Advertisement
Guest User

BSoD

a guest
Dec 16th, 2014
177
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.58 KB | None | 0 0
  1.  
  2. Microsoft (R) Windows Debugger Version 6.3.9600.17237 AMD64
  3. Copyright (c) Microsoft Corporation. All rights reserved.
  4.  
  5.  
  6. Loading Dump File [C:\Windows\Minidump\121614-22011-01.dmp]
  7. Mini Kernel Dump File: Only registers and stack trace are available
  8.  
  9.  
  10. ************* Symbol Path validation summary **************
  11. Response Time (ms) Location
  12. Deferred SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
  13. Symbol search path is: SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
  14. Executable search path is:
  15. Windows 7 Kernel Version 7601 (Service Pack 1) MP (6 procs) Free x64
  16. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  17. Built by: 7601.18526.amd64fre.win7sp1_gdr.140706-1506
  18. Machine Name:
  19. Kernel base = 0xfffff800`03254000 PsLoadedModuleList = 0xfffff800`03497890
  20. Debug session time: Mon Dec 15 23:41:18.756 2014 (UTC - 6:00)
  21. System Uptime: 0 days 3:46:35.644
  22. Loading Kernel Symbols
  23. .
  24.  
  25. Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
  26. Run !sym noisy before .reload to track down problems loading symbols.
  27.  
  28. ..............................................................
  29. ................................................................
  30. ....................................
  31. Loading User Symbols
  32. Loading unloaded module list
  33. .........
  34. *******************************************************************************
  35. * *
  36. * Bugcheck Analysis *
  37. * *
  38. *******************************************************************************
  39.  
  40. Use !analyze -v to get detailed debugging information.
  41.  
  42. BugCheck 1A, {5003, fffff780c0000000, 18be9, fffff9801fa6fe09}
  43.  
  44. Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+29041 )
  45.  
  46. Followup: MachineOwner
  47. ---------
  48.  
  49. 0: kd> !analyze -v
  50. *******************************************************************************
  51. * *
  52. * Bugcheck Analysis *
  53. * *
  54. *******************************************************************************
  55.  
  56. MEMORY_MANAGEMENT (1a)
  57. # Any other values for parameter 1 must be individually examined.
  58. Arguments:
  59. Arg1: 0000000000005003, The subtype of the bugcheck.
  60. Arg2: fffff780c0000000
  61. Arg3: 0000000000018be9
  62. Arg4: fffff9801fa6fe09
  63.  
  64. Debugging Details:
  65. ------------------
  66.  
  67.  
  68. BUGCHECK_STR: 0x1a_5003
  69.  
  70. CUSTOMER_CRASH_COUNT: 1
  71.  
  72. DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
  73.  
  74. PROCESS_NAME: rundll32.exe
  75.  
  76. CURRENT_IRQL: 0
  77.  
  78. ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) amd64fre
  79.  
  80. TRAP_FRAME: fffff8800a6f7020 -- (.trap 0xfffff8800a6f7020)
  81. NOTE: The trap frame does not contain all registers.
  82. Some register values may be zeroed or incorrect.
  83. rax=fffffa800ae04ad0 rbx=0000000000000000 rcx=0000000000000000
  84. rdx=fffff980460b3000 rsi=0000000000000000 rdi=0000000000000000
  85. rip=fffff800035c76c7 rsp=fffff8800a6f71b0 rbp=fffff8800a6f75d0
  86. r8=000000000000000f r9=0000000000373000 r10=0000000000000000
  87. r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
  88. r14=0000000000000000 r15=0000000000000000
  89. iopl=0 nv up ei ng nz ac po cy
  90. nt!CcMapData+0x117:
  91. fffff800`035c76c7 0fb602 movzx eax,byte ptr [rdx] ds:fffff980`460b3000=??
  92. Resetting default scope
  93.  
  94. LAST_CONTROL_TRANSFER: from fffff80003331d59 to fffff800032c9bc0
  95.  
  96. STACK_TEXT:
  97. fffff880`0a6f6d58 fffff800`03331d59 : 00000000`0000001a 00000000`00005003 fffff780`c0000000 00000000`00018be9 : nt!KeBugCheckEx
  98. fffff880`0a6f6d60 fffff800`032f099d : fffffa80`08dd67d0 00000000`00000000 fffff800`03504b00 fffffa80`08dd67d0 : nt! ?? ::FNODOBFM::`string'+0x29041
  99. fffff880`0a6f6df0 fffff800`032d71b9 : 00000000`00000000 00000000`00000000 ffffffff`ffffffff fffff8a0`18c69cc0 : nt!MiIssueHardFault+0x309
  100. fffff880`0a6f6ec0 fffff800`032c7cee : 00000000`00000000 fffff980`460b3000 00000000`00000000 00000000`0000000e : nt!MmAccessFault+0x1399
  101. fffff880`0a6f7020 fffff800`035c76c7 : 00000000`00000001 00000000`1e373000 fffff880`0a6f7278 fffff880`0a6f7270 : nt!KiPageFault+0x16e
  102. fffff880`0a6f71b0 fffff880`012c6382 : fffff8a0`0000d000 fffffa80`0ae04ad0 fffff8a0`1913f346 fffff8a0`0000000e : nt!CcMapData+0x117
  103. fffff880`0a6f7270 fffff880`012b2d4f : fffffa80`0d02b6b0 fffffa80`07fc6180 fffff8a0`1910e1f0 fffff800`03675400 : Ntfs!NtfsReadMftRecord+0xb2
  104. fffff880`0a6f7320 fffff880`012aebd8 : fffffa80`0d02b6b0 fffff8a0`0ea06d80 fffff8a0`191b6140 fffffa80`0d02b601 : Ntfs!NtfsRetrieveOtherFileName+0x2e3
  105. fffff880`0a6f7450 fffff880`012b0111 : fffff880`0a6f7950 00000000`00000008 fffffa80`07f17860 fffffa80`0c5ef010 : Ntfs!NtfsQueryDirectory+0xa38
  106. fffff880`0a6f77f0 fffff880`012b2a1f : fffffa80`0d02b6b0 00000000`00000000 fffff880`0a6f78e0 00000000`00000000 : Ntfs!NtfsCommonDirectoryControl+0xa1
  107. fffff880`0a6f7830 fffff880`0107dbcf : fffffa80`0c5ef3b0 fffffa80`0c5ef010 fffffa80`0d02b6b0 fffff880`0a6f7858 : Ntfs!NtfsFsdDirectoryControl+0x10f
  108. fffff880`0a6f78a0 fffff880`0107c6df : fffffa80`07f17860 fffffa80`0d29b590 fffffa80`07f17800 fffffa80`0c5ef010 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
  109. fffff880`0a6f7930 fffff800`035b35fd : fffffa80`0c5ef010 fffff880`0a6f7b60 00000000`0028c788 fffff880`0a6f7a88 : fltmgr!FltpDispatch+0xcf
  110. fffff880`0a6f7990 fffff800`032c8e53 : fffffa80`07423060 fffff880`0a6f7b60 00000000`0028c788 fffff880`0a6f7a88 : nt!NtQueryDirectoryFile+0x1ad
  111. fffff880`0a6f7a70 00000000`773a160a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
  112. 00000000`0028c768 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x773a160a
  113.  
  114.  
  115. STACK_COMMAND: kb
  116.  
  117. FOLLOWUP_IP:
  118. nt! ?? ::FNODOBFM::`string'+29041
  119. fffff800`03331d59 cc int 3
  120.  
  121. SYMBOL_STACK_INDEX: 1
  122.  
  123. SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+29041
  124.  
  125. FOLLOWUP_NAME: MachineOwner
  126.  
  127. MODULE_NAME: nt
  128.  
  129. IMAGE_NAME: ntkrnlmp.exe
  130.  
  131. DEBUG_FLR_IMAGE_TIMESTAMP: 53b9f073
  132.  
  133. IMAGE_VERSION: 6.1.7601.18526
  134.  
  135. FAILURE_BUCKET_ID: X64_0x1a_5003_nt!_??_::FNODOBFM::_string_+29041
  136.  
  137. BUCKET_ID: X64_0x1a_5003_nt!_??_::FNODOBFM::_string_+29041
  138.  
  139. ANALYSIS_SOURCE: KM
  140.  
  141. FAILURE_ID_HASH_STRING: km:x64_0x1a_5003_nt!_??_::fnodobfm::_string_+29041
  142.  
  143. FAILURE_ID_HASH: {9718c93b-9f50-983e-14a3-c000a9cdcd91}
  144.  
  145. Followup: MachineOwner
  146. ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement