Advertisement
Guest User

Untitled

a guest
Aug 16th, 2016
234
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.95 KB | None | 0 0
  1.  
  2. ************* Symbol Path validation summary **************
  3. Response Time (ms) Location
  4. Deferred SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
  5.  
  6. Microsoft (R) Windows Debugger Version 6.3.9600.17336 AMD64
  7. Copyright (c) Microsoft Corporation. All rights reserved.
  8.  
  9.  
  10. Loading Dump File [C:\Windows\Minidump\081616-33353-01.dmp]
  11. Mini Kernel Dump File: Only registers and stack trace are available
  12.  
  13.  
  14. ************* Symbol Path validation summary **************
  15. Response Time (ms) Location
  16. Deferred SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
  17. Symbol search path is: SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
  18. Executable search path is:
  19. Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
  20. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  21. Built by: 7601.23455.amd64fre.win7sp1_ldr.160516-0600
  22. Machine Name:
  23. Kernel base = 0xfffff800`03860000 PsLoadedModuleList = 0xfffff800`03aa2730
  24. Debug session time: Tue Aug 16 23:43:37.510 2016 (UTC - 4:00)
  25. System Uptime: 0 days 0:18:03.338
  26. Loading Kernel Symbols
  27. ...............................................................
  28. ................................................................
  29. ...........................
  30. Loading User Symbols
  31. Loading unloaded module list
  32. ......
  33. *******************************************************************************
  34. * *
  35. * Bugcheck Analysis *
  36. * *
  37. *******************************************************************************
  38.  
  39. Use !analyze -v to get detailed debugging information.
  40.  
  41. BugCheck 1A, {31, fffffa800a39dbd0, fffff88000b99000, fffff8a01f4c86cc}
  42.  
  43. Probably caused by : ntkrnlmp.exe ( nt! ?? ::NNGAKEGL::`string'+6fc1 )
  44.  
  45. Followup: MachineOwner
  46. ---------
  47.  
  48. 1: kd> !analyze -v
  49. *******************************************************************************
  50. * *
  51. * Bugcheck Analysis *
  52. * *
  53. *******************************************************************************
  54.  
  55. MEMORY_MANAGEMENT (1a)
  56. # Any other values for parameter 1 must be individually examined.
  57. Arguments:
  58. Arg1: 0000000000000031, The subtype of the bugcheck.
  59. Arg2: fffffa800a39dbd0
  60. Arg3: fffff88000b99000
  61. Arg4: fffff8a01f4c86cc
  62.  
  63. Debugging Details:
  64. ------------------
  65.  
  66.  
  67. BUGCHECK_STR: 0x1a_31
  68.  
  69. CUSTOMER_CRASH_COUNT: 1
  70.  
  71. DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
  72.  
  73. PROCESS_NAME: mscorsvw.exe
  74.  
  75. CURRENT_IRQL: 0
  76.  
  77. ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre
  78.  
  79. LAST_CONTROL_TRANSFER: from fffff80003b2e095 to fffff800038cf400
  80.  
  81. STACK_TEXT:
  82. fffff880`11714638 fffff800`03b2e095 : 00000000`0000001a 00000000`00000031 fffffa80`0a39dbd0 fffff880`00b99000 : nt!KeBugCheckEx
  83. fffff880`11714640 fffff800`038b1540 : fffff8a0`00000000 00000000`00000000 00000000`000003a9 fffff8a0`1f49ed90 : nt! ?? ::NNGAKEGL::`string'+0x6fc1
  84. fffff880`117146a0 fffff800`03baa7f9 : fffffa80`0fe37200 fffff6fc`4008a678 fffff8a0`00000002 00000000`00000000 : nt!MiValidateImagePages+0x590
  85. fffff880`11714760 fffff800`03baa98e : ffffffff`ffffffff 00000000`00000001 fffff8a0`1f4b4000 00000000`000000eb : nt!MiSwitchBaseAddress+0x61
  86. fffff880`11714790 fffff800`03bcf3b2 : 00000000`00000004 00000000`01000000 fffffa80`0fe37200 fffffa80`0fe37200 : nt!MiRelocateImageAgain+0x12e
  87. fffff880`117147e0 fffff800`03baa072 : fffff880`11714a40 00000000`00000010 00000000`00000000 fffff880`11714a38 : nt!MmCreateSection+0x5e2
  88. fffff880`117149f0 fffff800`038ce693 : fffffa80`0fd03b50 00000000`002ab218 fffff880`11714a88 00000000`002ab3a0 : nt!NtCreateSection+0x171
  89. fffff880`11714a70 00000000`7734bfda : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
  90. 00000000`002ab1f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7734bfda
  91.  
  92.  
  93. STACK_COMMAND: kb
  94.  
  95. FOLLOWUP_IP:
  96. nt! ?? ::NNGAKEGL::`string'+6fc1
  97. fffff800`03b2e095 cc int 3
  98.  
  99. SYMBOL_STACK_INDEX: 1
  100.  
  101. SYMBOL_NAME: nt! ?? ::NNGAKEGL::`string'+6fc1
  102.  
  103. FOLLOWUP_NAME: MachineOwner
  104.  
  105. MODULE_NAME: nt
  106.  
  107. IMAGE_NAME: ntkrnlmp.exe
  108.  
  109. DEBUG_FLR_IMAGE_TIMESTAMP: 573a38fc
  110.  
  111. IMAGE_VERSION: 6.1.7601.23455
  112.  
  113. FAILURE_BUCKET_ID: X64_0x1a_31_nt!_??_::NNGAKEGL::_string_+6fc1
  114.  
  115. BUCKET_ID: X64_0x1a_31_nt!_??_::NNGAKEGL::_string_+6fc1
  116.  
  117. ANALYSIS_SOURCE: KM
  118.  
  119. FAILURE_ID_HASH_STRING: km:x64_0x1a_31_nt!_??_::nngakegl::_string_+6fc1
  120.  
  121. FAILURE_ID_HASH: {bfbb5bda-8aff-1cc6-52e5-8e3fd93bacb3}
  122.  
  123. Followup: MachineOwner
  124. ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement