ozr1
Member | Редактировать | Профиль | Сообщение | Цитировать | Сообщить модератору Primary Analysis Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com) Online Crash Dump Analysis Service See http://www.osronline.com for more information Windows 7 Version 7601 (Service Pack 1) MP (8 procs) Free x64 Product: WinNt, suite: SingleUserTS kernel32.dll version: 6.1.7601.24117 (win7sp1_ldr_escrow.180422-1430) Machine Name: Debug session time: Sat May 19 07:46:05.000 2018 (UTC - 4:00) System Uptime: not available Process Uptime: 0 days 0:00:42.000 Kernel time: 0 days 0:00:00.000 User time: 0 days 0:00:00.000 TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\oca.ini, error 2 TRIAGER: Could not open triage file : e:\dump_analysis\program\winxp\triage.ini, error 2 TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\user.ini, error 2 ******************************************************************************* * * * Exception Analysis * * * ******************************************************************************* *** WARNING: Unable to verify timestamp for DnsCachePlugin.dll *** ERROR: Module load completed but symbols could not be loaded for DnsCachePlugin.dll *** ERROR: Symbol file could not be found. Defaulted to export symbols for kernel32.dll - TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\guids.ini, error 2 *** WARNING: Unable to verify timestamp for ProcessHacker.exe *** ERROR: Module load completed but symbols could not be loaded for ProcessHacker.exe Unable to load image C:\Windows\System32\ole32.dll, Win32 error 0n2 *** WARNING: Unable to verify timestamp for ole32.dll TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2 GetUrlPageData2 (WinHttp) failed: 12029. FAULTING_IP: ntdll!safecrt_mbtowc+34 00000000`773c0be4 e847e5fcff call ntdll!RtlAnsiCharToUnicodeChar (00000000`7738f130) EXCEPTION_RECORD: ffffffffffffffff -- (.exr 0xffffffffffffffff) ExceptionAddress: 00000000773c0be4 (ntdll!safecrt_mbtowc+0x0000000000000034) ExceptionCode: c00000fd (Stack overflow) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000001 Parameter[1]: 0000000004693fe8 DEFAULT_BUCKET_ID: STACK_OVERFLOW PROCESS_NAME: ProcessHacker.exe ERROR_CODE: (NTSTATUS) 0xc00000fd - A new guard page for the stack cannot be created. EXCEPTION_CODE: (NTSTATUS) 0xc00000fd - A new guard page for the stack cannot be created. EXCEPTION_PARAMETER1: 0000000000000001 EXCEPTION_PARAMETER2: 0000000004693fe8 NTGLOBALFLAG: 0 APPLICATION_VERIFIER_FLAGS: 0 FAULTING_THREAD: 000000000000179c PRIMARY_PROBLEM_CLASS: STACK_OVERFLOW BUGCHECK_STR: APPLICATION_FAULT_STACK_OVERFLOW_INVALID_POINTER_READ LAST_CONTROL_TRANSFER: from 00000000773c476a to 00000000773c0be4 STACK_TEXT: 00000000`04693ff0 00000000`773c476a : 00000000`0469429d 00000000`0469429d 00000000`00000000 00000000`00000000 : ntdll!safecrt_mbtowc+0x34 00000000`04694020 00000000`773c4ae0 : 00000000`00000000 00000000`04694640 00000000`02800230 00000000`037ae930 : ntdll!woutput_s+0x5ea 00000000`046944f0 00000000`773c2457 : 00000000`04694640 00000000`00000000 00000000`037aeb60 00000000`00000000 : ntdll!swoutput_s+0x7c 00000000`04694560 00000000`773c24a4 : 00000000`04694640 00000000`037aead0 00000000`00000005 00000000`00000001 : ntdll!vswprintf_s+0x23 00000000`046945a0 00000000`773b083d : 00000000`00000000 00000000`773c4ae0 00000000`773d4cf0 00000000`0000007f : ntdll!swprintf_s+0x18 00000000`046945d0 000007fe`f61b1e89 : 00000000`04694730 00000000`00000042 00000000`037aeb60 000007fe`fc2a1568 : ntdll!RtlIpv4AddressToStringW+0x3d 00000000`04694620 00000000`04694730 : 00000000`00000042 00000000`037aeb60 000007fe`fc2a1568 00000000`00000000 : DnsCachePlugin+0x1e89 00000000`04694628 00000000`00000042 : 00000000`037aeb60 000007fe`fc2a1568 00000000`00000000 00000000`00000000 : 0x4694730 00000000`04694630 00000000`037aeb60 : 000007fe`fc2a1568 00000000`00000000 00000000`00000000 00000000`00000000 : 0x42 00000000`04694638 000007fe`fc2a1568 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x37aeb60 00000000`04694640 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : dnsapi!Dns_StringCopyAllocate+0xa3 STACK_COMMAND: ~3s; .ecxr ; kb FOLLOWUP_IP: DnsCachePlugin+1e89 000007fe`f61b1e89 ?? ??? SYMBOL_STACK_INDEX: 6 SYMBOL_NAME: dnscacheplugin+1e89 FOLLOWUP_NAME: MachineOwner MODULE_NAME: DnsCachePlugin IMAGE_NAME: DnsCachePlugin.dll DEBUG_FLR_IMAGE_TIMESTAMP: 5afde7b7 FAILURE_BUCKET_ID: STACK_OVERFLOW_c00000fd_DnsCachePlugin.dll!Unknown BUCKET_ID: X64_APPLICATION_FAULT_STACK_OVERFLOW_INVALID_POINTER_READ_dnscacheplugin+1e89 WATSON_STAGEONE_URL: http://watson.microsoft.com/StageOne/ProcessHacker_exe/3_0_6002_1475/5afdd07f/ntdll_dll/6_1_7601_24117/5add228d/c00000fd/00060be4.htm?Retriage=1 Followup: MachineOwner --------- |