Deek
Well-known member
Win 7 x64, 16gb PC2133, Samsung SSD, WD Black 500gb, AMD A10, Gigabyte MB
Fresh install, fully updated, not infected!
Here is the windbg, anyone want to take a shot at deciphering it?
Fresh install, fully updated, not infected!
Here is the windbg, anyone want to take a shot at deciphering it?
Code:
1: kd> !analyze -v
**************************************************************************
*****
*
*
* Bugcheck Analysis
*
*
*
**************************************************************************
*****
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a [B]*portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050031
Arg3: 00000000000406f8
Arg4: fffff80002ea614e
Debugging Details:
------------------
BUGCHECK_STR: 0x7f_8
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: mscorsvw.exe
CURRENT_IRQL: 2
EXCEPTION_RECORD: fffff88008469ba8 -- (.exr 0xfffff88008469ba8)
ExceptionAddress: fffff80002ea07fe (nt!MiRemoveAnyPage+0x000000000000013e)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
TRAP_FRAME: fffff88008469c50 -- (.trap 0xfffff88008469c50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ea07fe rsp=fffff88008469de0 rbp=fffff8800846e658
r8=0000000000000000 r9=0000000000000002 r10=0000000000000000
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MiRemoveAnyPage+0x13e:
fffff800`02ea07fe f0410fba6c241000 lock bts dword ptr [r12+10h],0
ds:00000000`00000010=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002e7c169 to fffff80002e7cbc0
STACK_TEXT:
fffff880`009c6ce8 fffff800`02e7c169 : 00000000`0000007f 00000000`00000008
00000000`80050031 00000000`000406f8 : nt!KeBugCheckEx
fffff880`009c6cf0 fffff800`02e7a632 : 00000000`00000000 00000000`00000000
00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`009c6e30 fffff800`02ea614e : 00000000`00000000 00000000`00000000
00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
fffff880`08468cf0 fffff800`02eb74c1 : fffff880`08469ba8 fffff880`08469900
fffff880`08469c50 fffff880`0846e660 : nt!RtlDispatchException+0x2e
fffff880`084693d0 fffff800`02e7c242 : fffff880`08469ba8 00000000`00000017
fffff880`08469c50 fffff800`02e07000 : nt!KiDispatchException+0x135
fffff880`08469a70 fffff800`02e7ab4a : 00000000`00000000 00000000`00000000
00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`08469c50 fffff800`02ea07fe : 00000000`00000000 00000000`00000000
00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x10a
fffff880`08469de0 00000000`00000000 : 00000000`00000000 00000000`00000000
00000000`00000000 00000000`00000000 : nt!MiRemoveAnyPage+0x13e
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiDoubleFaultAbort+b2
fffff800`02e7a632 90 nop
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiDoubleFaultAbort+b2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 521ea035
FAILURE_BUCKET_ID: X64_0x7f_8_nt!KiDoubleFaultAbort+b2
BUCKET_ID: X64_0x7f_8_nt!KiDoubleFaultAbort+b2
Followup: MachineOwner
[/B]
Last edited by a moderator: