Crash of DO direct after restore of groups

Many times every day (about 5 times every day) I use context menu on tabs in order to restore my saved layouts of tabs. Most of the time it works perfect. But sometimes (1-3 times every week) I get crash of DO direct after restore of layout.
This problem I had with older versions to, so it is not a problem of the current release. I was unable to reproduce this problem up to now.

Today I had new effect after crash:

Details view:

  • Rows of files have now gray (#404040) back color. Folders are normal with white back color.

Thumbnails view:

  • Names of files have now black (#000000) back color. So I don't see the name now because text has black text color to. Like in details view no changes for folders.

Like every time I did not select to save anything at crash, so I don't understand why some color was changed.


Following settings I needed to change in order to restore default colors:

Display \ Colors and Fonts \ File and Folder Colors \ File and Fonders

Values after crash:
Files - Unselected text: Transparent
Files - Unselected background: Black

Values after manual restore:
Files - Unselected text: Black
Files - Unselected background: Transparent

Why values were switched after / at crash I don't know, but now I can see names of files without problems.

Sorry, I had forgot to attach crash dialog: ACCESS_VIOLATION

I have looked into the dumps and found many times the same stacktrace:

> ntdll.dll!RtlSizeHeap() shell32.dll!CTCoAllocPolicy::_CoTaskMemSize(void *) shell32.dll!ILClone() shell32.dll!GetCurFolderImpl() shell32.dll!_GetIDListFromObjectWorker(struct IUnknown *,struct _ITEMIDLIST_ABSOLUTE * *) shell32.dll!SHGetIDListFromObject() shell32.dll!CRegFolder::_GetFolderIDList(void) shell32.dll!CRegFolder::_CreateCachedRegFolder(struct IDLREGITEM const *,struct IBindCtx *,struct _GUID const &,void * *) shell32.dll!CRegFolder::_BindToItem(struct IDLREGITEM const *,struct IBindCtx *,struct _GUID const &,void * *,int) shell32.dll!CRegFolder::BindToObject(struct _ITEMIDLIST_RELATIVE const *,struct IBindCtx *,struct _GUID const &,void * *) shell32.dll!SHBindToObject() shell32.dll!CDesktopFolder::_GetFolderForParsing(unsigned short const *,struct IBindCtx *,struct IShellFolder * *,struct _ITEMIDLIST_ABSOLUTE * *) shell32.dll!CDesktopFolder::ParseDisplayName(struct HWND__ *,struct IBindCtx *,unsigned short *,unsigned long *,struct _ITEMIDLIST_RELATIVE * *,unsigned long *) shell32.dll!CRegFolder::ParseDisplayName(struct HWND__ *,struct IBindCtx *,unsigned short *,unsigned long *,struct _ITEMIDLIST_RELATIVE * *,unsigned long *) dopus.exe!000000013f821c4a()

That stack suggests that something has corrupted the shared memory heap used by the shell (among other things).

Unfortunately, what usually happens it that something corrupts the heap but doesn't cause a crash, and then a moment later some other innocent code tries to use the heap and crashes because it is corrupt. So the stack trace probably isn't showing the guilty code/component.

If something is corrupting the heap, or corrupting memory in general, it could also explain the other strange behaviours. (All bets are off at that stage, basically.)

The problem is most likely to be caused by a shell extension, and the Crash, exit or high CPU when viewing certain directories guide has suggestions on how to track it down.

I'm assuming that you're happy with fairly technical tools, since you were able to get the stacktrace. If so, you may also want to try using PageHeap. PageHeap will often catch the corruption the moment it happens, causing a crash as soon as the mess is made rather than when something else trips over the mess, and thus generating a stacktrace which points to the likely culprit. Details on enabling PageHeap can be found here: Re: Dopus Rename/Copy Crash.

(If you use PageHeap, remember to turn it off and restart Opus afterwards, since it can significantly slow down the process due to all the extra checks it performs.)

At the moment I have enabled PageHeap and attached WinDbg to DO.
I have disabled all non microsoft shell extensions except the one of DO.

I still get exceptions. For example like this:

Sun Apr 6 09:08:00.509 2014 (UTC + 2:00): ModLoad: 000007fe`f2020000 000007fe`f20f5000 C:\Program Files\GPSoftware\Directory Opus\VFSPlugins\opus7zip.dll Sun Apr 6 09:08:00.511 2014 (UTC + 2:00): ModLoad: 000007fe`fd9c0000 000007fe`fda57000 C:\Windows\system32\COMDLG32.dll Sun Apr 6 09:16:58.938 2014 (UTC + 2:00): ModLoad: 000007fe`f3050000 000007fe`f3125000 C:\Program Files\GPSoftware\Directory Opus\VFSPlugins\opus7zip.dll Sun Apr 6 09:16:58.940 2014 (UTC + 2:00): ModLoad: 000007fe`fd9c0000 000007fe`fda57000 C:\Windows\system32\COMDLG32.dll Sun Apr 6 09:17:15.595 2014 (UTC + 2:00): ModLoad: 000007fe`f9b90000 000007fe`f9baf000 C:\Windows\system32\thumbcache.dll Sun Apr 6 09:17:15.668 2014 (UTC + 2:00): ModLoad: 000007fe`fcab0000 000007fe`fcacf000 C:\Windows\system32\thumbcache.dll Sun Apr 6 09:17:15.682 2014 (UTC + 2:00): ModLoad: 000007fe`f9b90000 000007fe`f9baf000 C:\Windows\system32\thumbcache.dll Sun Apr 6 09:17:15.692 2014 (UTC + 2:00): ModLoad: 000007fe`fcab0000 000007fe`fcacf000 C:\Windows\system32\thumbcache.dll Sun Apr 6 09:17:15.719 2014 (UTC + 2:00): ModLoad: 000007fe`f9b90000 000007fe`f9baf000 C:\Windows\system32\thumbcache.dll Sun Apr 6 09:17:15.733 2014 (UTC + 2:00): ModLoad: 000007fe`fcab0000 000007fe`fcacf000 C:\Windows\system32\thumbcache.dll Sun Apr 6 09:17:33.307 2014 (UTC + 2:00): (880.f64): Access violation - code c0000005 (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. *** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\Program Files\GPSoftware\Directory Opus\dopus.exe - dopus+0x48f632: 00000001`3feff632 f0ff4b08 lock dec dword ptr [rbx+8] ds:00000000`36058f88=???????? *** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\Program Files\GPSoftware\Directory Opus\dopuslib.dll -

# Child-SP RetAddr Call Site 00 00000000`2c58f130 00000001`3fefa6db dopus+0x48f632 01 00000000`2c58f160 00000001`3fef3dfe dopus+0x48a6db 02 00000000`2c58f1b0 00000000`77319bd1 dopus+0x483dfe 03 00000000`2c58f200 00000000`77313bfc user32!UserCallWinProcCheckWow+0x1ad 04 00000000`2c58f2c0 00000000`77313b78 user32!CallWindowProcAorW+0xdc 05 00000000`2c58f310 000007fe`fbd56215 user32!CallWindowProcW+0x18 06 00000000`2c58f350 000007fe`fbd569a0 COMCTL32!CallOriginalWndProc+0x1d 07 00000000`2c58f390 000007fe`fbd56768 COMCTL32!CallNextSubclassProc+0x8c 08 00000000`2c58f410 00000001`3fae66d1 COMCTL32!DefSubclassProc+0x7c 09 00000000`2c58f460 00000001`3fba213e dopus+0x766d1 0a 00000000`2c58f4b0 000007fe`fbd569a0 dopus+0x13213e 0b 00000000`2c58f500 000007fe`fbd56768 COMCTL32!CallNextSubclassProc+0x8c 0c 00000000`2c58f580 00000001`3fae66d1 COMCTL32!DefSubclassProc+0x7c 0d 00000000`2c58f5d0 00000001`3fba39d4 dopus+0x766d1 0e 00000000`2c58f620 00000000`77319bd1 dopus+0x1339d4 0f 00000000`2c58f6a0 00000000`77313bfc user32!UserCallWinProcCheckWow+0x1ad 10 00000000`2c58f760 00000000`77313b78 user32!CallWindowProcAorW+0xdc 11 00000000`2c58f7b0 000007fe`fbd569a0 user32!CallWindowProcW+0x18 12 00000000`2c58f7f0 000007fe`fbd56768 COMCTL32!CallNextSubclassProc+0x8c 13 00000000`2c58f870 00000001`3fae66d1 COMCTL32!DefSubclassProc+0x7c 14 00000000`2c58f8c0 00000001`3fba213e dopus+0x766d1 15 00000000`2c58f910 000007fe`fbd569a0 dopus+0x13213e 16 00000000`2c58f960 000007fe`fbd56877 COMCTL32!CallNextSubclassProc+0x8c 17 00000000`2c58f9e0 00000000`77319bd1 COMCTL32!MasterSubclassProc+0xe7 18 00000000`2c58fa80 00000000`773198da user32!UserCallWinProcCheckWow+0x1ad 19 00000000`2c58fb40 00000001`4011a1c8 user32!DispatchMessageWorker+0x3b5 1a 00000000`2c58fbc0 000007fe`f3a92211 dopus+0x6aa1c8 1b 00000000`2c58fc20 000007fe`f3ade92b dopuslib!IsWow64+0x31 1c 00000000`2c58fc50 000007fe`f3adeb76 dopuslib!DummyDllFunctionToAvoidSymbolConfusion+0x4a14b 1d 00000000`2c58fc80 00000000`7741652d dopuslib!DummyDllFunctionToAvoidSymbolConfusion+0x4a396 1e 00000000`2c58fcb0 00000000`7754c541 kernel32!BaseThreadInitThunk+0xd 1f 00000000`2c58fce0 00000000`00000000 ntdll!RtlUserThreadStart+0x1d

Now I had get this exception to (never get this before):

[code]Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.

*** wait with pending attach
Symbol search path is: SRVC:\LocalSymbolshttp://msdl.microsoft.com/download/symbols
Executable search path is:
Sun Apr 6 09:29:45.341 2014 (UTC + 2:00): ModLoad: 000000013fcd0000 0000000140e5d000 C:\Program Files\GPSoftware\Directory Opus\dopus.exe
Sun Apr 6 09:29:45.341 2014 (UTC + 2:00): ModLoad: 0000000077520000 00000000776c9000 C:\Windows\SYSTEM32\ntdll.dll
Sun Apr 6 09:29:45.351 2014 (UTC + 2:00): ModLoad: 000007fef39e0000 000007fef3a4e000 C:\Windows\system32\verifier.dll
Sun Apr 6 09:29:45.351 2014 (UTC + 2:00): ModLoad: 0000000077400000 000000007751f000 C:\Windows\system32\kernel32.dll
Sun Apr 6 09:29:45.352 2014 (UTC + 2:00): ModLoad: 000007fefd500000 000007fefd56b000 C:\Windows\system32\KERNELBASE.dll
Sun Apr 6 09:29:45.352 2014 (UTC + 2:00): ModLoad: 000007fefcc80000 000007fefcc9e000 C:\Windows\system32\USERENV.dll
Sun Apr 6 09:29:45.352 2014 (UTC + 2:00): ModLoad: 000007feff3f0000 000007feff48f000 C:\Windows\system32\msvcrt.dll
Sun Apr 6 09:29:45.352 2014 (UTC + 2:00): ModLoad: 000007feff4b0000 000007feff5dd000 C:\Windows\system32\RPCRT4.dll
Sun Apr 6 09:29:45.352 2014 (UTC + 2:00): ModLoad: 000007fefd2d0000 000007fefd2df000 C:\Windows\system32\profapi.dll
Sun Apr 6 09:29:45.352 2014 (UTC + 2:00): ModLoad: 000007fefcad0000 000007fefcadc000 C:\Windows\system32\VERSION.dll
Sun Apr 6 09:29:45.352 2014 (UTC + 2:00): ModLoad: 000007fefd700000 000007fefd940000 C:\Windows\system32\WININET.dll
Sun Apr 6 09:29:45.352 2014 (UTC + 2:00): ModLoad: 000007fefd6b0000 000007fefd6b4000 C:\Windows\system32\api-ms-win-downlevel-user32-l1-1-0.dll
Sun Apr 6 09:29:45.353 2014 (UTC + 2:00): ModLoad: 0000000077300000 00000000773fa000 C:\Windows\system32\user32.DLL
Sun Apr 6 09:29:45.353 2014 (UTC + 2:00): ModLoad: 000007fefdfe0000 000007fefe047000 C:\Windows\system32\GDI32.dll
Sun Apr 6 09:29:45.353 2014 (UTC + 2:00): ModLoad: 000007feff5e0000 000007feff5ee000 C:\Windows\system32\LPK.dll
Sun Apr 6 09:29:45.353 2014 (UTC + 2:00): ModLoad: 000007feff2f0000 000007feff3b9000 C:\Windows\system32\USP10.dll
Sun Apr 6 09:29:45.353 2014 (UTC + 2:00): ModLoad: 000007fefd6a0000 000007fefd6a4000 C:\Windows\system32\api-ms-win-downlevel-shlwapi-l1-1-0.dll
Sun Apr 6 09:29:45.353 2014 (UTC + 2:00): ModLoad: 000007fefd940000 000007fefd9b1000 C:\Windows\system32\shlwapi.DLL
Sun Apr 6 09:29:45.354 2014 (UTC + 2:00): ModLoad: 000007fefd640000 000007fefd644000 C:\Windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
Sun Apr 6 09:29:45.354 2014 (UTC + 2:00): ModLoad: 000007fefd690000 000007fefd693000 C:\Windows\system32\api-ms-win-downlevel-normaliz-l1-1-0.dll
Sun Apr 6 09:29:45.354 2014 (UTC + 2:00): ModLoad: 00000000776e0000 00000000776e3000 C:\Windows\system32\normaliz.DLL
Sun Apr 6 09:29:45.354 2014 (UTC + 2:00): ModLoad: 000007fefdaf0000 000007fefdd99000 C:\Windows\system32\iertutil.dll
Sun Apr 6 09:29:45.354 2014 (UTC + 2:00): ModLoad: 000007fefd610000 000007fefd615000 C:\Windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
Sun Apr 6 09:29:45.354 2014 (UTC + 2:00): ModLoad: 000007fefdeb0000 000007fefdf8b000 C:\Windows\system32\advapi32.DLL
Sun Apr 6 09:29:45.355 2014 (UTC + 2:00): ModLoad: 000007feff490000 000007feff4af000 C:\Windows\SYSTEM32\sechost.dll
Sun Apr 6 09:29:45.355 2014 (UTC + 2:00): ModLoad: 000007fef92f0000 000007fef9308000 C:\Windows\system32\MPR.dll
Sun Apr 6 09:29:45.355 2014 (UTC + 2:00): ModLoad: 000007fefa180000 000007fefa1bb000 C:\Windows\system32\WINMM.dll
Sun Apr 6 09:29:45.355 2014 (UTC + 2:00): ModLoad: 000007fefdf90000 000007fefdfdd000 C:\Windows\system32\WS2_32.dll
Sun Apr 6 09:29:45.355 2014 (UTC + 2:00): ModLoad: 000007fefda60000 000007fefda68000 C:\Windows\system32\NSI.dll
Sun Apr 6 09:29:45.355 2014 (UTC + 2:00): ModLoad: 000007fefcaa0000 000007fefcac9000 C:\Windows\system32\MSVFW32.dll
Sun Apr 6 09:29:45.356 2014 (UTC + 2:00): ModLoad: 000007fefe050000 000007fefedd8000 C:\Windows\system32\SHELL32.dll
Sun Apr 6 09:29:45.356 2014 (UTC + 2:00): ModLoad: 000007fefbd30000 000007fefbf24000 C:\Windows\WinSxS\amd64_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_fa396087175ac9ac\COMCTL32.dll
Sun Apr 6 09:29:45.356 2014 (UTC + 2:00): ModLoad: 000007fef9b90000 000007fef9baf000 C:\Windows\system32\AVIFIL32.dll
Sun Apr 6 09:29:45.356 2014 (UTC + 2:00): ModLoad: 000007feff0e0000 000007feff2e3000 C:\Windows\system32\ole32.dll
Sun Apr 6 09:29:45.357 2014 (UTC + 2:00): ModLoad: 000007fef2170000 000007fef2188000 C:\Windows\system32\MSACM32.dll
Sun Apr 6 09:29:45.357 2014 (UTC + 2:00): ModLoad: 000007feff6d0000 000007feff82f000 C:\Windows\system32\urlmon.dll
Sun Apr 6 09:29:45.357 2014 (UTC + 2:00): ModLoad: 000007fefd380000 000007fefd384000 C:\Windows\system32\api-ms-win-downlevel-ole32-l1-1-0.dll
Sun Apr 6 09:29:45.357 2014 (UTC + 2:00): ModLoad: 00000000776f0000 00000000776f7000 C:\Windows\system32\PSAPI.DLL
Sun Apr 6 09:29:45.357 2014 (UTC + 2:00): ModLoad: 000007fefad80000 000007fefad96000 C:\Windows\system32\NETAPI32.dll
Sun Apr 6 09:29:45.357 2014 (UTC + 2:00): ModLoad: 000007fefad10000 000007fefad1c000 C:\Windows\system32\netutils.dll
Sun Apr 6 09:29:45.358 2014 (UTC + 2:00): ModLoad: 000007fefd060000 000007fefd083000 C:\Windows\system32\srvcli.dll
Sun Apr 6 09:29:45.358 2014 (UTC + 2:00): ModLoad: 000007fefacf0000 000007fefad05000 C:\Windows\system32\wkscli.dll
Sun Apr 6 09:29:45.358 2014 (UTC + 2:00): ModLoad: 000007fefac10000 000007fefac24000 C:\Windows\system32\SAMCLI.DLL
Sun Apr 6 09:29:45.358 2014 (UTC + 2:00): ModLoad: 000007fefb800000 000007fefb856000 C:\Windows\system32\UxTheme.dll
Sun Apr 6 09:29:45.359 2014 (UTC + 2:00): ModLoad: 000007fefb5e0000 000007fefb7f6000 C:\Windows\WinSxS\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.18120_none_2b25b14c71ebf230\gdiplus.dll
Sun Apr 6 09:29:45.359 2014 (UTC + 2:00): ModLoad: 000007fef1080000 000007fef127e000 C:\Windows\system32\query.dll
Sun Apr 6 09:29:45.359 2014 (UTC + 2:00): ModLoad: 000007feff5f0000 000007feff6c7000 C:\Windows\system32\OLEAUT32.dll
Sun Apr 6 09:29:45.359 2014 (UTC + 2:00): ModLoad: 000007fefcc10000 000007fefcc21000 C:\Windows\system32\WTSAPI32.dll
Sun Apr 6 09:29:45.359 2014 (UTC + 2:00): ModLoad: 000007fefc630000 000007fefc68b000 C:\Windows\system32\DNSAPI.dll
Sun Apr 6 09:29:45.359 2014 (UTC + 2:00): ModLoad: 000007fef3a50000 000007fef3bd7000 C:\Program Files\GPSoftware\Directory Opus\dopuslib.dll
Sun Apr 6 09:29:45.360 2014 (UTC + 2:00): ModLoad: 000007fef5310000 000007fef5317000 C:\Windows\system32\SHFOLDER.dll
Sun Apr 6 09:29:45.360 2014 (UTC + 2:00): ModLoad: 000007fefd390000 000007fefd4fc000 C:\Windows\system32\CRYPT32.dll
Sun Apr 6 09:29:45.360 2014 (UTC + 2:00): ModLoad: 000007fefd370000 000007fefd37f000 C:\Windows\system32\MSASN1.dll
Sun Apr 6 09:29:45.360 2014 (UTC + 2:00): ModLoad: 000007fef9990000 000007fef9a01000 C:\Windows\system32\WINSPOOL.DRV
Sun Apr 6 09:29:45.360 2014 (UTC + 2:00): ModLoad: 000007feff3c0000 000007feff3ee000 C:\Windows\system32\IMM32.DLL
Sun Apr 6 09:29:45.361 2014 (UTC + 2:00): ModLoad: 000007fefdda0000 000007fefdea9000 C:\Windows\system32\MSCTF.dll
Sun Apr 6 09:29:45.361 2014 (UTC + 2:00): ModLoad: 000007fefcbf0000 000007fefcc08000 C:\Windows\system32\dwmapi.dll
Sun Apr 6 09:29:45.361 2014 (UTC + 2:00): ModLoad: 000007fefa870000 000007fefa877000 C:\Windows\system32\msimg32.dll
Sun Apr 6 09:29:45.361 2014 (UTC + 2:00): ModLoad: 000007fefd1c0000 000007fefd1cf000 C:\Windows\system32\CRYPTBASE.dll
Sun Apr 6 09:29:45.362 2014 (UTC + 2:00): ModLoad: 000007fefb8e0000 000007fefba0c000 C:\Windows\system32\propsys.dll
Sun Apr 6 09:29:45.362 2014 (UTC + 2:00): ModLoad: 000007fef8220000 000007fef8253000 C:\Windows\system32\rstrtmgr.dll
Sun Apr 6 09:29:45.362 2014 (UTC + 2:00): ModLoad: 000007fefc930000 000007fefc97d000 C:\Windows\system32\ncrypt.dll
Sun Apr 6 09:29:45.362 2014 (UTC + 2:00): ModLoad: 000007fefca00000 000007fefca22000 C:\Windows\system32\bcrypt.dll
Sun Apr 6 09:29:45.362 2014 (UTC + 2:00): ModLoad: 000007fefd6c0000 000007fefd6fa000 C:\Windows\system32\wintrust.dll
Sun Apr 6 09:29:45.363 2014 (UTC + 2:00): ModLoad: 000007fefb080000 000007fefb1e1000 C:\Windows\system32\WindowsCodecs.dll
Sun Apr 6 09:29:45.363 2014 (UTC + 2:00): ModLoad: 000007fefd160000 000007fefd1b7000 C:\Windows\system32\apphelp.dll
Sun Apr 6 09:29:45.363 2014 (UTC + 2:00): ModLoad: 000007fefee00000 000007fefee99000 C:\Windows\system32\CLBCatQ.DLL
Sun Apr 6 09:29:45.363 2014 (UTC + 2:00): ModLoad: 000007fef5aa0000 000007fef5ad5000 C:\Windows\system32\EhStorShell.dll
Sun Apr 6 09:29:45.364 2014 (UTC + 2:00): ModLoad: 000007fefeea0000 000007feff077000 C:\Windows\system32\SETUPAPI.dll
Sun Apr 6 09:29:45.364 2014 (UTC + 2:00): ModLoad: 000007fefd650000 000007fefd686000 C:\Windows\system32\CFGMGR32.dll
Sun Apr 6 09:29:45.364 2014 (UTC + 2:00): ModLoad: 000007fefd620000 000007fefd63a000 C:\Windows\system32\DEVOBJ.dll
Sun Apr 6 09:29:45.364 2014 (UTC + 2:00): ModLoad: 000007fef5a20000 000007fef5aa0000 C:\Windows\system32\ntshrui.dll
Sun Apr 6 09:29:45.365 2014 (UTC + 2:00): ModLoad: 000007fef6fe0000 000007fef6fef000 C:\Windows\system32\cscapi.dll
Sun Apr 6 09:29:45.365 2014 (UTC + 2:00): ModLoad: 000007fefb280000 000007fefb28b000 C:\Windows\system32\slc.dll
Sun Apr 6 09:29:45.365 2014 (UTC + 2:00): ModLoad: 000007fef62b0000 000007fef62b8000 C:\Windows\system32\IconCodecService.dll
Sun Apr 6 09:29:45.365 2014 (UTC + 2:00): ModLoad: 000007fef3940000 000007fef39de000 C:\Windows\system32\riched20.dll
Sun Apr 6 09:29:45.365 2014 (UTC + 2:00): ModLoad: 000007fefb860000 000007fefb88d000 C:\Windows\system32\ntmarta.dll
Sun Apr 6 09:29:45.366 2014 (UTC + 2:00): ModLoad: 000007feff080000 000007feff0d2000 C:\Windows\system32\WLDAP32.dll
Sun Apr 6 09:29:45.366 2014 (UTC + 2:00): ModLoad: 000007fefb460000 000007fefb495000 C:\Windows\system32\XmlLite.dll
Sun Apr 6 09:29:45.366 2014 (UTC + 2:00): ModLoad: 000007fef6270000 000007fef627c000 C:\Windows\system32\LINKINFO.dll
Sun Apr 6 09:29:45.367 2014 (UTC + 2:00): ModLoad: 000007fef5800000 000007fef5834000 C:\Windows\System32\shdocvw.dll
Sun Apr 6 09:29:45.367 2014 (UTC + 2:00): ModLoad: 000007fefc800000 000007fefc817000 C:\Windows\system32\CRYPTSP.dll
Sun Apr 6 09:29:45.367 2014 (UTC + 2:00): ModLoad: 000007fefc540000 000007fefc587000 C:\Windows\system32\rsaenh.dll
Sun Apr 6 09:29:45.367 2014 (UTC + 2:00): ModLoad: 000007fefd2b0000 000007fefd2c4000 C:\Windows\system32\RpcRtRemote.dll
Sun Apr 6 09:29:45.368 2014 (UTC + 2:00): ModLoad: 000007fefd270000 000007fefd2ad000 C:\Windows\system32\WINSTA.dll
Sun Apr 6 09:29:45.368 2014 (UTC + 2:00): ModLoad: 000007fef0400000 000007fef0671000 C:\Windows\system32\wpdshext.dll
Sun Apr 6 09:29:45.368 2014 (UTC + 2:00): ModLoad: 000007fef2910000 000007fef29cd000 C:\Windows\system32\PortableDeviceApi.dll
Sun Apr 6 09:29:45.369 2014 (UTC + 2:00): ModLoad: 000007fef3050000 000007fef3125000 C:\Program Files\GPSoftware\Directory Opus\VFSPlugins\opus7zip.dll
Sun Apr 6 09:29:45.369 2014 (UTC + 2:00): ModLoad: 000007fefd9c0000 000007fefda57000 C:\Windows\system32\COMDLG32.dll
Sun Apr 6 09:29:45.369 2014 (UTC + 2:00): ModLoad: 000007fefd100000 000007fefd10b000 C:\Windows\system32\Secur32.dll
Sun Apr 6 09:29:45.369 2014 (UTC + 2:00): ModLoad: 000007fefd130000 000007fefd155000 C:\Windows\system32\SSPICLI.DLL
Sun Apr 6 09:29:45.370 2014 (UTC + 2:00): ModLoad: 000007fef72f0000 000007fef72f4000 C:\Windows\system32\api-ms-win-downlevel-advapi32-l2-1-0.dll
Sun Apr 6 09:29:45.370 2014 (UTC + 2:00): ModLoad: 000007fef38d0000 000007fef3937000 C:\Program Files\GPSoftware\Directory Opus\dopusbch.dll
Sun Apr 6 09:29:45.370 2014 (UTC + 2:00): ModLoad: 000007fefc7a0000 000007fefc7f5000 C:\Windows\system32\mswsock.dll
Sun Apr 6 09:29:45.371 2014 (UTC + 2:00): ModLoad: 000007fefc980000 000007fefc987000 C:\Windows\System32\wship6.dll
Sun Apr 6 09:29:45.371 2014 (UTC + 2:00): ModLoad: 000007fefb030000 000007fefb057000 C:\Windows\system32\IPHLPAPI.DLL
Sun Apr 6 09:29:45.371 2014 (UTC + 2:00): ModLoad: 000007fefb020000 000007fefb02b000 C:\Windows\system32\WINNSI.DLL
Sun Apr 6 09:29:45.371 2014 (UTC + 2:00): ModLoad: 000007fef5f70000 000007fef5f74000 C:\Windows\system32\api-ms-win-downlevel-shlwapi-l2-1-0.dll
Sun Apr 6 09:29:45.372 2014 (UTC + 2:00): ModLoad: 000007fefede0000 000007fefedf9000 C:\Windows\system32\imagehlp.dll
Sun Apr 6 09:29:45.372 2014 (UTC + 2:00): ModLoad: 000007fefc4a0000 000007fefc4ec000 C:\Windows\system32\bcryptprimitives.dll
Sun Apr 6 09:29:45.372 2014 (UTC + 2:00): ModLoad: 000007fef3be0000 000007fef3d7c000 C:\Windows\system32\NetworkExplorer.dll
Sun Apr 6 09:29:45.372 2014 (UTC + 2:00): ModLoad: 000007fef6bb0000 000007fef6bba000 C:\Windows\System32\drprov.dll
Sun Apr 6 09:29:45.373 2014 (UTC + 2:00): ModLoad: 000007fef6350000 000007fef6372000 C:\Windows\System32\ntlanman.dll
Sun Apr 6 09:29:45.373 2014 (UTC + 2:00): ModLoad: 000007fef6330000 000007fef634d000 C:\Windows\System32\davclnt.dll
Sun Apr 6 09:29:45.373 2014 (UTC + 2:00): ModLoad: 000007fef62a0000 000007fef62aa000 C:\Windows\System32\DAVHLPR.dll
Sun Apr 6 09:29:45.374 2014 (UTC + 2:00): ModLoad: 000007fef38a0000 000007fef38c7000 C:\Windows\system32\EhStorAPI.dll
Sun Apr 6 09:29:45.374 2014 (UTC + 2:00): ModLoad: 000007fefd1d0000 000007fefd261000 C:\Windows\system32\SXS.DLL
Sun Apr 6 09:29:45.374 2014 (UTC + 2:00): ModLoad: 000007fefac30000 000007fefac9e000 C:\Program Files\GPSoftware\Directory Opus\dopushlp.dll
Sun Apr 6 09:29:45.375 2014 (UTC + 2:00): ModLoad: 000000000e980000 000000000e9d1000 C:\Program Files\GPSoftware\Directory Opus\Viewers\gifanim.dll
Sun Apr 6 09:29:45.375 2014 (UTC + 2:00): ModLoad: 000007fef2fe0000 000007fef3045000 C:\Program Files\GPSoftware\Directory Opus\Viewers\movie.dll
Sun Apr 6 09:29:45.375 2014 (UTC + 2:00): ModLoad: 000007fef81f0000 000007fef821b000 C:\Program Files\GPSoftware\Directory Opus\Viewers\wma.dll
Sun Apr 6 09:29:45.376 2014 (UTC + 2:00): ModLoad: 000007fef0110000 000007fef03f6000 C:\Windows\system32\WMVCore.DLL
Sun Apr 6 09:29:45.388 2014 (UTC + 2:00): ModLoad: 000007fef6e50000 000007fef6e9d000 C:\Windows\system32\WMASF.DLL
Sun Apr 6 09:29:45.400 2014 (UTC + 2:00): ModLoad: 000007fef1aa0000 000007fef1b91000 C:\Windows\system32\ddraw.dll
Sun Apr 6 09:29:45.400 2014 (UTC + 2:00): ModLoad: 000007fef8560000 000007fef8568000 C:\Windows\system32\DCIMAN32.dll
Sun Apr 6 09:29:45.401 2014 (UTC + 2:00): ModLoad: 000007fef8010000 000007fef802c000 C:\Program Files\GPSoftware\Directory Opus\Viewers\pcx.dll
Sun Apr 6 09:29:45.401 2014 (UTC + 2:00): ModLoad: 000007fef6390000 000007fef63bf000 C:\Program Files\GPSoftware\Directory Opus\Viewers\targa.dll
Sun Apr 6 09:29:45.401 2014 (UTC + 2:00): ModLoad: 000007fef2450000 000007fef248c000 C:\Program Files\GPSoftware\Directory Opus\Viewers\audiotags.dll
Sun Apr 6 09:29:45.408 2014 (UTC + 2:00): ModLoad: 000007fef1fa0000 000007fef207f000 C:\Program Files\GPSoftware\Directory Opus\Viewers\dcrawrap.dll
Sun Apr 6 09:29:45.408 2014 (UTC + 2:00): ModLoad: 000007fef21c0000 000007fef21f2000 C:\Program Files\GPSoftware\Directory Opus\Viewers\j2k.dll
Sun Apr 6 09:29:45.409 2014 (UTC + 2:00): ModLoad: 000007fef5270000 000007fef52a0000 C:\Program Files\GPSoftware\Directory Opus\Viewers\wav.dll
Sun Apr 6 09:29:45.409 2014 (UTC + 2:00): ModLoad: 000007fef1f30000 000007fef1f94000 C:\Program Files\GPSoftware\Directory Opus\Viewers\docs.dll
Sun Apr 6 09:29:45.409 2014 (UTC + 2:00): ModLoad: 000007fef1a60000 000007fef1a94000 C:\Program Files\GPSoftware\Directory Opus\Viewers\multiview.dll
Sun Apr 6 09:29:45.409 2014 (UTC + 2:00): ModLoad: 000007fef1a10000 000007fef1a5d000 C:\Program Files\GPSoftware\Directory Opus\Viewers\textthumb.dll
Sun Apr 6 09:29:45.410 2014 (UTC + 2:00): ModLoad: 000007fef19c0000 000007fef1a0e000 C:\Program Files\GPSoftware\Directory Opus\Viewers\text.dll
Sun Apr 6 09:29:45.410 2014 (UTC + 2:00): ModLoad: 000007fefcc60000 000007fefcc7b000 C:\Windows\system32\GPAPI.dll
Sun Apr 6 09:29:45.411 2014 (UTC + 2:00): ModLoad: 000007fefaee0000 000007fefaef1000 C:\Windows\system32\dhcpcsvc6.DLL
Sun Apr 6 09:29:45.418 2014 (UTC + 2:00): ModLoad: 000007fefaec0000 000007fefaed8000 C:\Windows\system32\dhcpcsvc.DLL
Sun Apr 6 09:29:45.419 2014 (UTC + 2:00): ModLoad: 000007fefcae0000 000007fefcae7000 C:\Windows\System32\wshtcpip.dll
Sun Apr 6 09:29:45.420 2014 (UTC + 2:00): (ce0.ec0): Break instruction exception - code 80000003 (first chance)
ntdll!DbgBreakPoint:
0000000077570590 cc int 3 0:031> g Sun Apr 6 09:30:25.239 2014 (UTC + 2:00): ModLoad: 000007fef1690000 000007fe`f16ed000 C:\Windows\system32\zipfldr.dll
Sun Apr 6 09:30:30.866 2014 (UTC + 2:00):

===========================================================
Sun Apr 6 09:30:30.866 2014 (UTC + 2:00): VERIFIER STOP 000000000000000D: pid 0xCE0: corrupted header

00000000019B1000 : Heap handle
0000000056B32FB0 : Heap block
000000000000004E : Block size
0000000056B32F88 : Corruption Address

Sun Apr 6 09:30:30.866 2014 (UTC + 2:00): ===========================================================
This verifier stop is not continuable. Process will be terminated
when you use the `go' debugger command.

Sun Apr 6 09:30:30.866 2014 (UTC + 2:00): (ce0.eb0): Break instruction exception - code 80000003 (first chance)
verifier!VerifierStopMessage+0x1f0:
000007fe`f39ea668 cc int 3
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\Program Files\GPSoftware\Directory Opus\dopus.exe -
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\Program Files\GPSoftware\Directory Opus\dopuslib.dll - [/code]

# Child-SP RetAddr Call Site 00 00000000`2c51dcb0 000007fe`f39e92da verifier!VerifierStopMessage+0x1f0 01 00000000`2c51dd60 000007fe`f39e9656 verifier!AVrfpDphReportCorruptedBlock+0x112 02 00000000`2c51de20 000007fe`f39e6d2d verifier!AVrfpDphCheckPageHeapBlock+0xfe 03 00000000`2c51dea0 000007fe`f39e6e45 verifier!AVrfpDphFindBusyMemory+0xdd 04 00000000`2c51dee0 000007fe`f39e870e verifier!AVrfpDphFindBusyMemoryAndRemoveFromBusyList+0x25 05 00000000`2c51df10 00000000`775e99b5 verifier!AVrfDebugPageHeapFree+0x8a 06 00000000`2c51df70 00000000`7758db50 ntdll!RtlDebugFreeHeap+0x35 07 00000000`2c51dfd0 00000000`775740fd ntdll! ?? ::FNODOBFM::`string'+0x10b82 08 00000000`2c51e310 00000000`7742300a ntdll!RtlFreeHeap+0x1a6 09 00000000`2c51e390 00000001`406523f8 kernel32!HeapFree+0xa 0a 00000000`2c51e3c0 00000001`401ef06d dopus!DummyExeFunction1ToAvoidSymbolConfusion+0x1d9028 0b 00000000`2c51e3f0 00000001`3ff1b8a8 dopus+0x51f06d 0c 00000000`2c51e420 00000001`3ff1b8e8 dopus+0x24b8a8 0d 00000000`2c51e450 00000001`400c3503 dopus+0x24b8e8 0e 00000000`2c51e480 00000001`3fe775c7 dopus+0x3f3503 0f 00000000`2c51e4b0 00000001`3ff0a2d3 dopus+0x1a75c7 10 00000000`2c51e520 00000001`3ff02069 dopus+0x23a2d3 11 00000000`2c51e560 00000000`77319bd1 dopus+0x232069 12 00000000`2c51ed00 00000000`773172cb user32!UserCallWinProcCheckWow+0x1ad 13 00000000`2c51edc0 00000000`77316829 user32!DispatchClientMessage+0xc3 14 00000000`2c51ee20 00000000`775711f5 user32!_fnDWORD+0x2d 15 00000000`2c51ee80 00000000`7730cbfa ntdll!KiUserCallbackDispatcherContinue 16 00000000`2c51ef08 00000001`3ff0353a user32!NtUserDestroyWindow+0xa 17 00000000`2c51ef10 00000000`77319bd1 dopus+0x23353a 18 00000000`2c51f6b0 00000000`773198da user32!UserCallWinProcCheckWow+0x1ad 19 00000000`2c51f770 00000001`4037a1c8 user32!DispatchMessageWorker+0x3b5 1a 00000000`2c51f7f0 000007fe`f3a92211 dopus+0x6aa1c8 1b 00000000`2c51f850 000007fe`f3ade92b dopuslib!IsWow64+0x31 1c 00000000`2c51f880 000007fe`f3adeb76 dopuslib!DummyDllFunctionToAvoidSymbolConfusion+0x4a14b 1d 00000000`2c51f8b0 00000000`7741652d dopuslib!DummyDllFunctionToAvoidSymbolConfusion+0x4a396 1e 00000000`2c51f8e0 00000000`7754c541 kernel32!BaseThreadInitThunk+0xd 1f 00000000`2c51f910 00000000`00000000 ntdll!RtlUserThreadStart+0x1d

The "first chance exception" things are normal and can be ignored. They're part of how Windows works.

The last code block looks interesting, though.

Is a crash dump created, or can one be saved from WinDbg?

No, there is no dump file for this time. It looks like I need to generate one manually with the .dump command inside of WinDbg.

What for settings can help you best? (msdn.microsoft.com/en-us/library ... 85%29.aspx)

Just for info: if I try to ignore the first exception and press F5 to continue, then the same exception will come as "second change exception" unlimited times again. So I can't work with DO after this.

/ma or, if that produces something too large, /f should be best.

Please zip and email the dmp to leo@gpsoft.com.au

Just to be sure. Did you get all my 4 e-mails? (2x 06.04, 12.05, 15.06)
I ask it, because I did'n get any reply up to now.

Yes, I got them. Will reply as soon as I have a chance to investigate in detail.

This was a bug on our side and has now been fixed internally.

Many thanks for all your help with this, in particular the crash dumps which helped us pinpoint the problem.

We're about to put out 11.4 which won't contain the fix, but shortly after that we will put out an 11.4.1 beta version which will contain it.