Microsoft (R) Windows Debugger Version 6.3.9600.17336 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Minidump\081215-5921-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available ************* Symbol Path validation summary ************** Response Time (ms) Location Deferred SRV*C:\Minidump\SYMBOLS*http://msdl.microsoft.com/download/symbols Symbol search path is: SRV*C:\Minidump\SYMBOLS*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 8 Kernel Version 9600 MP (8 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 9600.17736.amd64fre.winblue_r9.150322-1500 Machine Name: Kernel base = 0xfffff802`5b801000 PsLoadedModuleList = 0xfffff802`5bada850 Debug session time: Wed Aug 12 09:32:05.857 2015 (UTC + 2:00) System Uptime: 0 days 0:01:50.820 Loading Kernel Symbols ............................................................... ................................................................ ................................ Loading User Symbols Loading unloaded module list .......... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 1A, {41793, fffff6800006c658, 16, 15} Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+111ef ) Followup: MachineOwner --------- 3: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000041793, The subtype of the bugcheck. Arg2: fffff6800006c658 Arg3: 0000000000000016 Arg4: 0000000000000015 Debugging Details: ------------------ BUGCHECK_STR: 0x1a_41793 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT PROCESS_NAME: OUTLOOK.EXE CURRENT_IRQL: 0 ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre LAST_CONTROL_TRANSFER: from fffff8025b9733af to fffff8025b951ca0 STACK_TEXT: ffffd000`aeb0d988 fffff802`5b9733af : 00000000`0000001a 00000000`00041793 fffff680`0006c658 00000000`00000016 : nt!KeBugCheckEx ffffd000`aeb0d990 fffff802`5b8461e3 : 00000000`00000000 00000000`00150dcd 00000000`00000000 ffffe000`4e7afda8 : nt! ?? ::FNODOBFM::`string'+0x111ef ffffd000`aeb0dc20 fffff802`5bb9b2a1 : ffffe000`4d287b50 00000000`0d890000 00000000`00000000 7fffffff`00000000 : nt!MiDeleteVad+0x233 ffffd000`aeb0dd20 fffff802`5bb9ad9d : 00000000`00000000 00000000`00000008 00000000`00000000 00000000`0012d401 : nt!MiUnmapViewOfSection+0xfd ffffd000`aeb0ddf0 fffff802`5b95d4b3 : ffffe000`4e4a9080 00000000`00000000 ffffe000`4e7af8c0 ffffe000`4f153930 : nt!NtUnmapViewOfSection+0x65 ffffd000`aeb0de40 00007ffd`f5a0146a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`0012cbe8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`f5a0146a STACK_COMMAND: kb FOLLOWUP_IP: nt! ?? ::FNODOBFM::`string'+111ef fffff802`5b9733af cc int 3 SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+111ef FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 550f41a6 IMAGE_VERSION: 6.3.9600.17736 BUCKET_ID_FUNC_OFFSET: 111ef FAILURE_BUCKET_ID: 0x1a_41793_nt!_??_::FNODOBFM::_string_ BUCKET_ID: 0x1a_41793_nt!_??_::FNODOBFM::_string_ ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x1a_41793_nt!_??_::fnodobfm::_string_ FAILURE_ID_HASH: {2bb49b32-09fa-a96d-8b93-292cf7a50b3f} Followup: MachineOwner ---------