Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 10.0.16299.91 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Localdumps\SearchIndexer.exe.1156.dmp]
- User Mini Dump File with Full Memory: Only application data is available
- Symbol search path is: srv*
- Executable search path is:
- Windows 7 Version 7601 (Service Pack 1) MP (4 procs) Free x64
- Product: WinNt, suite: SingleUserTS
- Machine Name:
- Debug session time: Mon Mar 26 09:35:22.000 2018 (UTC + 2:00)
- System Uptime: 0 days 0:11:33.950
- Process Uptime: 0 days 0:00:04.000
- ...............................................................
- Loading unloaded module list
- .......
- This dump file has an exception of interest stored in it.
- The stored exception information can be accessed via .ecxr.
- (484.22bc): Access violation - code c0000005 (first/second chance not available)
- ntdll!NtWaitForMultipleObjects+0xa:
- 00000000`776ac2ea c3 ret
- 0:010> !analyze -v
- *******************************************************************************
- * *
- * Exception Analysis *
- * *
- *******************************************************************************
- GetUrlPageData2 (WinHttp) failed: 12002.
- DUMP_CLASS: 2
- DUMP_QUALIFIER: 400
- CONTEXT: (.ecxr)
- rax=0000000003aa0024 rbx=0000000022f1c002 rcx=0000000000000302
- rdx=0000000000000045 rsi=0000000000008d9e rdi=0000000006ff53c8
- rip=000007fefd52ca53 rsp=0000000021d78700 rbp=00000000000001bc
- r8=0000000000000004 r9=0000000022f1b438 r10=0000000000000000
- r11=0000000021d78740 r12=0000000021d78900 r13=0000000000000000
- r14=0000000021d79300 r15=0000000000009383
- iopl=0 nv up ei pl nz na pe nc
- cs=0033 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010202
- KERNELBASE!GetStringTypeW+0x12e:
- 000007fe`fd52ca53 66894bfe mov word ptr [rbx-2],cx ds:00000000`22f1c000=????
- Resetting default scope
- FAULTING_IP:
- KERNELBASE!GetStringTypeW+12e
- 000007fe`fd52ca53 66894bfe mov word ptr [rbx-2],cx
- EXCEPTION_RECORD: (.exr -1)
- ExceptionAddress: 000007fefd52ca53 (KERNELBASE!GetStringTypeW+0x000000000000012e)
- ExceptionCode: c0000005 (Access violation)
- ExceptionFlags: 00000000
- NumberParameters: 2
- Parameter[0]: 0000000000000001
- Parameter[1]: 0000000022f1c000
- Attempt to write to address 0000000022f1c000
- PROCESS_NAME: SearchIndexer.exe
- ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
- EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
- EXCEPTION_CODE_STR: c0000005
- EXCEPTION_PARAMETER1: 0000000000000001
- EXCEPTION_PARAMETER2: 0000000022f1c000
- FOLLOWUP_IP:
- Query!CDefWordBreaker::Tokenize+48
- 000007fe`e54250f8 85c0 test eax,eax
- WRITE_ADDRESS: 0000000022f1c000
- WATSON_BKT_PROCSTAMP: 59deb9ab
- WATSON_BKT_PROCVER: 7.0.7601.23930
- PROCESS_VER_PRODUCT: Windows® Search
- WATSON_BKT_MODULE: KERNELBASE.dll
- WATSON_BKT_MODSTAMP: 59b94f2a
- WATSON_BKT_MODOFFSET: ca53
- WATSON_BKT_MODVER: 6.1.7601.23915
- MODULE_VER_PRODUCT: Microsoft® Windows® Operating System
- BUILD_VERSION_STRING: 6.1.7601.23915 (win7sp1_ldr.170913-0600)
- MODLIST_WITH_TSCHKSUM_HASH: 79203a833bec45c17e6505c7bb411a50fbda9fe2
- MODLIST_SHA1_HASH: a5e89cc95a9929b7dd7dabb589b2b2320995a1a7
- NTGLOBALFLAG: 2000000
- PROCESS_BAM_CURRENT_THROTTLED: 0
- PROCESS_BAM_PREVIOUS_THROTTLED: 0
- APPLICATION_VERIFIER_FLAGS: 0
- PRODUCT_TYPE: 1
- SUITE_MASK: 272
- DUMP_FLAGS: c07
- DUMP_TYPE: 3
- APPLICATION_VERIFIER_LOADED: 1
- ANALYSIS_SESSION_HOST: CEN460200N00
- ANALYSIS_SESSION_TIME: 03-27-2018 09:10:00.0823
- ANALYSIS_VERSION: 10.0.16299.91 amd64fre
- THREAD_ATTRIBUTES:
- OS_LOCALE: PLK
- PROBLEM_CLASSES:
- ID: [0n301]
- Type: [@ACCESS_VIOLATION]
- Class: Addendum
- Scope: BUCKET_ID
- Name: Omit
- Data: Omit
- PID: [Unspecified]
- TID: [0x22bc]
- Frame: [0] : KERNELBASE!GetStringTypeW
- ID: [0n274]
- Type: [INVALID_POINTER_WRITE]
- Class: Primary
- Scope: DEFAULT_BUCKET_ID (Failure Bucket ID prefix)
- BUCKET_ID
- Name: Add
- Data: Omit
- PID: [Unspecified]
- TID: [0x22bc]
- Frame: [0] : KERNELBASE!GetStringTypeW
- ID: [0n92]
- Type: [AVRF]
- Class: Addendum
- Scope: DEFAULT_BUCKET_ID (Failure Bucket ID prefix)
- BUCKET_ID
- Name: Add
- Data: Omit
- PID: [0x484]
- TID: [0x22bc]
- Frame: [0] : KERNELBASE!GetStringTypeW
- BUGCHECK_STR: APPLICATION_FAULT_INVALID_POINTER_WRITE_AVRF
- DEFAULT_BUCKET_ID: INVALID_POINTER_WRITE_AVRF
- PRIMARY_PROBLEM_CLASS: APPLICATION_FAULT
- LAST_CONTROL_TRANSFER: from 000007fee54250f8 to 000007fefd52ca53
- STACK_TEXT:
- 00000000`21d78700 000007fe`e54250f8 : 00000000`21d79300 00000000`21d78900 00000000`00000000 00000000`00000001 : KERNELBASE!GetStringTypeW+0x12e
- 00000000`21d78730 000007fe`e542507e : 00000000`21d79ba8 000007fe`00000000 00000000`00009383 00000000`21d79300 : Query!CDefWordBreaker::Tokenize+0x48
- 00000000`21d787a0 000007fe`e364f825 : 00000000`21d79b80 00000000`000001f0 00000000`060ecfb0 00000000`21d7af50 : Query!CDefWordBreaker::BreakText+0x126
- 00000000`21d78800 000007fe`e35f5132 : 00000000`060ecfb0 00000000`00000001 00000000`00000000 00000000`1fe24fb0 : mssrch!CPluginCollectionSink::PushProperties+0x1ee6
- 00000000`21d7aed0 00000000`775559cd : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : mssrch!CRobotThread::Thread+0xad0
- 00000000`21d7fca0 00000000`7768a561 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : kernel32!BaseThreadInitThunk+0xd
- 00000000`21d7fcd0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x1d
- THREAD_SHA1_HASH_MOD_FUNC: 4c8c1cfecda63b59af212bd15bc079023df39c92
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 9085cc642f4987179bc67c64054d3e053c527423
- THREAD_SHA1_HASH_MOD: bc7922b499640358eb54711cdd3b1a58e873d739
- FAULT_INSTR_CODE: 840fc085
- SYMBOL_STACK_INDEX: 1
- SYMBOL_NAME: query!CDefWordBreaker::Tokenize+48
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: Query
- IMAGE_NAME: Query.dll
- DEBUG_FLR_IMAGE_TIMESTAMP: 59debd9e
- STACK_COMMAND: ~10s ; .ecxr ; kb
- FAILURE_BUCKET_ID: INVALID_POINTER_WRITE_AVRF_c0000005_Query.dll!CDefWordBreaker::Tokenize
- BUCKET_ID: X64_APPLICATION_FAULT_INVALID_POINTER_WRITE_AVRF_query!CDefWordBreaker::Tokenize+48
- FAILURE_EXCEPTION_CODE: c0000005
- FAILURE_IMAGE_NAME: Query.dll
- BUCKET_ID_IMAGE_STR: Query.dll
- FAILURE_MODULE_NAME: Query
- BUCKET_ID_MODULE_STR: Query
- FAILURE_FUNCTION_NAME: CDefWordBreaker::Tokenize
- BUCKET_ID_FUNCTION_STR: CDefWordBreaker::Tokenize
- BUCKET_ID_OFFSET: 48
- BUCKET_ID_MODTIMEDATESTAMP: 59debd9e
- BUCKET_ID_MODCHECKSUM: 2036f6
- BUCKET_ID_MODVER_STR: 6.1.7601.23930
- BUCKET_ID_PREFIX_STR: X64_APPLICATION_FAULT_INVALID_POINTER_WRITE_AVRF_
- FAILURE_PROBLEM_CLASS: APPLICATION_FAULT
- FAILURE_SYMBOL_NAME: Query.dll!CDefWordBreaker::Tokenize
- WATSON_STAGEONE_URL: http://watson.microsoft.com/StageOne/SearchIndexer.exe/7.0.7601.23930/59deb9ab/KERNELBASE.dll/6.1.7601.23915/59b94f2a/c0000005/0000ca53.htm?Retriage=1
- TARGET_TIME: 2018-03-26T07:35:22.000Z
- OSBUILD: 7601
- OSSERVICEPACK: 23915
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 7
- OSEDITION: Windows 7 WinNt (Service Pack 1) SingleUserTS
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-09-13 17:30:49
- BUILDDATESTAMP_STR: 170913-0600
- BUILDLAB_STR: win7sp1_ldr
- BUILDOSVER_STR: 6.1.7601.23915
- ANALYSIS_SESSION_ELAPSED_TIME: 10858
- ANALYSIS_SOURCE: UM
- FAILURE_ID_HASH_STRING: um:invalid_pointer_write_avrf_c0000005_query.dll!cdefwordbreaker::tokenize
- FAILURE_ID_HASH: {b684ed0d-b6e0-964d-ca33-f5d9d21473d4}
- Followup: MachineOwner
- ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement