Windows 7 (64b) Explorer restarting all the time

I am running Windows 7 64b and Explorer crash all the time..

Here is my debug:

User Mini Dump File: Only registers, stack and portions of memory are available

Symbol search path is: SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: SingleUserTS
Machine Name:
Debug session time: Tue Sep 20 22:11:05.000 2011 (UTC + 2:00)
System Uptime: not available
Process Uptime: 0 days 0:51:38.000
................................................................
................................................................
.........................................................
Loading unloaded module list
.......................................................
This dump file has an exception of interest stored in it.
The stored exception information can be accessed via .ecxr.
(930.a40): Access violation - code c0000005 (first/second chance not available)
ntdll!NtWaitForMultipleObjects+0xa:
00000000`771818ca c3              ret
0:000> !analyze -v to get detailed information
*******************************************************************************
*                                                                             *
*                        Exception Analysis                                   *
*                                                                             *
*******************************************************************************

GetPageUrlData failed, server returned HTTP status 404
URL requested: http://watson.microsoft.com/StageOne/explorer_exe/6_1_7601_17567/4d672ee4/ntdll_dll/6_1_7601_17514/4ce7c8f9/c0000005/000532d0.htm?Retriage=1

FAULTING_IP: 
ntdll!RtlFreeHeap+d0
00000000`771832d0 4c8b6308        mov     r12,qword ptr [rbx+8]

EXCEPTION_RECORD:  ffffffffffffffff -- (.exr 0xffffffffffffffff)
ExceptionAddress: 00000000771832d0 (ntdll!RtlFreeHeap+0x00000000000000d0)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 00000e474b588178
Attempt to read from address 00000e474b588178

PROCESS_NAME:  explorer.exe

ERROR_CODE: (NTSTATUS) 0xc0000005 - Instruksjonen i 0x%08lx refererte minne ved adressen 0x%08lx. Minnet kunne ikke v re %s.

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Instruksjonen i 0x%08lx refererte minne ved adressen 0x%08lx. Minnet kunne ikke v re %s.

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  00000e474b588178

READ_ADDRESS:  00000e474b588178 

FOLLOWUP_IP: 
ntdll!RtlFreeHeap+d0
00000000`771832d0 4c8b6308        mov     r12,qword ptr [rbx+8]

MOD_LIST: <ANALYSIS/>

NTGLOBALFLAG:  0

APPLICATION_VERIFIER_FLAGS:  0

LAST_CONTROL_TRANSFER:  from 000007fefeb9a260 to 00000000771832d0

ADDITIONAL_DEBUG_TEXT:  Enable Pageheap/AutoVerifer ; Followup set based on attribute [Is_ChosenCrashFollowupThread] from Frame:[0] on thread:[PSEUDO_THREAD]

FAULTING_THREAD:  0000000000000a40

DEFAULT_BUCKET_ID:  HEAP_CORRUPTION

PRIMARY_PROBLEM_CLASS:  HEAP_CORRUPTION

BUGCHECK_STR:  APPLICATION_FAULT_HEAP_CORRUPTION_HEAP_CORRUPTION_INVALID_POINTER_READ_FILL_PATTERN_ffffffff

STACK_TEXT:  
00000000`000ea960 00000000`771832d0 ntdll!RtlFreeHeap+0xd0
00000000`000ea9e0 000007fe`feb9a260 rpcrt4!LRPC_BINDING_HANDLE::`vector deleting destructor'+0xa0
00000000`000eaa30 000007fe`feb9a539 rpcrt4!LRPC_CCALL::`scalar deleting destructor'+0x59
00000000`000eaa80 000007fe`fec40d2a rpcrt4!NdrpClientCall2+0x13d8
00000000`000eb1f0 000007fe`fec40dfd rpcrt4!NdrClientCall2+0x1d
00000000`000eb220 000007fe`fea76553 sechost!CloseServiceHandle+0x3b
00000000`000eb260 000007fe`f92020c4 cscapi!WPP_SF_s+0x15c
00000000`000eb2a0 000007fe`f9201ff5 cscapi!WPP_SF_s+0x1a9
00000000`000eb310 000007fe`f9201f49 cscapi!OfflineFilesQueryStatus+0x6a
00000000`000eb350 000007fe`fbea17b8 cscui!DllGetClassObject+0xff
00000000`000eb3a0 000007fe`fd9a7952 ole32!CClassCache::CDllPathEntry::DllGetClassObject+0x42
00000000`000eb400 000007fe`fd991806 ole32!CClassCache::CDllFnPtrMoniker::BindToObjectNoSwitch+0x26
00000000`000eb440 000007fe`fd99243f ole32!CClassCache::GetClassObject+0x5f
00000000`000eb4b0 000007fe`fd9922e8 ole32!CServerContextActivator::CreateInstance+0x178
00000000`000eb5d0 000007fe`fd99169a ole32!ActivationPropertiesIn::DelegateCreateInstance+0x5e
00000000`000eb640 000007fe`fd99192c ole32!CApartmentActivator::CreateInstance+0x88
00000000`000eb6e0 000007fe`fd99199e ole32!CProcessActivator::CCICallback+0x4e
00000000`000eb720 000007fe`fd9b6e83 ole32!CProcessActivator::AttemptActivation+0x33
00000000`000eb760 000007fe`fd9b6e17 ole32!CProcessActivator::ActivateByContext+0x7f
00000000`000eb7f0 000007fe`fd992567 ole32!CProcessActivator::CreateInstance+0x77
00000000`000eb830 000007fe`fd99169a ole32!ActivationPropertiesIn::DelegateCreateInstance+0x5e
00000000`000eb8a0 000007fe`fd9917a7 ole32!CClientContextActivator::CreateInstance+0xeb
00000000`000ebb50 000007fe`fd99169a ole32!ActivationPropertiesIn::DelegateCreateInstance+0x5e
00000000`000ebbc0 000007fe`fd992090 ole32!ICoCreateInstanceEx+0x5f5
00000000`000ec710 000007fe`fd9a760b ole32!CoCreateInstance+0x17b
00000000`000ec800 000007fe`fdc651fd shell32!_SHCoCreateInstance+0x209
00000000`000ecb00 000007fe`fdc4a950 shell32!SHExtCoCreateInstance+0x28
00000000`000ecb50 000007fe`fdc2de35 shell32!DCA_SHExtCoCreateInstance+0x3d
00000000`000ecb90 000007fe`fdc2f158 shell32!HDXA_QueryContextMenu+0x287
00000000`000ecdb0 000007fe`fdc2ec65 shell32!CDefFolderMenu::QueryContextMenu+0x625
00000000`000ecfc0 000007fe`fde5c445 shell32!CDefView::_DoContextMenuPopup+0x19d
00000000`000ed390 000007fe`fde5cb35 shell32!CDefView::OnSelectionContextMenu+0x109
00000000`000ed3e0 000007fe`fdf439f6 shell32!CListViewHost::ShowContextMenu+0x1f6
00000000`000ed470 000007fe`fde63294 shell32!CDefView::_OnContextMenu+0x110
00000000`000ed4f0 000007fe`fdd9eb56 shell32!CDefView::WndProc+0x889
00000000`000ed6c0 000007fe`fdc80c63 shell32!CDefView::s_WndProc+0x7c
00000000`000ed700 00000000`76f29bd1 user32!UserCallWinProcCheckWow+0x1ad
00000000`000ed7c0 00000000`76f23bfc user32!CallWindowProcAorW+0xdc
00000000`000ed810 00000000`76f23b78 user32!CallWindowProcW+0x18
00000000`000ed850 000007fe`fbcc6215 comctl32!CallOriginalWndProc+0x1d
00000000`000ed890 000007fe`fbcc69a0 comctl32!CallNextSubclassProc+0x8c
00000000`000ed910 000007fe`fbcc6768 comctl32!DefSubclassProc+0x7c
00000000`000ed960 000007fe`fdc80a9e shell32!DefSubclassProc+0x56
00000000`000ed990 000007fe`fdc80eb3 shell32!CListViewHost::_ViewSubclassWndProc+0x3e1
00000000`000edc50 000007fe`fdc80ddf shell32!CListViewHost::s_ViewSubclassWndProc+0x4f
00000000`000edca0 000007fe`fbcc69a0 comctl32!CallNextSubclassProc+0x8c
00000000`000edd20 000007fe`fbcc6877 comctl32!MasterSubclassProc+0xe7
00000000`000eddc0 00000000`76f29bd1 user32!UserCallWinProcCheckWow+0x1ad
00000000`000ede80 00000000`76f272cb user32!DispatchClientMessage+0xc3
00000000`000edee0 00000000`76f26829 user32!_fnDWORD+0x2d
00000000`000edf40 00000000`77181225 ntdll!KiUserCallbackDispatcherContinue+0x0
00000000`000edfc8 00000000`76f2685a user32!NtUserMessageCall+0xa
00000000`000edfd0 00000000`76f268a2 user32!RealDefWindowProcWorker+0xa4
00000000`000ee0a0 00000000`76f2760e user32!RealDefWindowProcW+0x5a
00000000`000ee0e0 000007fe`fbac1644 uxtheme!_ThemeDefWindowProc+0x278
00000000`000ee190 000007fe`fbac1445 uxtheme!ThemeDefWindowProcW+0x11
00000000`000ee1d0 00000000`76f289d3 user32!DefWindowProcW+0xe6
00000000`000ee220 000007fe`fbd28a9e comctl32!CListView::WndProc+0x2a42
00000000`000ee420 000007fe`fbd26011 comctl32!CListView::s_WndProc+0x6cd
00000000`000ee480 00000000`76f29bd1 user32!UserCallWinProcCheckWow+0x1ad
00000000`000ee540 00000000`76f23bfc user32!CallWindowProcAorW+0xdc
00000000`000ee590 00000000`76f23b78 user32!CallWindowProcW+0x18
00000000`000ee5d0 000007fe`fbcc6215 comctl32!CallOriginalWndProc+0x1d
00000000`000ee610 000007fe`fbcc69a0 comctl32!CallNextSubclassProc+0x8c
00000000`000ee690 000007fe`fbcc6768 comctl32!DefSubclassProc+0x7c
00000000`000ee6e0 000007fe`fdc80a9e shell32!DefSubclassProc+0x56
00000000`000ee710 000007fe`fdc80b7a shell32!CListViewHost::s_ListViewSubclassWndProc+0x31e
00000000`000ee7f0 000007fe`fbcc69a0 comctl32!CallNextSubclassProc+0x8c
00000000`000ee870 000007fe`fbcc6877 comctl32!MasterSubclassProc+0xe7
00000000`000ee910 00000000`76f29bd1 user32!UserCallWinProcCheckWow+0x1ad
00000000`000ee9d0 00000000`76f272cb user32!DispatchClientMessage+0xc3
00000000`000eea30 00000000`76f26829 user32!_fnDWORD+0x2d
00000000`000eea90 00000000`77181225 ntdll!KiUserCallbackDispatcherContinue+0x0
00000000`000eeb18 00000000`76f2685a user32!NtUserMessageCall+0xa
00000000`000eeb20 00000000`76f23838 user32!SendMessageWorker+0x73d
00000000`000eebb0 00000000`76f26bad user32!SendMessageW+0x5c
00000000`000eec00 000007fe`fbdc6824 comctl32!CLVMouseManager::HandleMouse+0xf8c
00000000`000eed60 000007fe`fbd26a38 comctl32!CListView::WndProc+0x9dc
00000000`000eef60 000007fe`fbd26011 comctl32!CListView::s_WndProc+0x6cd
00000000`000eefc0 00000000`76f29bd1 user32!UserCallWinProcCheckWow+0x1ad
00000000`000ef080 00000000`76f23bfc user32!CallWindowProcAorW+0xdc
00000000`000ef0d0 00000000`76f23b78 user32!CallWindowProcW+0x18
00000000`000ef110 000007fe`fbcc6215 comctl32!CallOriginalWndProc+0x1d
00000000`000ef150 000007fe`fbcc69a0 comctl32!CallNextSubclassProc+0x8c
00000000`000ef1d0 000007fe`fbcc6768 comctl32!DefSubclassProc+0x7c
00000000`000ef220 000007fe`fdc80a9e shell32!DefSubclassProc+0x56
00000000`000ef250 000007fe`fdc80b7a shell32!CListViewHost::s_ListViewSubclassWndProc+0x31e
00000000`000ef330 000007fe`fbcc69a0 comctl32!CallNextSubclassProc+0x8c
00000000`000ef3b0 000007fe`fbcc6877 comctl32!MasterSubclassProc+0xe7
00000000`000ef450 00000000`76f29bd1 user32!UserCallWinProcCheckWow+0x1ad
00000000`000ef510 00000000`76f298da user32!DispatchMessageWorker+0x3b5
00000000`000ef590 000007fe`fdc8664e shell32!CDesktopBrowser::_PeekForAMessage+0x17b
00000000`000ef610 000007fe`fdc865a4 shell32!CDesktopBrowser::_MessageLoop+0x24
00000000`000ef650 000007fe`fdbe7765 shell32!SHDesktopMessageLoop+0x7e
00000000`000ef690 00000000`ff840ac1 explorer!wWinMain+0xb1e
00000000`000efd40 00000000`ff84b8d5 explorer!DelayLoadFailureHook+0x208
00000000`000efe00 00000000`7702652d kernel32!BaseThreadInitThunk+0xd
00000000`000efe30 00000000`7715c521 ntdll!RtlUserThreadStart+0x1d


SYMBOL_NAME:  heap_corruption!heap_corruption

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: heap_corruption

IMAGE_NAME:  heap_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

STACK_COMMAND:  .cxr 000EA3A0 ; kb ; dds ea960 ; kb

FAILURE_BUCKET_ID:  HEAP_CORRUPTION_c0000005_heap_corruption!heap_corruption

BUCKET_ID:  X64_APPLICATION_FAULT_HEAP_CORRUPTION_HEAP_CORRUPTION_INVALID_POINTER_READ_FILL_PATTERN_ffffffff_heap_corruption!heap_corruption

WATSON_STAGEONE_URL:  http://watson.microsoft.com/StageOne/explorer_exe/6_1_7601_17567/4d672ee4/ntdll_dll/6_1_7601_17514/4ce7c8f9/c0000005/000532d0.htm?Retriage=1

Followup: MachineOwner


-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Symbol search path is: SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: SingleUserTS
Machine Name:
Debug session time: Tue Sep 20 07:26:07.000 2011 (UTC + 2:00)
System Uptime: not available
Process Uptime: 0 days 0:52:00.000
................................................................
................................................................
.............................................................
Loading unloaded module list
..............................................
This dump file has an exception of interest stored in it.
The stored exception information can be accessed via .ecxr.
(1768.d60): Access violation - code c0000005 (first/second chance not available)
ntdll!NtWaitForMultipleObjects+0xa:
00000000`771818ca c3              ret
0:021> !analyze -v to get detailed information
*******************************************************************************
*                                                                             *
*                        Exception Analysis                                   *
*                                                                             *
*******************************************************************************

GetPageUrlData failed, server returned HTTP status 404
URL requested: http://watson.microsoft.com/StageOne/explorer_exe/6_1_7601_17567/4d672ee4/shell32_dll/6_1_7601_17514/4ce7c9a6/c0000005/0009a6a7.htm?Retriage=1

FAULTING_IP: 
shell32!CByteHashTable::_LookupEntry+47
000007fe`fdc7a6a7 8b4b08          mov     ecx,dword ptr [rbx+8]

EXCEPTION_RECORD:  ffffffffffffffff -- (.exr 0xffffffffffffffff)
ExceptionAddress: 000007fefdc7a6a7 (shell32!CByteHashTable::_LookupEntry+0x0000000000000047)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

DEFAULT_BUCKET_ID:  INVALID_POINTER_READ

PROCESS_NAME:  explorer.exe

ERROR_CODE: (NTSTATUS) 0xc0000005 - Instruksjonen i 0x%08lx refererte minne ved adressen 0x%08lx. Minnet kunne ikke v re %s.

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Instruksjonen i 0x%08lx refererte minne ved adressen 0x%08lx. Minnet kunne ikke v re %s.

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS:  ffffffffffffffff 

FOLLOWUP_IP: 
shell32!CByteHashTable::_LookupEntry+47
000007fe`fdc7a6a7 8b4b08          mov     ecx,dword ptr [rbx+8]

MOD_LIST: <ANALYSIS/>

NTGLOBALFLAG:  0

APPLICATION_VERIFIER_FLAGS:  0

FAULTING_THREAD:  0000000000000d60

PRIMARY_PROBLEM_CLASS:  INVALID_POINTER_READ

BUGCHECK_STR:  APPLICATION_FAULT_INVALID_POINTER_READ

LAST_CONTROL_TRANSFER:  from 000007fefdc7a800 to 000007fefdc7a6a7

STACK_TEXT:  
00000000`0391e280 000007fe`fdc7a800 : 00000000`00000000 00000000`00000008 00000000`00000000 000007fe`fe043be8 : shell32!CByteHashTable::_LookupEntry+0x47
00000000`0391e2e0 000007fe`fdc6819f : 00000000`00000000 00000000`05f08b90 00000000`05f08b90 00000000`05f08da0 : shell32!CByteHashTable::_GetValue+0x88
00000000`0391e330 000007fe`fdc83d08 : 00000000`05f08b80 ffffffff`fda158e0 00000000`05f08b80 00000000`63f730c8 : shell32!CPrivateProfileCache::RetrieveINIFile+0xb6
00000000`0391e3a0 000007fe`fdc680d3 : 00000000`00000000 00000000`0391e470 00000000`00100000 00000000`09298930 : shell32!CPrivateProfile::Initialize+0x16d
00000000`0391e3f0 000007fe`fdd07b43 : 00000000`00000000 00000000`09298930 00000000`05f08b80 00000000`00000000 : shell32!SHGetCachedPrivateProfile+0x57
00000000`0391e430 000007fe`fdc520d9 : 00000000`00000000 00000000`09298930 000007fe`00000002 00000000`00000074 : shell32!CFSPropertyStoreFactory::_GetDesktopIniStore+0xf8
00000000`0391e6d0 000007fe`fdd329f9 : 00000000`80004003 00000000`80004003 00000000`80004003 00000000`07eb1500 : shell32!CFSPropertyStoreFactory::_GetFileStore+0x199
00000000`0391e9a0 000007fe`fdd2c482 : 00000000`00000000 00000000`00000000 000007fe`fbb92bb0 00000000`07eed770 : shell32!CFSPropertyStoreFactory::_GetDelayedPropertyStore+0xdd
00000000`0391eec0 000007fe`fbb4924c : 00000000`00000000 00000000`7a00007a 00000000`00000000 00000000`07eed770 : shell32!CFSPropertyStoreFactory::GetDelayedPropertyStore+0x22
00000000`0391ef00 000007fe`fbb25bf4 : 0000774f`e5ad9bf6 00000000`00000000 00000000`0391f6d0 00000000`0391f6d0 : propsys!CDelayedPropertyStore::v_GetDelegate+0xa0
00000000`0391ef90 000007fe`fbb25b32 : 00000000`09238730 00000000`00000000 00000000`000000c0 00000000`00090000 : propsys!CMultiplexPropertyStore::_GetValue+0xb3
00000000`0391f040 000007fe`fbb24cc9 : 00000000`0009ed70 00000000`00098620 00000000`00090288 00000000`00098620 : propsys!CMultiplexPropertyStore::GetValue+0x12
00000000`0391f080 000007fe`fbb25c1e : 00000000`00000000 00000000`0391f6d0 00000000`0391f6d0 00000000`0391f6d0 : propsys!PSGetValueAndPath+0xae
00000000`0391f110 000007fe`fbb25b32 : 00000000`05e54328 000007fe`fbb210e4 00000000`091ea1f0 000007fe`fbb90be0 : propsys!CMultiplexPropertyStore::_GetValue+0xdd
00000000`0391f1c0 000007fe`fbb24cc9 : 00000000`07ef1fd0 000007fe`fbb90be0 000007fe`fbb90120 00000000`091ea1f0 : propsys!CMultiplexPropertyStore::GetValue+0x12
00000000`0391f200 000007fe`fbb24bb9 : 00000000`00000000 000007fe`fbb27996 00000000`00000000 00000000`0391f350 : propsys!PSGetValueAndPath+0xae
00000000`0391f290 000007fe`fbb24af1 : 00000000`0391f6d0 00000000`80004005 00000000`0391f6d0 00000000`0391f6d0 : propsys!CPropertyProvider::_GetValue+0xc8
00000000`0391f320 000007fe`fbb24a5e : 00000000`090ec710 000007fe`fbb2db6d 00000000`090ec710 00000000`00000000 : propsys!CPropertyProvider::_GetValueHelper+0x85
00000000`0391f3b0 000007fe`fdc2a1d0 : 00000000`0912f8a0 00000000`00000000 00000000`090ec718 00000000`0391f518 : propsys!CPropertyProvider::GetValue+0x12
00000000`0391f3f0 000007fe`fdc29f83 : 00000000`00000000 00000000`00000000 00000000`0912f8a0 00000000`00000000 : shell32!ItemStore_ExtractProperty+0x1d6
00000000`0391f480 000007fe`fdd52a2b : 00000000`0912f8a0 00000000`0912f8a0 00000000`00000004 00000000`093b5c40 : shell32!ItemStore_GetCachedProperty+0x4c8
00000000`0391f5a0 000007fe`fdd56559 : 00000000`090f4ee0 00000000`091fd540 00000000`093b5c40 00000000`093b5c40 : shell32!CCachedShellItem::GetValue+0x170
00000000`0391f660 000007fe`fdc4c684 : 00000000`093e30c0 00000000`093b5c40 00000000`00000000 000007fe`fdc44fcd : shell32!CPropertyTask::InternalResumeRT+0x233
00000000`0391f740 000007fe`fdc7f0eb : 80000000`01000000 00000000`0391f7d0 00000000`093e30c0 00000000`0000000a : shell32!CRunnableTask::Run+0xda
00000000`0391f770 000007fe`fdc82c8a : 00000000`093e30c0 00000000`00000000 00000000`093e30c0 00000000`00000002 : shell32!CShellTask::TT_Run+0x124
00000000`0391f7a0 000007fe`fdc82de2 : 00000000`093061c0 00000000`093061c0 00000000`00000000 00000000`00000000 : shell32!CShellTaskThread::ThreadProc+0x1d2
00000000`0391f840 000007fe`fecd3843 : 000007ff`fffd9000 00000000`036e1fb0 00000000`000d3000 00000000`00000000 : shell32!CShellTaskThread::s_ThreadProc+0x22
00000000`0391f870 00000000`771515ab : 00000000`07e205a0 00000000`07e205a0 00000000`036e1fb0 00000000`00000002 : shlwapi!ExecuteWorkItemThreadProc+0xf
00000000`0391f8a0 00000000`77150c26 : 00000000`00000000 00000000`093061a0 00000000`000d3000 00000000`05fe0768 : ntdll!RtlpTpWorkCallback+0x16b
00000000`0391f980 00000000`7702652d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!TppWorkerThread+0x5ff
00000000`0391fc80 00000000`7715c521 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : kernel32!BaseThreadInitThunk+0xd
00000000`0391fcb0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x1d


SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  shell32!CByteHashTable::_LookupEntry+47

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: shell32

IMAGE_NAME:  shell32.dll

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce7c9a6

STACK_COMMAND:  ~21s; .ecxr ; kb

FAILURE_BUCKET_ID:  INVALID_POINTER_READ_c0000005_shell32.dll!CByteHashTable::_LookupEntry

BUCKET_ID:  X64_APPLICATION_FAULT_INVALID_POINTER_READ_shell32!CByteHashTable::_LookupEntry+47

WATSON_STAGEONE_URL:  http://watson.microsoft.com/StageOne/explorer_exe/6_1_7601_17567/4d672ee4/shell32_dll/6_1_7601_17514/4ce7c9a6/c0000005/0009a6a7.htm?Retriage=1

Followup: MachineOwner

---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Symbol search path is: SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: SingleUserTS
Machine Name:
Debug session time: Tue Sep 20 21:19:27.000 2011 (UTC + 2:00)
System Uptime: not available
Process Uptime: 0 days 1:02:20.000
................................................................
................................................................
.........................................................
Loading unloaded module list
.........................................................
This dump file has an exception of interest stored in it.
The stored exception information can be accessed via .ecxr.
(31c.544): Unknown exception - code c0000374 (first/second chance not available)
ntdll!NtWaitForSingleObject+0xa:
00000000`7718135a c3              ret
0:022> !analyze -v to get detailed information
*******************************************************************************
*                                                                             *
*                        Exception Analysis                                   *
*                                                                             *
*******************************************************************************

Cannot find frame 0x9, previous scope unchanged
GetPageUrlData failed, server returned HTTP status 404
URL requested: http://watson.microsoft.com/StageOne/explorer_exe/6_1_7601_17567/4d672ee4/ntdll_dll/6_1_7601_17514/4ce7c8f9/c0000374/000c40f2.htm?Retriage=1

FAULTING_IP: 
ntdll!RtlReportCriticalFailure+62
00000000`771f40f2 eb00            jmp     ntdll!RtlReportCriticalFailure+0x64 (00000000`771f40f4)

EXCEPTION_RECORD:  ffffffffffffffff -- (.exr 0xffffffffffffffff)
ExceptionAddress: 00000000771f40f2 (ntdll!RtlReportCriticalFailure+0x0000000000000062)
   ExceptionCode: c0000374
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 000000007726b450

DEFAULT_BUCKET_ID:  STATUS_HEAP_CORRUPTION

PROCESS_NAME:  explorer.exe

ERROR_CODE: (NTSTATUS) 0xc0000374 - En heap har blitt skadet.

EXCEPTION_CODE: (NTSTATUS) 0xc0000374 - En heap har blitt skadet.

EXCEPTION_PARAMETER1:  000000007726b450

MOD_LIST: <ANALYSIS/>

NTGLOBALFLAG:  0

APPLICATION_VERIFIER_FLAGS:  0

FAULTING_THREAD:  0000000000000544

PRIMARY_PROBLEM_CLASS:  STATUS_HEAP_CORRUPTION

BUGCHECK_STR:  APPLICATION_FAULT_STATUS_HEAP_CORRUPTION

LAST_CONTROL_TRANSFER:  from 00000000771f4736 to 00000000771f40f2

STACK_TEXT:  
00000000`052df280 00000000`771f4736 : 00000000`00000002 00000000`00000023 00000000`89090080 00000000`00000003 : ntdll!RtlReportCriticalFailure+0x62
00000000`052df350 00000000`771f5942 : 00000000`00000000 00000000`0029b390 00000000`00362750 00000000`77156655 : ntdll!RtlpReportHeapFailure+0x26
00000000`052df380 00000000`771f75f4 : 00000000`00280000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlpHeapHandleError+0x12
00000000`052df3b0 00000000`7719dc8f : 00000000`09e14870 00000000`00280000 00000000`09e14880 00000000`00000000 : ntdll!RtlpLogHeapFailure+0xa4
00000000`052df3e0 000007fe`feba448a : 00000000`00000000 00000000`09d012a0 00000000`0b875090 00000000`0b968ba0 : ntdll! ?? ::FNODOBFM::`string'+0x10c54
00000000`052df460 000007fe`feb884de : 00000000`00000000 00000000`00000001 00000000`0b968ba0 000007fe`feb888ee : rpcrt4!DCE_BINDING::~DCE_BINDING+0x1a
00000000`052df490 000007fe`feb8b917 : 00000000`0b875090 00000000`00000000 00000000`0b968ba0 00000000`000006bf : rpcrt4!DCE_BINDING::`scalar deleting destructor'+0xe
00000000`052df4c0 000007fe`feb8b8b4 : 00000000`00000001 00000000`00000001 00000000`0b704ea0 00000000`00000000 : rpcrt4!OSF_CASSOCIATION::~OSF_CASSOCIATION+0x37
00000000`052df4f0 000007fe`febaf074 : 00000000`034f1cc4 00000000`0b9751a0 00000000`0b968ba0 00000000`00000000 : rpcrt4!OSF_CASSOCIATION::`vector deleting destructor'+0x14
00000000`052df520 000007fe`feb732a5 : 00000000`034f1cc4 00000000`00000000 00000000`0b968ba0 00000000`00000000 : rpcrt4!REFERENCED_OBJECT::FreeObject+0x14
00000000`052df550 000007fe`feb84c19 : 00000000`00000000 00000000`002c18b0 00000000`002c1960 00000000`052df718 : rpcrt4!OSF_CASSOCIATION::OsfDeleteLingeringAssociations+0x14a
00000000`052df580 00000000`771463e5 : 00000000`002c18b0 00000000`00000000 00000000`002c1960 00000000`052df718 : rpcrt4!PerformGarbageCollection+0xf8
00000000`052df5b0 00000000`77146bd2 : 00000000`002c2da0 00000000`772345e8 00000000`00000000 00000000`77234610 : ntdll!TppTimerpExecuteCallback+0x105
00000000`052df610 00000000`7702652d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!TppWorkerThread+0x6c9
00000000`052df910 00000000`7715c521 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : kernel32!BaseThreadInitThunk+0xd
00000000`052df940 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x1d


FOLLOWUP_IP: 
rpcrt4!DCE_BINDING::~DCE_BINDING+1a
000007fe`feba448a 488b4b10        mov     rcx,qword ptr [rbx+10h]

SYMBOL_STACK_INDEX:  5

SYMBOL_NAME:  rpcrt4!DCE_BINDING::~DCE_BINDING+1a

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: rpcrt4

IMAGE_NAME:  rpcrt4.dll

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce7c96e

STACK_COMMAND:  ~22s; .ecxr ; kb

FAILURE_BUCKET_ID:  STATUS_HEAP_CORRUPTION_c0000374_rpcrt4.dll!DCE_BINDING::_DCE_BINDING

BUCKET_ID:  X64_APPLICATION_FAULT_STATUS_HEAP_CORRUPTION_rpcrt4!DCE_BINDING::_DCE_BINDING+1a

WATSON_STAGEONE_URL:  http://watson.microsoft.com/StageOne/explorer_exe/6_1_7601_17567/4d672ee4/ntdll_dll/6_1_7601_17514/4ce7c8f9/c0000374/000c40f2.htm?Retriage=1

Followup: MachineOwner
---------

Answer
Answer

The problem may be a problematic third party context menu handler.

The following link has some info and a download to ShellExView which you can use to selectively disable third party context menu handlers to find out a problematic one:

http://windowsxp.mvps.org/slowrightclick.htm

If this is the same problem as here start with disabling Avast's context menu entries.

 

 

Was this reply helpful?

Sorry this didn't help.

Great! Thanks for your feedback.

How satisfied are you with this reply?

Thanks for your feedback, it helps us improve the site.

How satisfied are you with this reply?

Thanks for your feedback.

 
 

Question Info


Last updated March 13, 2018 Views 1,915 Applies to: