Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\MEMORY.DMP] Kernel Summary Dump File: Only kernel address space is available Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) UP Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506 Machine Name: Kernel base = 0xfffff800`02c52000 PsLoadedModuleList = 0xfffff800`02e97670 Debug session time: Thu Aug 25 16:44:11.518 2011 (UTC - 6:00) System Uptime: 0 days 0:04:17.136 Loading Kernel Symbols ............................................................... ................................................................ .................................. Loading User Symbols PEB is paged out (Peb.Ldr = 000007ff`fffd6018). Type ".hh dbgerr001" for details Loading unloaded module list ....... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 50, {fffff901c203bfb8, 0, fffff9600095cf70, 5} Page 5693c not present in the dump file. Type ".hh dbgerr004" for details Page 5693c not present in the dump file. Type ".hh dbgerr004" for details *** ERROR: Module load completed but symbols could not be loaded for VBoxDisp.dll Page 5666b not present in the dump file. Type ".hh dbgerr004" for details Page 560e1 not present in the dump file. Type ".hh dbgerr004" for details Page 5663e not present in the dump file. Type ".hh dbgerr004" for details Page 5663e not present in the dump file. Type ".hh dbgerr004" for details Page 5663e not present in the dump file. Type ".hh dbgerr004" for details Page 5663e not present in the dump file. Type ".hh dbgerr004" for details Page 5663e not present in the dump file. Type ".hh dbgerr004" for details Page 5663e not present in the dump file. Type ".hh dbgerr004" for details Page 5663e not present in the dump file. Type ".hh dbgerr004" for details Page 5663e not present in the dump file. Type ".hh dbgerr004" for details Page 5663e not present in the dump file. Type ".hh dbgerr004" for details Page 5663e not present in the dump file. Type ".hh dbgerr004" for details Page 5663e not present in the dump file. Type ".hh dbgerr004" for details Page 5663e not present in the dump file. Type ".hh dbgerr004" for details Page 5663e not present in the dump file. Type ".hh dbgerr004" for details Page 5663e not present in the dump file. Type ".hh dbgerr004" for details Page 5663e not present in the dump file. Type ".hh dbgerr004" for details Page 5663e not present in the dump file. Type ".hh dbgerr004" for details Page 5663e not present in the dump file. Type ".hh dbgerr004" for details Page 5663e not present in the dump file. Type ".hh dbgerr004" for details Page 5663e not present in the dump file. Type ".hh dbgerr004" for details Page 5663e not present in the dump file. Type ".hh dbgerr004" for details Probably caused by : VBoxDisp.dll ( VBoxDisp+cf70 ) Followup: MachineOwner --------- kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except, it must be protected by a Probe. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: fffff901c203bfb8, memory referenced. Arg2: 0000000000000000, value 0 = read operation, 1 = write operation. Arg3: fffff9600095cf70, If non-zero, the instruction address which referenced the bad memory address. Arg4: 0000000000000005, (reserved) Debugging Details: ------------------ Page 560e1 not present in the dump file. Type ".hh dbgerr004" for details Page 5663e not present in the dump file. Type ".hh dbgerr004" for details Page 5663e not present in the dump file. Type ".hh dbgerr004" for details Page 5663e not present in the dump file. Type ".hh dbgerr004" for details Page 5663e not present in the dump file. Type ".hh dbgerr004" for details Page 5663e not present in the dump file. Type ".hh dbgerr004" for details Page 5663e not present in the dump file. Type ".hh dbgerr004" for details Page 5663e not present in the dump file. Type ".hh dbgerr004" for details Page 5663e not present in the dump file. Type ".hh dbgerr004" for details Page 5663e not present in the dump file. Type ".hh dbgerr004" for details Page 5663e not present in the dump file. Type ".hh dbgerr004" for details Page 5663e not present in the dump file. Type ".hh dbgerr004" for details Page 5663e not present in the dump file. Type ".hh dbgerr004" for details Page 5663e not present in the dump file. Type ".hh dbgerr004" for details Page 5663e not present in the dump file. Type ".hh dbgerr004" for details Page 5663e not present in the dump file. Type ".hh dbgerr004" for details Page 5663e not present in the dump file. Type ".hh dbgerr004" for details Page 5663e not present in the dump file. Type ".hh dbgerr004" for details Page 5663e not present in the dump file. Type ".hh dbgerr004" for details Page 5663e not present in the dump file. Type ".hh dbgerr004" for details Page 5663e not present in the dump file. Type ".hh dbgerr004" for details READ_ADDRESS: fffff901c203bfb8 FAULTING_IP: VBoxDisp+cf70 fffff960`0095cf70 488b040a mov rax,qword ptr [rdx+rcx] MM_INTERNAL_CODE: 5 IMAGE_NAME: VBoxDisp.dll DEBUG_FLR_IMAGE_TIMESTAMP: 4e4913e3 MODULE_NAME: VBoxDisp FAULTING_MODULE: fffff96000950000 VBoxDisp DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x50 PROCESS_NAME: SnippingTool.e CURRENT_IRQL: 0 TRAP_FRAME: fffff88006624960 -- (.trap 0xfffff88006624960) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fffff900c00cc040 rbx=0000000000000000 rcx=fffff900c00cc060 rdx=0000000101f6ff58 rsi=0000000000000000 rdi=0000000000000000 rip=fffff9600095cf70 rsp=fffff88006624af8 rbp=0000000000000020 r8=0000000000000020 r9=0000000000000001 r10=0000000000000000 r11=fffff900c00cc060 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na pe cy VBoxDisp+0xcf70: fffff960`0095cf70 488b040a mov rax,qword ptr [rdx+rcx] ds:d248:bfb8=???????????????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80002c793bf to fffff80002ccec40 STACK_TEXT: fffff880`066247f8 fffff800`02c793bf : 00000000`00000050 fffff901`c203bfb8 00000000`00000000 fffff880`06624960 : nt!KeBugCheckEx fffff880`06624800 fffff800`02cccd6e : 00000000`00000000 fffff901`c203bfb8 00000000`00000a00 fffff900`c00cc020 : nt! ?? ::FNODOBFM::`string'+0x44791 fffff880`06624960 fffff960`0095cf70 : fffff960`009531f8 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e fffff880`06624af8 fffff960`009531f8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : VBoxDisp+0xcf70 fffff880`06624b00 fffff960`0095341d : fffff900`c00c8020 fffff900`c00c0cd8 fffff900`c00c8020 00000000`00000000 : VBoxDisp+0x31f8 fffff880`06624b80 fffff960`0027c7af : fffff900`c00c0cd8 00000000`00000000 00000000`00000000 00000004`00000008 : VBoxDisp+0x341d fffff880`06624bd0 fffff960`000754be : fffff900`c00da010 fffff900`c00c0cd8 fffff900`c203bcc0 fffff900`c201ecc0 : win32k!WatchdogDrvSetPointerShape+0xa7 fffff880`06624c50 fffff960`00074d77 : 00000000`000001bc fffffa80`02d59030 00000000`00000000 fffff900`00000000 : win32k!vSetPointer+0x5be fffff880`06624d70 fffff960`000e40f6 : fffff900`c00c6000 fffff900`c1db3450 fffff900`c1d52d00 fffff960`00000000 : win32k!GreSetPointer+0x177 fffff880`06624e20 fffff960`000c5acb : fffff900`c1efcc20 fffff880`06624f60 00000000`00000000 fffff900`c01a5010 : win32k!zzzUpdateCursorImage+0x28e fffff880`06624e60 fffff960`0010c363 : 00000000`00000000 fffff880`06624f60 00000000`00000000 00000000`00000000 : win32k!zzzSetCursor+0x77 fffff880`06624eb0 fffff800`02ccded3 : fffffa80`013ae8e0 fffff880`06624f60 00000000`0185000f 00000000`02010ad5 : win32k!NtUserSetCursor+0x4b fffff880`06624ee0 00000000`7713c93a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`0022f4f8 fffff800`02cc6210 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7713c93a fffff880`066252d0 fffff880`066252e8 : 00000000`01c801ba fffff880`066252f8 fffff900`00000018 ffff01e0`064dd2f6 : nt!KiCallUserMode fffff880`066252d8 00000000`01c801ba : fffff880`066252f8 fffff900`00000018 ffff01e0`064dd2f6 fffff880`06625db0 : 0xfffff880`066252e8 fffff880`066252e0 fffff880`066252f8 : fffff900`00000018 ffff01e0`064dd2f6 fffff880`06625db0 00000000`00000000 : 0x1c801ba fffff880`066252e8 fffff900`00000018 : ffff01e0`064dd2f6 fffff880`06625db0 00000000`00000000 00000000`00000000 : 0xfffff880`066252f8 fffff880`066252f0 ffff01e0`064dd2f6 : fffff880`06625db0 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffff900`00000018 fffff880`066252f8 fffff880`06625db0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffff01e0`064dd2f6 fffff880`06625300 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffff880`06625db0 STACK_COMMAND: kb FOLLOWUP_IP: VBoxDisp+cf70 fffff960`0095cf70 488b040a mov rax,qword ptr [rdx+rcx] SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: VBoxDisp+cf70 FOLLOWUP_NAME: MachineOwner FAILURE_BUCKET_ID: X64_0x50_VBoxDisp+cf70 BUCKET_ID: X64_0x50_VBoxDisp+cf70 Followup: MachineOwner ---------