Advertisement
Guest User

Untitled

a guest
Mar 27th, 2018
353
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 7.97 KB | None | 0 0
  1. Microsoft (R) Windows Debugger Version 10.0.16299.91 AMD64
  2. Copyright (c) Microsoft Corporation. All rights reserved.
  3.  
  4.  
  5. Loading Dump File [C:\Localdumps\SearchIndexer.exe.1156.dmp]
  6. User Mini Dump File with Full Memory: Only application data is available
  7.  
  8. Symbol search path is: srv*
  9. Executable search path is:
  10. Windows 7 Version 7601 (Service Pack 1) MP (4 procs) Free x64
  11. Product: WinNt, suite: SingleUserTS
  12. Machine Name:
  13. Debug session time: Mon Mar 26 09:35:22.000 2018 (UTC + 2:00)
  14. System Uptime: 0 days 0:11:33.950
  15. Process Uptime: 0 days 0:00:04.000
  16. ...............................................................
  17. Loading unloaded module list
  18. .......
  19. This dump file has an exception of interest stored in it.
  20. The stored exception information can be accessed via .ecxr.
  21. (484.22bc): Access violation - code c0000005 (first/second chance not available)
  22. ntdll!NtWaitForMultipleObjects+0xa:
  23. 00000000`776ac2ea c3 ret
  24. 0:010> !analyze -v
  25. *******************************************************************************
  26. * *
  27. * Exception Analysis *
  28. * *
  29. *******************************************************************************
  30.  
  31. GetUrlPageData2 (WinHttp) failed: 12002.
  32.  
  33. DUMP_CLASS: 2
  34.  
  35. DUMP_QUALIFIER: 400
  36.  
  37. CONTEXT: (.ecxr)
  38. rax=0000000003aa0024 rbx=0000000022f1c002 rcx=0000000000000302
  39. rdx=0000000000000045 rsi=0000000000008d9e rdi=0000000006ff53c8
  40. rip=000007fefd52ca53 rsp=0000000021d78700 rbp=00000000000001bc
  41. r8=0000000000000004 r9=0000000022f1b438 r10=0000000000000000
  42. r11=0000000021d78740 r12=0000000021d78900 r13=0000000000000000
  43. r14=0000000021d79300 r15=0000000000009383
  44. iopl=0 nv up ei pl nz na pe nc
  45. cs=0033 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010202
  46. KERNELBASE!GetStringTypeW+0x12e:
  47. 000007fe`fd52ca53 66894bfe mov word ptr [rbx-2],cx ds:00000000`22f1c000=????
  48. Resetting default scope
  49.  
  50. FAULTING_IP:
  51. KERNELBASE!GetStringTypeW+12e
  52. 000007fe`fd52ca53 66894bfe mov word ptr [rbx-2],cx
  53.  
  54. EXCEPTION_RECORD: (.exr -1)
  55. ExceptionAddress: 000007fefd52ca53 (KERNELBASE!GetStringTypeW+0x000000000000012e)
  56. ExceptionCode: c0000005 (Access violation)
  57. ExceptionFlags: 00000000
  58. NumberParameters: 2
  59. Parameter[0]: 0000000000000001
  60. Parameter[1]: 0000000022f1c000
  61. Attempt to write to address 0000000022f1c000
  62.  
  63. PROCESS_NAME: SearchIndexer.exe
  64.  
  65. ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
  66.  
  67. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
  68.  
  69. EXCEPTION_CODE_STR: c0000005
  70.  
  71. EXCEPTION_PARAMETER1: 0000000000000001
  72.  
  73. EXCEPTION_PARAMETER2: 0000000022f1c000
  74.  
  75. FOLLOWUP_IP:
  76. Query!CDefWordBreaker::Tokenize+48
  77. 000007fe`e54250f8 85c0 test eax,eax
  78.  
  79. WRITE_ADDRESS: 0000000022f1c000
  80.  
  81. WATSON_BKT_PROCSTAMP: 59deb9ab
  82.  
  83. WATSON_BKT_PROCVER: 7.0.7601.23930
  84.  
  85. PROCESS_VER_PRODUCT: Windows® Search
  86.  
  87. WATSON_BKT_MODULE: KERNELBASE.dll
  88.  
  89. WATSON_BKT_MODSTAMP: 59b94f2a
  90.  
  91. WATSON_BKT_MODOFFSET: ca53
  92.  
  93. WATSON_BKT_MODVER: 6.1.7601.23915
  94.  
  95. MODULE_VER_PRODUCT: Microsoft® Windows® Operating System
  96.  
  97. BUILD_VERSION_STRING: 6.1.7601.23915 (win7sp1_ldr.170913-0600)
  98.  
  99. MODLIST_WITH_TSCHKSUM_HASH: 79203a833bec45c17e6505c7bb411a50fbda9fe2
  100.  
  101. MODLIST_SHA1_HASH: a5e89cc95a9929b7dd7dabb589b2b2320995a1a7
  102.  
  103. NTGLOBALFLAG: 2000000
  104.  
  105. PROCESS_BAM_CURRENT_THROTTLED: 0
  106.  
  107. PROCESS_BAM_PREVIOUS_THROTTLED: 0
  108.  
  109. APPLICATION_VERIFIER_FLAGS: 0
  110.  
  111. PRODUCT_TYPE: 1
  112.  
  113. SUITE_MASK: 272
  114.  
  115. DUMP_FLAGS: c07
  116.  
  117. DUMP_TYPE: 3
  118.  
  119. APPLICATION_VERIFIER_LOADED: 1
  120.  
  121. ANALYSIS_SESSION_HOST: CEN460200N00
  122.  
  123. ANALYSIS_SESSION_TIME: 03-27-2018 09:10:00.0823
  124.  
  125. ANALYSIS_VERSION: 10.0.16299.91 amd64fre
  126.  
  127. THREAD_ATTRIBUTES:
  128. OS_LOCALE: PLK
  129.  
  130. PROBLEM_CLASSES:
  131.  
  132. ID: [0n301]
  133. Type: [@ACCESS_VIOLATION]
  134. Class: Addendum
  135. Scope: BUCKET_ID
  136. Name: Omit
  137. Data: Omit
  138. PID: [Unspecified]
  139. TID: [0x22bc]
  140. Frame: [0] : KERNELBASE!GetStringTypeW
  141.  
  142. ID: [0n274]
  143. Type: [INVALID_POINTER_WRITE]
  144. Class: Primary
  145. Scope: DEFAULT_BUCKET_ID (Failure Bucket ID prefix)
  146. BUCKET_ID
  147. Name: Add
  148. Data: Omit
  149. PID: [Unspecified]
  150. TID: [0x22bc]
  151. Frame: [0] : KERNELBASE!GetStringTypeW
  152.  
  153. ID: [0n92]
  154. Type: [AVRF]
  155. Class: Addendum
  156. Scope: DEFAULT_BUCKET_ID (Failure Bucket ID prefix)
  157. BUCKET_ID
  158. Name: Add
  159. Data: Omit
  160. PID: [0x484]
  161. TID: [0x22bc]
  162. Frame: [0] : KERNELBASE!GetStringTypeW
  163.  
  164. BUGCHECK_STR: APPLICATION_FAULT_INVALID_POINTER_WRITE_AVRF
  165.  
  166. DEFAULT_BUCKET_ID: INVALID_POINTER_WRITE_AVRF
  167.  
  168. PRIMARY_PROBLEM_CLASS: APPLICATION_FAULT
  169.  
  170. LAST_CONTROL_TRANSFER: from 000007fee54250f8 to 000007fefd52ca53
  171.  
  172. STACK_TEXT:
  173. 00000000`21d78700 000007fe`e54250f8 : 00000000`21d79300 00000000`21d78900 00000000`00000000 00000000`00000001 : KERNELBASE!GetStringTypeW+0x12e
  174. 00000000`21d78730 000007fe`e542507e : 00000000`21d79ba8 000007fe`00000000 00000000`00009383 00000000`21d79300 : Query!CDefWordBreaker::Tokenize+0x48
  175. 00000000`21d787a0 000007fe`e364f825 : 00000000`21d79b80 00000000`000001f0 00000000`060ecfb0 00000000`21d7af50 : Query!CDefWordBreaker::BreakText+0x126
  176. 00000000`21d78800 000007fe`e35f5132 : 00000000`060ecfb0 00000000`00000001 00000000`00000000 00000000`1fe24fb0 : mssrch!CPluginCollectionSink::PushProperties+0x1ee6
  177. 00000000`21d7aed0 00000000`775559cd : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : mssrch!CRobotThread::Thread+0xad0
  178. 00000000`21d7fca0 00000000`7768a561 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : kernel32!BaseThreadInitThunk+0xd
  179. 00000000`21d7fcd0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x1d
  180.  
  181.  
  182. THREAD_SHA1_HASH_MOD_FUNC: 4c8c1cfecda63b59af212bd15bc079023df39c92
  183.  
  184. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 9085cc642f4987179bc67c64054d3e053c527423
  185.  
  186. THREAD_SHA1_HASH_MOD: bc7922b499640358eb54711cdd3b1a58e873d739
  187.  
  188. FAULT_INSTR_CODE: 840fc085
  189.  
  190. SYMBOL_STACK_INDEX: 1
  191.  
  192. SYMBOL_NAME: query!CDefWordBreaker::Tokenize+48
  193.  
  194. FOLLOWUP_NAME: MachineOwner
  195.  
  196. MODULE_NAME: Query
  197.  
  198. IMAGE_NAME: Query.dll
  199.  
  200. DEBUG_FLR_IMAGE_TIMESTAMP: 59debd9e
  201.  
  202. STACK_COMMAND: ~10s ; .ecxr ; kb
  203.  
  204. FAILURE_BUCKET_ID: INVALID_POINTER_WRITE_AVRF_c0000005_Query.dll!CDefWordBreaker::Tokenize
  205.  
  206. BUCKET_ID: X64_APPLICATION_FAULT_INVALID_POINTER_WRITE_AVRF_query!CDefWordBreaker::Tokenize+48
  207.  
  208. FAILURE_EXCEPTION_CODE: c0000005
  209.  
  210. FAILURE_IMAGE_NAME: Query.dll
  211.  
  212. BUCKET_ID_IMAGE_STR: Query.dll
  213.  
  214. FAILURE_MODULE_NAME: Query
  215.  
  216. BUCKET_ID_MODULE_STR: Query
  217.  
  218. FAILURE_FUNCTION_NAME: CDefWordBreaker::Tokenize
  219.  
  220. BUCKET_ID_FUNCTION_STR: CDefWordBreaker::Tokenize
  221.  
  222. BUCKET_ID_OFFSET: 48
  223.  
  224. BUCKET_ID_MODTIMEDATESTAMP: 59debd9e
  225.  
  226. BUCKET_ID_MODCHECKSUM: 2036f6
  227.  
  228. BUCKET_ID_MODVER_STR: 6.1.7601.23930
  229.  
  230. BUCKET_ID_PREFIX_STR: X64_APPLICATION_FAULT_INVALID_POINTER_WRITE_AVRF_
  231.  
  232. FAILURE_PROBLEM_CLASS: APPLICATION_FAULT
  233.  
  234. FAILURE_SYMBOL_NAME: Query.dll!CDefWordBreaker::Tokenize
  235.  
  236. WATSON_STAGEONE_URL: http://watson.microsoft.com/StageOne/SearchIndexer.exe/7.0.7601.23930/59deb9ab/KERNELBASE.dll/6.1.7601.23915/59b94f2a/c0000005/0000ca53.htm?Retriage=1
  237.  
  238. TARGET_TIME: 2018-03-26T07:35:22.000Z
  239.  
  240. OSBUILD: 7601
  241.  
  242. OSSERVICEPACK: 23915
  243.  
  244. SERVICEPACK_NUMBER: 0
  245.  
  246. OS_REVISION: 0
  247.  
  248. OSPLATFORM_TYPE: x64
  249.  
  250. OSNAME: Windows 7
  251.  
  252. OSEDITION: Windows 7 WinNt (Service Pack 1) SingleUserTS
  253.  
  254. USER_LCID: 0
  255.  
  256. OSBUILD_TIMESTAMP: 2017-09-13 17:30:49
  257.  
  258. BUILDDATESTAMP_STR: 170913-0600
  259.  
  260. BUILDLAB_STR: win7sp1_ldr
  261.  
  262. BUILDOSVER_STR: 6.1.7601.23915
  263.  
  264. ANALYSIS_SESSION_ELAPSED_TIME: 10858
  265.  
  266. ANALYSIS_SOURCE: UM
  267.  
  268. FAILURE_ID_HASH_STRING: um:invalid_pointer_write_avrf_c0000005_query.dll!cdefwordbreaker::tokenize
  269.  
  270. FAILURE_ID_HASH: {b684ed0d-b6e0-964d-ca33-f5d9d21473d4}
  271.  
  272. Followup: MachineOwner
  273. ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement