Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- 3: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- MEMORY_MANAGEMENT (1a)
- # Any other values for parameter 1 must be individually examined.
- Arguments:
- Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
- the PTE. Parameters 3/4 contain the low/high parts of the PTE.
- Arg2: fffff6bffc00b110
- Arg3: 80001b0300000000
- Arg4: 0000000000000000
- Debugging Details:
- ------------------
- SYSTEM_SKU: 54511197
- SYSTEM_VERSION: C904P35P
- BIOS_DATE: 03/13/2012
- BASEBOARD_PRODUCT: VAIO
- BASEBOARD_VERSION: N/A
- BUGCHECK_P1: 41792
- BUGCHECK_P2: fffff6bffc00b110
- BUGCHECK_P3: 80001b0300000000
- BUGCHECK_P4: 0
- BUGCHECK_STR: 0x1a_41792
- CPU_COUNT: 4
- CPU_MHZ: 9be
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 3a
- CPU_STEPPING: 9
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- PROCESS_NAME: VESShellExePro
- CURRENT_IRQL: 2
- ANALYSIS_VERSION: 10.0.10240.9 amd64fre
- LAST_CONTROL_TRANSFER: from fffff802ef381ef8 to fffff802ef3524d0
- STACK_TEXT:
- ffffd000`2742e508 fffff802`ef381ef8 : 00000000`0000001a 00000000`00041792 fffff6bf`fc00b110 80001b03`00000000 : nt!KeBugCheckEx
- ffffd000`2742e510 fffff802`ef2314f0 : ffffe000`36505df0 ffffd000`2742e7d9 ffffe000`2e0d6bb8 ffffe000`2fa45a40 : nt! ?? ::FNODOBFM::`string'+0x20df8
- ffffd000`2742e710 fffff802`ef6a99c7 : ffffe000`366cc520 ffffe000`366cc520 ffffe000`35a81080 ffffe000`2e0d66c0 : nt!MiDeleteVad+0x4b0
- ffffd000`2742e840 fffff802`ef6a9723 : 00000000`00040000 ffffd000`2742ea99 00000000`00000000 ffffe000`2e0d66c0 : nt!MmCleanProcessAddressSpace+0xef
- ffffd000`2742e8a0 fffff802`ef6a232b : ffffe000`2e0d66c0 ffffc001`8ec35060 ffffd000`2742ea99 00000000`00000000 : nt!PspRundownSingleProcess+0x12b
- ffffd000`2742e930 fffff802`ef68900a : 00000000`00000000 ffffd000`2742ea01 00007ff7`a768e000 ffffe000`2e0d66c0 : nt!PspExitThread+0x5fb
- ffffd000`2742ea30 fffff802`ef35cb63 : ffffe000`35a81080 ffffffff`ffff0000 ffffe000`35a81080 ffffd000`2742eb80 : nt!NtTerminateProcess+0x11a
- ffffd000`2742eb00 00007ff8`0b9537ba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
- 00000050`55effd88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`0b9537ba
- STACK_COMMAND: kb
- FOLLOWUP_IP:
- nt! ?? ::FNODOBFM::`string'+20df8
- fffff802`ef381ef8 cc int 3
- SYMBOL_STACK_INDEX: 1
- SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+20df8
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- DEBUG_FLR_IMAGE_TIMESTAMP: 563ad7f4
- IMAGE_VERSION: 10.0.10240.16590
- BUCKET_ID_FUNC_OFFSET: 20df8
- FAILURE_BUCKET_ID: 0x1a_41792_nt!_??_::FNODOBFM::_string_
- BUCKET_ID: 0x1a_41792_nt!_??_::FNODOBFM::_string_
- PRIMARY_PROBLEM_CLASS: 0x1a_41792_nt!_??_::FNODOBFM::_string_
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:0x1a_41792_nt!_??_::fnodobfm::_string_
- FAILURE_ID_HASH: {e00e25fc-1d2f-6e67-bb24-ba96083192fa}
- Followup: MachineOwner
- ---------
Advertisement
Add Comment
Please, Sign In to add comment