007fe`fbc56768 : 00000000`00000000 00000000`000100fc 00000000`00000000 00000000`00000000 : comctl32!CallNextSubclassProc+0x8c 00000000`001f71f0 000007fe`fda60a9e : 00000000`00000000 00000000`000100fc 00000000`00000308 00000000`00000000 : comctl32!DefSubclassProc+0x7c 00000000`001f7240 000007fe`fda60eb3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!DefSubclassProc+0x56 00000000`001f7270 000007fe`fda60ddf : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shell32!CListViewHost::_ViewSubclassWndProc+0x3e1 00000000`001f7530 000007fe`fbc569a0 : 00000000`001f7650 00000000`000100fc 00000000`00000308 00000000`00000000 : shell32!CListViewHost::s_ViewSubclassWndProc+0x4f 00000000`001f7580 000007fe`fbc56877 : 00000000`00000000 00000000`000100fc 00000000`00000000 00000000`00000000 : comctl32!CallNextSubclassProc+0x8c 00000000`001f7600 00000000`76e79bd1 : 00000000`00000000 00000000`00000000 00000000`00000000 000000 STACK_COMMAND: ~0s; .ecxr ; kb FOLLOWUP_IP: shell32!CListViewHost::_ViewSubclassWndProc+39 000007fe`fda60e49 4889542430 mov qword ptr [rsp+30h],rdx SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: shell32!CListViewHost::_ViewSubclassWndProc+39 FOLLOWUP_NAME: MachineOwner MODULE_NAME: shell32 IMAGE_NAME: shell32.dll DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7c9a6 FAILURE_BUCKET_ID: APPLICATION_FAULT_c000041d_shell32.dll!CListViewHost::_ViewSubclassWndProc BUCKET_ID: X64_APPLICATION_FAULT_APPLICATION_FAULT_shell32!CListViewHost::_ViewSubclassWndProc+39 WATSON_STAGEONE_URL: http://watson.microsoft.com/StageOne/explorer_exe/6_1_7601_17514/4ce7a144/shell32_dll/6_1_7601_17514/4ce7c9a6/c000041d/000a0e49.htm?Retriage=1 Followup: MachineOwner
Free Windows Admin Tool Kit Click here and download it now
March 16th, 2011 8:37pm

Please troubleshoot in Clean Boot Mode. Perform a clean startup to determine whether background programs are interfering with your game or program http://support.microsoft.com/kb/331796 If it does not work, you may use ShellExView. http://www.snapfiles.com/get/shellexview.html Important Note: Microsoft provides third-party contact information to help you find technical support. This contact information may change without notice. Microsoft does not guarantee the accuracy of this third-party contact information. Run ShellExView, in the pane sort the entries with manufacturers. Disable all non-Microsoft *.dll files, and check the result. If the issue does not occur, one of the files can be the culprit. We could narrow down it one by one.Please remember to click Mark as Answer on the post that helps you, and to click Unmark as Answer if a marked post does not actually answer your question. This can be beneficial to other community members reading the thread.
March 18th, 2011 8:21am

This topic is archived. No further replies will be accepted.

Other recent topics Other recent topics