Microsoft (R) Windows Debugger Version 6.2.9200.20512 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Minidump\112512-18610-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 7601.17944.amd64fre.win7sp1_gdr.120830-0333 Machine Name: Kernel base = 0xfffff800`0305b000 PsLoadedModuleList = 0xfffff800`0329f670 Debug session time: Sun Nov 25 15:40:46.104 2012 (UTC - 7:00) System Uptime: 0 days 7:47:51.161 Loading Kernel Symbols ............................................................... ................................................................ .................... Loading User Symbols Loading unloaded module list ........... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 50, {fffffa8048633580, 1, fffff800030e312c, 5} Could not read faulting driver name Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+437c1 ) Followup: MachineOwner --------- 2: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except, it must be protected by a Probe. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: fffffa8048633580, memory referenced. Arg2: 0000000000000001, value 0 = read operation, 1 = write operation. Arg3: fffff800030e312c, If non-zero, the instruction address which referenced the bad memory address. Arg4: 0000000000000005, (reserved) Debugging Details: ------------------ Could not read faulting driver name WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80003309100 GetUlongFromAddress: unable to read from fffff800033091c0 fffffa8048633580 Nonpaged pool FAULTING_IP: nt!ObfDereferenceObject+2c fffff800`030e312c f0480fc11f lock xadd qword ptr [rdi],rbx MM_INTERNAL_CODE: 5 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0x50 PROCESS_NAME: svchost.exe CURRENT_IRQL: 0 TRAP_FRAME: fffff880075a32a0 -- (.trap 0xfffff880075a32a0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000002 rbx=0000000000000000 rcx=fffffa80486335b0 rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000 rip=fffff800030e312c rsp=fffff880075a3430 rbp=fffff880075a3ca0 r8=fffff8000305b000 r9=0000000000000000 r10=fffffffffffffffb r11=fffff88003763101 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po nc nt!ObfDereferenceObject+0x2c: fffff800`030e312c f0480fc11f lock xadd qword ptr [rdi],rbx ds:00000000`00000000=???????????????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff800030808af to fffff800030d9fc0 STACK_TEXT: fffff880`075a3138 fffff800`030808af : 00000000`00000050 fffffa80`48633580 00000000`00000001 fffff880`075a32a0 : nt!KeBugCheckEx fffff880`075a3140 fffff800`030d80ee : 00000000`00000001 fffffa80`48633580 fffffa80`056eee00 ffffffff`ffffffff : nt! ?? ::FNODOBFM::`string'+0x437c1 fffff880`075a32a0 fffff800`030e312c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`0000001f : nt!KiPageFault+0x16e fffff880`075a3430 fffff800`033cc359 : fffff880`075a3ca0 fffff880`075a3758 00000000`00000007 00000000`00000006 : nt!ObfDereferenceObject+0x2c fffff880`075a3490 fffff800`033cc68e : 00000000`00000001 00000000`00000000 00000000`00000001 00000000`00000001 : nt!ObpWaitForMultipleObjects+0x2d3 fffff880`075a3960 fffff800`030d9253 : fffffa80`07df3870 00000000`00ddf6e8 fffff880`075a3bc8 fffff8a0`0162a940 : nt!NtWaitForMultipleObjects+0xe5 fffff880`075a3bb0 00000000`76f218ca : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`00ddf6c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76f218ca STACK_COMMAND: kb FOLLOWUP_IP: nt! ?? ::FNODOBFM::`string'+437c1 fffff800`030808af cc int 3 SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+437c1 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 503f82be FAILURE_BUCKET_ID: X64_0x50_nt!_??_::FNODOBFM::_string_+437c1 BUCKET_ID: X64_0x50_nt!_??_::FNODOBFM::_string_+437c1 Followup: MachineOwner ---------