this is what i got when i ran windows debugger.
Code:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {fffffd2c000b4e08, 2, 0, fffff800030ef418}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+40a8c )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffd2c000b4e08, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800030ef418, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032a80e0
fffffd2c000b4e08
CURRENT_IRQL: 2
FAULTING_IP:
nt! ?? ::FNODOBFM::`string'+40a8c
fffff800`030ef418 488b4128 mov rax,qword ptr [rcx+28h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: SearchIndexer.
TRAP_FRAME: fffff80000ba2600 -- (.trap 0xfffff80000ba2600)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff880012780a8
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001223b00 rsp=fffff80000ba2798 rbp=0000000000000001
r8=00000000b8a596cf r9=0000000001cb31a6 r10=0000000000000066
r11=fffff880012780a8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
Ntfs!NtfsVolumeCheckpointDpc:
fffff880`01223b00 4883ec28 sub rsp,28h
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8000306fb69 to fffff80003070600
STACK_TEXT:
fffff800`00ba21c8 fffff800`0306fb69 : 00000000`0000000a fffffd2c`000b4e08 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`00ba21d0 fffff800`0306e7e0 : fffff800`00ba2308 fffff6fb`7dbf1000 00000000`00000004 00000000`0a1eca01 : nt!KiBugCheckDispatch+0x69
fffff800`00ba2310 fffff800`030ef418 : 00000001`00000001 fffff800`00ba24e8 fffff880`0165000e fffffa80`09f579b0 : nt!KiPageFault+0x260
fffff800`00ba24a0 fffff800`0306e6ee : fffffa80`0b57a060 fffff800`00ba2830 fffffa80`08f99098 fffff880`01684730 : nt! ?? ::FNODOBFM::`string'+0x40a8c
fffff800`00ba2600 fffff880`01223b00 : fffff800`0307c6a6 fffff800`00ba2830 00000000`00000000 00000004`40671200 : nt!KiPageFault+0x16e
fffff800`00ba2798 fffff800`0307c6a6 : fffff800`00ba2830 00000000`00000000 00000004`40671200 00000000`00000010 : Ntfs!NtfsVolumeCheckpointDpc
fffff800`00ba27a0 fffff800`0307ba26 : fffff880`012780e8 00000000`00064f66 00000000`00000000 00000000`00000000 : nt!KiProcessTimerDpcTable+0x66
fffff800`00ba2810 fffff800`0307c57e : 0000000f`054654d9 fffff800`00ba2e88 00000000`00064f66 fffff800`031edf48 : nt!KiProcessExpiredTimerList+0xc6
fffff800`00ba2e60 fffff800`0307bd97 : fffffa80`0a1e9bc1 fffffa80`00064f66 00000000`00000000 00000000`00000066 : nt!KiTimerExpiration+0x1be
fffff800`00ba2f00 fffff800`03076765 : 00000000`00000000 fffffa80`0b57a060 00000000`00000000 fffff880`01490c50 : nt!KiRetireDpcList+0x277
fffff800`00ba2fb0 fffff800`0307657c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KyRetireDpcList+0x5
fffff880`0b5d73b0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+40a8c
fffff800`030ef418 488b4128 mov rax,qword ptr [rcx+28h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+40a8c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4b88cfeb
FAILURE_BUCKET_ID: X64_0xA_nt!_??_::FNODOBFM::_string_+40a8c
BUCKET_ID: X64_0xA_nt!_??_::FNODOBFM::_string_+40a8c
Followup: MachineOwner
---------
please help.