Advertisement
Guest User

Untitled

a guest
Sep 26th, 2014
64
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.08 KB | None | 0 0
  1.  
  2. Microsoft (R) Windows Debugger Version 6.3.9600.17029 AMD64
  3. Copyright (c) Microsoft Corporation. All rights reserved.
  4.  
  5.  
  6. Loading Dump File [C:\Users\Freddy\Desktop\MEMORY.DMP]
  7. Kernel Bitmap Dump File: Only kernel address space is available
  8.  
  9.  
  10. ************* Symbol Path validation summary **************
  11. Response Time (ms) Location
  12. OK c:\symbols\private
  13. Deferred srv*c:\symbols\web*http://msdl.microsoft.com/download/symbols
  14.  
  15. ************* Symbol Path validation summary **************
  16. Response Time (ms) Location
  17. OK c:\symbols\private
  18. Deferred srv*c:\symbols\web*http://msdl.microsoft.com/download/symbols
  19. Symbol search path is: c:\symbols\private;srv*c:\symbols\web*http://msdl.microsoft.com/download/symbols
  20. Executable search path is:
  21. Windows 8 Kernel Version 9600 MP (4 procs) Free x64
  22. Product: WinNt, suite: TerminalServer SingleUserTS
  23. Built by: 9600.16452.amd64fre.winblue_gdr.131030-1505
  24. Machine Name:
  25. Kernel base = 0xfffff802`0400a000 PsLoadedModuleList = 0xfffff802`042ce990
  26. Debug session time: Thu Sep 25 21:41:13.925 2014 (UTC + 2:00)
  27. System Uptime: 2 days 12:04:06.615
  28. Loading Kernel Symbols
  29. ...............................................................
  30. ............................................Page 10d002 not present in the dump file. Type ".hh dbgerr004" for details
  31. ....................
  32. .......................
  33. Loading User Symbols
  34. PEB is paged out (Peb.Ldr = 00007ff6`f3dd3018). Type ".hh dbgerr001" for details
  35. Loading unloaded module list
  36. ...................
  37. *******************************************************************************
  38. * *
  39. * Bugcheck Analysis *
  40. * *
  41. *******************************************************************************
  42.  
  43. Use !analyze -v to get detailed debugging information.
  44.  
  45. BugCheck 13C, {ffffe00006adb5c0, 1, 0, 0}
  46.  
  47. Page 10d002 not present in the dump file. Type ".hh dbgerr004" for details
  48. Probably caused by : ntkrnlmp.exe ( nt! ?? ::NNGAKEGL::`string'+5d695 )
  49.  
  50. Followup: MachineOwner
  51. ---------
  52.  
  53. 1: kd> !analyze -v
  54. *******************************************************************************
  55. * *
  56. * Bugcheck Analysis *
  57. * *
  58. *******************************************************************************
  59.  
  60. INVALID_IO_BOOST_STATE (13c)
  61. A thread exited with an invalid I/O boost state. This should be zero when
  62. a thread exits.
  63. Arguments:
  64. Arg1: ffffe00006adb5c0, Pointer to the thread which had the invalid boost state.
  65. Arg2: 0000000000000001, Current boost state.
  66. Arg3: 0000000000000000
  67. Arg4: 0000000000000000
  68.  
  69. Debugging Details:
  70. ------------------
  71.  
  72. Page 10d002 not present in the dump file. Type ".hh dbgerr004" for details
  73.  
  74. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  75.  
  76. BUGCHECK_STR: 0x13C
  77.  
  78. PROCESS_NAME: svchost.exe
  79.  
  80. CURRENT_IRQL: 0
  81.  
  82. ANALYSIS_VERSION: 6.3.9600.17029 (debuggers(dbg).140219-1702) amd64fre
  83.  
  84. LAST_CONTROL_TRANSFER: from fffff80204591005 to fffff80204157ca0
  85.  
  86. STACK_TEXT:
  87. ffffd000`23bfc8c8 fffff802`04591005 : 00000000`0000013c ffffe000`06adb5c0 00000000`00000001 00000000`00000000 : nt!KeBugCheckEx
  88. ffffd000`23bfc8d0 fffff802`04438bf8 : 00000000`00000000 00000000`00000000 ffffe000`06adb5c0 ffffe000`000e5dc0 : nt! ?? ::NNGAKEGL::`string'+0x5d695
  89. ffffd000`23bfc940 fffff802`0404571f : 00000000`00000000 ffffd000`23bfca99 ffffe000`06adb5c0 ffffe000`000e5dc0 : nt!ObpRemoveObjectRoutine+0x64
  90. ffffd000`23bfc9a0 fffff802`043b84a0 : ffffe000`06adb590 00000000`ffff8002 ffffd000`23bfca99 0000000c`001f0003 : nt!ObfDereferenceObjectWithTag+0x8f
  91. ffffd000`23bfc9e0 fffff802`041634b3 : ffffe000`017e1340 00000033`f2726df0 00000033`f22cf5d0 00000000`00000000 : nt!NtClose+0x210
  92. ffffd000`23bfcb00 00007ffd`ae6e666a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
  93. 00000033`f22cedf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`ae6e666a
  94.  
  95.  
  96. STACK_COMMAND: kb
  97.  
  98. FOLLOWUP_IP:
  99. nt! ?? ::NNGAKEGL::`string'+5d695
  100. fffff802`04591005 cc int 3
  101.  
  102. SYMBOL_STACK_INDEX: 1
  103.  
  104. SYMBOL_NAME: nt! ?? ::NNGAKEGL::`string'+5d695
  105.  
  106. FOLLOWUP_NAME: MachineOwner
  107.  
  108. MODULE_NAME: nt
  109.  
  110. IMAGE_NAME: ntkrnlmp.exe
  111.  
  112. DEBUG_FLR_IMAGE_TIMESTAMP: 52718d9c
  113.  
  114. BUCKET_ID_FUNC_OFFSET: 5d695
  115.  
  116. FAILURE_BUCKET_ID: 0x13C_VRF_nt!_??_::NNGAKEGL::_string_
  117.  
  118. BUCKET_ID: 0x13C_VRF_nt!_??_::NNGAKEGL::_string_
  119.  
  120. ANALYSIS_SOURCE: KM
  121.  
  122. FAILURE_ID_HASH_STRING: km:0x13c_vrf_nt!_??_::nngakegl::_string_
  123.  
  124. FAILURE_ID_HASH: {7e799e7a-625a-26df-caad-edceb051a651}
  125.  
  126. Followup: MachineOwner
  127. ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement