Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\Knut\Documents\Knut\120310-18174-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: srv*"c:\temp"*http://msdl.microsoft.com/downloads/symbols Executable search path is: srv*c:\temp*http://msdl.microsoft.com/downloads/symbols Windows 7 Kernel Version 7600 MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 7600.16617.amd64fre.win7_gdr.100618-1621 Machine Name: Kernel base = 0xfffff800`02a64000 PsLoadedModuleList = 0xfffff800`02ca1e50 Debug session time: Fri Dec 3 23:29:05.716 2010 (UTC + 1:00) System Uptime: 0 days 6:19:57.762 Loading Kernel Symbols ............................................................... ................................................................ ................. Loading User Symbols Loading unloaded module list .......... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 1E, {ffffffffc0000005, 33e, 8, 33e} Probably caused by : ntkrnlmp.exe ( nt!KiDispatchException+1b9 ) Followup: MachineOwner --------- 3: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: 000000000000033e, The address that the exception occurred at Arg3: 0000000000000008, Parameter 0 of the exception Arg4: 000000000000033e, Parameter 1 of the exception Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Instruksjonen i 0x%08lx refererte minne ved adressen 0x%08lx. Minnet kunne ikke v re %s. FAULTING_IP: +3236313636396239 00000000`0000033e ?? ??? EXCEPTION_PARAMETER1: 0000000000000008 EXCEPTION_PARAMETER2: 000000000000033e WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d0c0e0 000000000000033e ERROR_CODE: (NTSTATUS) 0xc0000005 - Instruksjonen i 0x%08lx refererte minne ved adressen 0x%08lx. Minnet kunne ikke v re %s. BUGCHECK_STR: 0x1E_c0000005 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: WerFault.exe CURRENT_IRQL: 0 EXCEPTION_RECORD: fffff88008372d58 -- (.exr 0xfffff88008372d58) ExceptionAddress: 000000000000033e ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000008 Parameter[1]: 000000000000033e Attempt to execute non-executable address 000000000000033e TRAP_FRAME: fffff88008372e00 -- (.trap 0xfffff88008372e00) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fffff900c0580a70 rbx=0000000000000000 rcx=0000000000000040 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=000000000000033e rsp=fffff88008372f90 rbp=0000000000000000 r8=00000000fffffff7 r9=0000000000000000 r10=fffff900c241c010 r11=fffff88008372f60 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po nc 00000000`0000033e ?? ??? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80002b0ea39 to fffff80002ad4740 STACK_TEXT: fffff880`08372588 fffff800`02b0ea39 : 00000000`0000001e ffffffff`c0000005 00000000`0000033e 00000000`00000008 : nt!KeBugCheckEx fffff880`08372590 fffff800`02ad3d82 : fffff880`08372d58 00000000`0000033e fffff880`08372e00 fffff960`001603c5 : nt!KiDispatchException+0x1b9 fffff880`08372c20 fffff800`02ad28fa : 00000000`00000008 00000000`0000033e fffff880`08372f00 fffff960`00203861 : nt!KiExceptionDispatch+0xc2 fffff880`08372e00 00000000`0000033e : 00000000`0000033e 00000000`24448944 00000215`00000001 fffff880`08372ff0 : nt!KiPageFault+0x23a fffff880`08372f90 00000000`0000033e : 00000000`24448944 00000215`00000001 fffff880`08372ff0 00000000`00000001 : 0x33e fffff880`08372f98 00000000`24448944 : 00000215`00000001 fffff880`08372ff0 00000000`00000001 00000000`00000000 : 0x33e fffff880`08372fa0 00000215`00000001 : fffff880`08372ff0 00000000`00000001 00000000`00000000 00000000`00000001 : 0x24448944 fffff880`08372fa8 fffff880`08372ff0 : 00000000`00000001 00000000`00000000 00000000`00000001 00000000`00000000 : 0x215`00000001 fffff880`08372fb0 00000000`00000001 : 00000000`00000000 00000000`00000001 00000000`00000000 00000000`00000200 : 0xfffff880`08372ff0 fffff880`08372fb8 00000000`00000000 : 00000000`00000001 00000000`00000000 00000000`00000200 fffff900`c08248b0 : 0x1 STACK_COMMAND: kb FOLLOWUP_IP: nt!KiDispatchException+1b9 fffff800`02b0ea39 cc int 3 SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt!KiDispatchException+1b9 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9 FAILURE_BUCKET_ID: X64_0x1E_c0000005_nt!KiDispatchException+1b9 BUCKET_ID: X64_0x1E_c0000005_nt!KiDispatchException+1b9 Followup: MachineOwner ---------