Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 6.3.9600.17237 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Windows\Minidump\121614-22011-01.dmp]
- Mini Kernel Dump File: Only registers and stack trace are available
- ************* Symbol Path validation summary **************
- Response Time (ms) Location
- Deferred SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
- Symbol search path is: SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
- Executable search path is:
- Windows 7 Kernel Version 7601 (Service Pack 1) MP (6 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 7601.18526.amd64fre.win7sp1_gdr.140706-1506
- Machine Name:
- Kernel base = 0xfffff800`03254000 PsLoadedModuleList = 0xfffff800`03497890
- Debug session time: Mon Dec 15 23:41:18.756 2014 (UTC - 6:00)
- System Uptime: 0 days 3:46:35.644
- Loading Kernel Symbols
- .
- Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
- Run !sym noisy before .reload to track down problems loading symbols.
- ..............................................................
- ................................................................
- ....................................
- Loading User Symbols
- Loading unloaded module list
- .........
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- Use !analyze -v to get detailed debugging information.
- BugCheck 1A, {5003, fffff780c0000000, 18be9, fffff9801fa6fe09}
- Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+29041 )
- Followup: MachineOwner
- ---------
- 0: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- MEMORY_MANAGEMENT (1a)
- # Any other values for parameter 1 must be individually examined.
- Arguments:
- Arg1: 0000000000005003, The subtype of the bugcheck.
- Arg2: fffff780c0000000
- Arg3: 0000000000018be9
- Arg4: fffff9801fa6fe09
- Debugging Details:
- ------------------
- BUGCHECK_STR: 0x1a_5003
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
- PROCESS_NAME: rundll32.exe
- CURRENT_IRQL: 0
- ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) amd64fre
- TRAP_FRAME: fffff8800a6f7020 -- (.trap 0xfffff8800a6f7020)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=fffffa800ae04ad0 rbx=0000000000000000 rcx=0000000000000000
- rdx=fffff980460b3000 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff800035c76c7 rsp=fffff8800a6f71b0 rbp=fffff8800a6f75d0
- r8=000000000000000f r9=0000000000373000 r10=0000000000000000
- r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei ng nz ac po cy
- nt!CcMapData+0x117:
- fffff800`035c76c7 0fb602 movzx eax,byte ptr [rdx] ds:fffff980`460b3000=??
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff80003331d59 to fffff800032c9bc0
- STACK_TEXT:
- fffff880`0a6f6d58 fffff800`03331d59 : 00000000`0000001a 00000000`00005003 fffff780`c0000000 00000000`00018be9 : nt!KeBugCheckEx
- fffff880`0a6f6d60 fffff800`032f099d : fffffa80`08dd67d0 00000000`00000000 fffff800`03504b00 fffffa80`08dd67d0 : nt! ?? ::FNODOBFM::`string'+0x29041
- fffff880`0a6f6df0 fffff800`032d71b9 : 00000000`00000000 00000000`00000000 ffffffff`ffffffff fffff8a0`18c69cc0 : nt!MiIssueHardFault+0x309
- fffff880`0a6f6ec0 fffff800`032c7cee : 00000000`00000000 fffff980`460b3000 00000000`00000000 00000000`0000000e : nt!MmAccessFault+0x1399
- fffff880`0a6f7020 fffff800`035c76c7 : 00000000`00000001 00000000`1e373000 fffff880`0a6f7278 fffff880`0a6f7270 : nt!KiPageFault+0x16e
- fffff880`0a6f71b0 fffff880`012c6382 : fffff8a0`0000d000 fffffa80`0ae04ad0 fffff8a0`1913f346 fffff8a0`0000000e : nt!CcMapData+0x117
- fffff880`0a6f7270 fffff880`012b2d4f : fffffa80`0d02b6b0 fffffa80`07fc6180 fffff8a0`1910e1f0 fffff800`03675400 : Ntfs!NtfsReadMftRecord+0xb2
- fffff880`0a6f7320 fffff880`012aebd8 : fffffa80`0d02b6b0 fffff8a0`0ea06d80 fffff8a0`191b6140 fffffa80`0d02b601 : Ntfs!NtfsRetrieveOtherFileName+0x2e3
- fffff880`0a6f7450 fffff880`012b0111 : fffff880`0a6f7950 00000000`00000008 fffffa80`07f17860 fffffa80`0c5ef010 : Ntfs!NtfsQueryDirectory+0xa38
- fffff880`0a6f77f0 fffff880`012b2a1f : fffffa80`0d02b6b0 00000000`00000000 fffff880`0a6f78e0 00000000`00000000 : Ntfs!NtfsCommonDirectoryControl+0xa1
- fffff880`0a6f7830 fffff880`0107dbcf : fffffa80`0c5ef3b0 fffffa80`0c5ef010 fffffa80`0d02b6b0 fffff880`0a6f7858 : Ntfs!NtfsFsdDirectoryControl+0x10f
- fffff880`0a6f78a0 fffff880`0107c6df : fffffa80`07f17860 fffffa80`0d29b590 fffffa80`07f17800 fffffa80`0c5ef010 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
- fffff880`0a6f7930 fffff800`035b35fd : fffffa80`0c5ef010 fffff880`0a6f7b60 00000000`0028c788 fffff880`0a6f7a88 : fltmgr!FltpDispatch+0xcf
- fffff880`0a6f7990 fffff800`032c8e53 : fffffa80`07423060 fffff880`0a6f7b60 00000000`0028c788 fffff880`0a6f7a88 : nt!NtQueryDirectoryFile+0x1ad
- fffff880`0a6f7a70 00000000`773a160a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
- 00000000`0028c768 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x773a160a
- STACK_COMMAND: kb
- FOLLOWUP_IP:
- nt! ?? ::FNODOBFM::`string'+29041
- fffff800`03331d59 cc int 3
- SYMBOL_STACK_INDEX: 1
- SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+29041
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- DEBUG_FLR_IMAGE_TIMESTAMP: 53b9f073
- IMAGE_VERSION: 6.1.7601.18526
- FAILURE_BUCKET_ID: X64_0x1a_5003_nt!_??_::FNODOBFM::_string_+29041
- BUCKET_ID: X64_0x1a_5003_nt!_??_::FNODOBFM::_string_+29041
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:x64_0x1a_5003_nt!_??_::fnodobfm::_string_+29041
- FAILURE_ID_HASH: {9718c93b-9f50-983e-14a3-c000a9cdcd91}
- Followup: MachineOwner
- ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement