Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [D:\My Documents\Desktop\050212-30872-01.dmp]
- Mini Kernel Dump File: Only registers and stack trace are available
- Symbol search path is: SRV*D:\Symbols*http://msdl.microsoft.com/download/symbols
- Executable search path is:
- Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 7601.17790.amd64fre.win7sp1_gdr.120305-1505
- Machine Name:
- Kernel base = 0xfffff800`02063000 PsLoadedModuleList = 0xfffff800`022a7650
- Debug session time: Wed May 2 09:21:06.361 2012 (UTC + 8:00)
- System Uptime: 6 days 18:32:18.888
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- ......................................................
- Loading User Symbols
- Loading unloaded module list
- ..................................................
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- Use !analyze -v to get detailed debugging information.
- BugCheck 3B, {c0000005, fffff960001bff92, fffff8800f6f5ff0, 0}
- Probably caused by : win32k.sys ( win32k!xxxTrackPopupMenuEx+9ba )
- Followup: MachineOwner
- ---------
- 0: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- SYSTEM_SERVICE_EXCEPTION (3b)
- An exception happened while executing a system service routine.
- Arguments:
- Arg1: 00000000c0000005, Exception code that caused the bugcheck
- Arg2: fffff960001bff92, Address of the instruction which caused the bugcheck
- Arg3: fffff8800f6f5ff0, Address of the context record for the exception that caused the bugcheck
- Arg4: 0000000000000000, zero.
- Debugging Details:
- ------------------
- EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx
- FAULTING_IP:
- win32k!xxxTrackPopupMenuEx+9ba
- fffff960`001bff92 410fba670808 bt dword ptr [r15+8],8
- CONTEXT: fffff8800f6f5ff0 -- (.cxr 0xfffff8800f6f5ff0)
- rax=0000000000000000 rbx=0000000000000001 rcx=fffff900c3127741
- rdx=fffff900c3f26101 rsi=0000000000000182 rdi=fffff900c2dd8260
- rip=fffff960001bff92 rsp=fffff8800f6f69d0 rbp=fffff900c081b6d0
- r8=fffff900c3f26100 r9=0000000000000080 r10=fffff90000000540
- r11=fffff900c3127740 r12=fffff900c68cf5d0 r13=fffff900c097ef10
- r14=fffff900c09a5b10 r15=0000000000000000
- iopl=0 nv up ei pl zr na po nc
- cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
- win32k!xxxTrackPopupMenuEx+0x9ba:
- fffff960`001bff92 410fba670808 bt dword ptr [r15+8],8 ds:002b:00000000`00000008=????????
- Resetting default scope
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
- BUGCHECK_STR: 0x3B
- PROCESS_NAME: explorer.exe
- CURRENT_IRQL: 0
- LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff960001bff92
- STACK_TEXT:
- fffff880`0f6f69d0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32k!xxxTrackPopupMenuEx+0x9ba
- FOLLOWUP_IP:
- win32k!xxxTrackPopupMenuEx+9ba
- fffff960`001bff92 410fba670808 bt dword ptr [r15+8],8
- SYMBOL_STACK_INDEX: 0
- SYMBOL_NAME: win32k!xxxTrackPopupMenuEx+9ba
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: win32k
- IMAGE_NAME: win32k.sys
- DEBUG_FLR_IMAGE_TIMESTAMP: 4f2b63bd
- STACK_COMMAND: .cxr 0xfffff8800f6f5ff0 ; kb
- FAILURE_BUCKET_ID: X64_0x3B_win32k!xxxTrackPopupMenuEx+9ba
- BUCKET_ID: X64_0x3B_win32k!xxxTrackPopupMenuEx+9ba
- Followup: MachineOwner
- ---------
- 0: kd> lmvm win32k
- start end module name
- fffff960`00090000 fffff960`003a5000 win32k (pdb symbols) d:\symbols\win32k.pdb\35DCD16E200141D2951315F923361A822\win32k.pdb
- Loaded symbol image file: win32k.sys
- Mapped memory image file: d:\symbols\win32k.sys\4F2B63BD315000\win32k.sys
- Image path: \SystemRoot\System32\win32k.sys
- Image name: win32k.sys
- Timestamp: Fri Feb 03 12:34:05 2012 (4F2B63BD)
- CheckSum: 00309DBE
- ImageSize: 00315000
- File version: 6.1.7601.17772
- Product version: 6.1.7601.17772
- File flags: 0 (Mask 3F)
- File OS: 40004 NT Win32
- File type: 3.7 Driver
- File date: 00000000.00000000
- Translations: 0409.04b0
- CompanyName: Microsoft Corporation
- ProductName: Microsoft® Windows® Operating System
- InternalName: win32k.sys
- OriginalFilename: win32k.sys
- ProductVersion: 6.1.7601.17772
- FileVersion: 6.1.7601.17772 (win7sp1_gdr.120202-1527)
- FileDescription: Multi-User Win32 Driver
- LegalCopyright: © Microsoft Corporation. All rights reserved.
- 0: kd> .cxr 0xfffff8800f6f5ff0
- rax=0000000000000000 rbx=0000000000000001 rcx=fffff900c3127741
- rdx=fffff900c3f26101 rsi=0000000000000182 rdi=fffff900c2dd8260
- rip=fffff960001bff92 rsp=fffff8800f6f69d0 rbp=fffff900c081b6d0
- r8=fffff900c3f26100 r9=0000000000000080 r10=fffff90000000540
- r11=fffff900c3127740 r12=fffff900c68cf5d0 r13=fffff900c097ef10
- r14=fffff900c09a5b10 r15=0000000000000000
- iopl=0 nv up ei pl zr na po nc
- cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
- win32k!xxxTrackPopupMenuEx+0x9ba:
- fffff960`001bff92 410fba670808 bt dword ptr [r15+8],8 ds:002b:00000000`00000008=????????
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement