놀이터 일간 추천 베스트 |
놀이터 일간 조회 베스트 |
작성자: IMTERMILANO 조회 수: 2204 PC모드
Microsoft (R) Windows Debugger Version 10.0.14321.1024 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\LMSH\Desktop\explorer.exe.4996.dmp]
User Mini Dump File: Only registers, stack and portions of memory are available
************* Symbol Path validation summary **************
Response Time (ms) Location
Deferred SRV* c:\websymbols*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV* c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: SingleUserTS
Machine Name:
Debug session time: Sun Dec 4 20:59:57.000 2016 (UTC + 9:00)
System Uptime: not available
Process Uptime: 0 days 0:45:16.000
................................................................
................................................................
................................................................
..............................
Loading unloaded module list
................................................................
This dump file has an exception of interest stored in it.
The stored exception information can be accessed via .ecxr.
(1384.1cb4): Access violation - code c0000005 (first/second chance not available)
ntdll!NtWaitForMultipleObjects+0xa:
00000000`776dc2ea c3 ret
0:023> !analyze -v
*******************************************************************************
* *
* Exception Analysis *
* *
*******************************************************************************
*** ERROR: Symbol file could not be found. Defaulted to export symbols for tlb.dll -
*** ERROR: Symbol file could not be found. Defaulted to export symbols for NDriveShellExt.dll -
DUMP_CLASS: 2
DUMP_QUALIFIER: 400
CONTEXT: (.ecxr)
rax=000000000aa5a72e rbx=0000000003401790 rcx=0000000000001cb4
rdx=0000000003401790 rsi=000007fef5d94740 rdi=0000000000000003
rip=000007fef5d3136d rsp=000000000a07f6d0 rbp=0000000000000000
r8=0000000000000000 r9=0000000003213110 r10=00000000776b6973
r11=0000000000000000 r12=000007fffffdf000 r13=0000000003388650
r14=000007fffff5c000 r15=00000000777bd670
iopl=0 nv up ei pl nz na po nc
cs=0033 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010206
winhttp!RemoveFromSerializedList+0x29:
000007fe`f5d3136d 49894308 mov qword ptr [r11+8],rax ds:00000000`00000008=????????????????
Resetting default scope
FAULTING_IP:
winhttp!RemoveFromSerializedList+29
000007fe`f5d3136d 49894308 mov qword ptr [r11+8],rax
EXCEPTION_RECORD: (.exr -1)
ExceptionAddress: 000007fef5d3136d (winhttp!RemoveFromSerializedList+0x0000000000000029)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000001
Parameter[1]: 0000000000000008
Attempt to write to address 0000000000000008
PROCESS_NAME: explorer.exe
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000001
EXCEPTION_PARAMETER2: 0000000000000008
FOLLOWUP_IP:
winhttp!RemoveFromSerializedList+29
000007fe`f5d3136d 49894308 mov qword ptr [r11+8],rax
WRITE_ADDRESS: 0000000000000008
WATSON_BKT_PROCSTAMP: 57c44efe
WATSON_BKT_PROCVER: 6.1.7601.23537
WATSON_BKT_MODULE: winhttp.dll
WATSON_BKT_MODSTAMP: 573365e8
WATSON_BKT_MODOFFSET: 136d
WATSON_BKT_MODVER: 6.1.7601.23451
BUILD_VERSION_STRING: 6.1.7601.23569 (win7sp1_ldr.161007-0600)
MODLIST_WITH_TSCHKSUM_HASH: ebedec793ff8d5dc4dc178ddb7d41ca6eebde3db
MODLIST_SHA1_HASH: 7655fb8aba89f90c88ac3e61942ab5e7e63348d6
NTGLOBALFLAG: 0
APPLICATION_VERIFIER_FLAGS: 0
DUMP_FLAGS: 94
DUMP_TYPE: 1
ANALYSIS_SESSION_HOST: LMSH-PC
ANALYSIS_SESSION_TIME: 12-04-2016 21:12:02.0254
ANALYSIS_VERSION: 10.0.14321.1024 amd64fre
THREAD_ATTRIBUTES:
OS_LOCALE: KOR
PROBLEM_CLASSES:
NULL_CLASS_PTR_WRITE
Tid [0x1cb4]
Frame [0x00]: winhttp!RemoveFromSerializedList
SHUTDOWN
Tid [0x1cb4]
Frame [0x00]: winhttp!RemoveFromSerializedList
Failure Bucketing
BUGCHECK_STR: NULL_CLASS_PTR_WRITE_SHUTDOWN
DEFAULT_BUCKET_ID: NULL_CLASS_PTR_WRITE_SHUTDOWN
LAST_CONTROL_TRANSFER: from 000007fef5d3139d to 000007fef5d3136d
STACK_TEXT:
00000000`0a07f6d0 000007fe`f5d3139d : 00000000`03401790 000007fe`f5d30000 00000000`0a07f8a0 00000000`0b1ca874 : winhttp!RemoveFromSerializedList+0x29
00000000`0a07f700 000007fe`f5d31038 : 00000000`0b3b28a8 00000000`0b1d0b08 00000000`0b3b28a8 00000000`00000003 : winhttp!InternetDestroyThreadInfo+0x2e
00000000`0a07f730 000007fe`f5d31166 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : winhttp!DllMain+0x20
00000000`0a07f760 00000000`776d1a98 : 000007fe`f5d30000 000007fe`00000003 00000000`00000000 000007ff`fff5c000 : winhttp!CRT_INIT+0x2af
00000000`0a07f8c0 00000000`776d19d8 : 00000000`00000000 00000000`00000010 00000000`00000000 00000000`00000000 : ntdll!LdrShutdownThread+0x155
00000000`0a07f9c0 000007fe`fc413807 : 000007fe`fcc10000 00000000`00000000 00000000`00000000 00000010`00000100 : ntdll!RtlExitUserThread+0x38
00000000`0a07fa00 00000000`77574ef9 : 00000000`03315c10 00000000`00000000 00000000`00000000 00000000`03315c10 : KERNELBASE!FreeLibraryAndExitThread+0x47
00000000`0a07fa30 000007fe`fe60c7e1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : kernel32!FreeLibraryAndExitThreadStub+0x9
00000000`0a07fa60 00000000`775859cd : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : shlwapi!WrapperThreadProc+0x259
00000000`0a07fb60 00000000`776ba561 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : kernel32!BaseThreadInitThunk+0xd
00000000`0a07fb90 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x1d
THREAD_SHA1_HASH_MOD_FUNC: 40ec0edb6065cf8cdc06345a215a5bdfe33f0be3
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 366fbd8ae09938ee0ed6ed6c7401a2fdf73d23d0
THREAD_SHA1_HASH_MOD: 9a8e69fde423a327ee996d01f4750978c7301f0f
FAULT_INSTR_CODE: 8438949
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: winhttp!RemoveFromSerializedList+29
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: winhttp
IMAGE_NAME: winhttp.dll
DEBUG_FLR_IMAGE_TIMESTAMP: 573365e8
STACK_COMMAND: .ecxr ; kb
BUCKET_ID: X64_NULL_CLASS_PTR_WRITE_SHUTDOWN_winhttp!RemoveFromSerializedList+29
PRIMARY_PROBLEM_CLASS: X64_NULL_CLASS_PTR_WRITE_SHUTDOWN_winhttp!RemoveFromSerializedList+29
FAILURE_EXCEPTION_CODE: c0000005
FAILURE_IMAGE_NAME: winhttp.dll
BUCKET_ID_IMAGE_STR: winhttp.dll
FAILURE_MODULE_NAME: winhttp
BUCKET_ID_MODULE_STR: winhttp
FAILURE_FUNCTION_NAME: RemoveFromSerializedList
BUCKET_ID_FUNCTION_STR: RemoveFromSerializedList
BUCKET_ID_OFFSET: 29
BUCKET_ID_MODTIMEDATESTAMP: 573365e8
BUCKET_ID_MODCHECKSUM: 72d5c
BUCKET_ID_MODVER_STR: 0.0.0.0
BUCKET_ID_PREFIX_STR: X64_NULL_CLASS_PTR_WRITE_SHUTDOWN_
FAILURE_PROBLEM_CLASS: NULL_CLASS_PTR_WRITE_SHUTDOWN
FAILURE_SYMBOL_NAME: winhttp.dll!RemoveFromSerializedList
FAILURE_BUCKET_ID: NULL_CLASS_PTR_WRITE_SHUTDOWN_c0000005_winhttp.dll!RemoveFromSerializedList
WATSON_STAGEONE_URL: http://watson.microsoft.com/StageOne/explorer.exe/6.1.7601.23537/57c44efe/winhttp.dll/6.1.7601.23451/573365e8/c0000005/0000136d.htm?Retriage=1
TARGET_TIME: 2016-12-04T11:59:57.000Z
OSBUILD: 7601
OSSERVICEPACK: 23569
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 256
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
OSEDITION: Windows 7 WinNt (Service Pack 1) SingleUserTS
USER_LCID: 0
OSBUILD_TIMESTAMP: 2016-10-08 00:35:15
BUILDDATESTAMP_STR: 161007-0600
BUILDLAB_STR: win7sp1_ldr
BUILDOSVER_STR: 6.1.7601.23569
ANALYSIS_SESSION_ELAPSED_TIME: 1501
ANALYSIS_SOURCE: UM
FAILURE_ID_HASH_STRING: um:null_class_ptr_write_shutdown_c0000005_winhttp.dll!removefromserializedlist
FAILURE_ID_HASH: {af10b235-9533-e1ba-f300-2cfd884c9255}
Followup: MachineOwner
---------
보니까 winhttp.dll 이라는 파일이 문제같은데 이게 윈도우 탐색기가 중지되었습니다 뜨면서 나온 dmp파일 분석한거거든요
해석해주시면 정말 감사하겠습니다
자료만 받아갈줄 아는 회원님들께, 개발자님들에게 최소한의 경우는 우리가 피드백으로 보답하는 겁니다
문제가 있던 없던 그동안 고생하신 것을 생각하여 피드백 작성을 부탁 드립니다의견쓰기:: 상업광고, 인신공격,비방, 욕설, 아주강한음담패설등의 코멘트는 예고없이 삭제될수 있습니다. 회원정리 게시판
첫번째 댓글을 남겨주세요!