Update: Process Monitor v1.12

Process Monitor v1.12: This release fixes a bug in the driver.

Comments (4)

  1. ms says:

    as the forum is currently locked, where can i submit bugs/feature requests?

  2. David Sharpe says:

    Version 1.12 of procmon bluescreened my machine.  I have a minidump of collected during the crash which I can send to you if you wish.

  3. David Sharpe says:

    Here is the kd !analyze -v output from the minidump mentioned in the above post.  The bluescreen happened during full unfiltered  file/registry/process/thread capture on a busy machine.


    kd> !analyze -v


    *                                                                             *

    *                        Bugcheck Analysis                                    *

    *                                                                             *



    This is a very common bugcheck.  Usually the exception address pinpoints

    the driver/function that caused the problem.  Always note this address

    as well as the link date of the driver/image that contains this address.

    Some common problems are exception code 0x80000003.  This means a hard

    coded breakpoint or assertion was hit, but this system was booted

    /NODEBUG.  This is not supposed to happen as developers should never have

    hardcoded breakpoints in retail code, but …

    If this happens, make sure a debugger gets connected, and the

    system is booted /DEBUG.  This will let us see why this breakpoint is



    Arg1: c0000006, The exception code that was not handled

    Arg2: 80602c50, The address that the exception occurred at

    Arg3: f79fb5c4, Trap Frame

    Arg4: 00000000

    Debugging Details:


    EXCEPTION_CODE: (NTSTATUS) 0xc0000006 – The instruction at "0x%08lx" referenced

    memory at "0x%08lx". The required data was not placed into memory because of an

    I/O error status of "0x%08lx".



    80602c50 8b4904          mov     ecx,dword ptr [ecx+4]

    TRAP_FRAME:  f79fbbcc — (.trap fffffffff79fbbcc)

    ErrCode = 00000000

    eax=e3c54320 ebx=00000190 ecx=00000000 edx=00000190 esi=e3c54320 edi=f79fbd0c

    eip=806034e5 esp=f79fbc40 ebp=f79fbc54 iopl=0         nv up ei ng nz na po nc

    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010282


    806034e5 8b06            mov     eax,dword ptr [esi]  ds:0023:e3c54320=????????

    Resetting default scope




    PROCESS_NAME:  ccSetMgr.exe

    LAST_CONTROL_TRANSFER:  from 80603253 to 80602c50


    f79fb65c 80603253 e3c4c6c8 f79fb674 00000000 nt!ExpAllocateHandleTableEntry+0x1


    f79fb678 805b1d47 e3c4c6c8 f79fb6ac 00000000 nt!ExCreateHandle+0x19

    f79fb6cc 805b0174 00000001 e3c52720 00000000 nt!ObpCreateHandle+0x3f7

    f79fb79c 805e21dc e3c52720 00000000 00000000 nt!ObOpenObjectByPointer+0xa4

    f79fb7f8 805e2557 800017c4 00020008 00000000 nt!NtOpenProcessTokenEx+0x94

    f79fb810 8053ca28 800017c4 00020008 f79fb94c nt!NtOpenProcessToken+0x15

    f79fb810 804fdded 800017c4 00020008 f79fb94c nt!KiFastCallEntry+0xf8

    f79fb894 f879b5dc 800017c4 00020008 f79fb94c nt!ZwOpenProcessToken+0x11

    WARNING: Stack unwind information not available. Following frames may be wrong.

    f79fb978 f879b973 00b30080 fe236be0 fdf3af14 PROCMON11+0x15dc

    f79fb994 f879c57e 0000023c 00000001 fdf24194 PROCMON11+0x1973

    f79fb9d0 f82be888 fdf3af14 f79fb9f0 f79fba20 PROCMON11+0x257e

    f79fba30 f82c02a0 009fba78 00000000 f79fba78 fltmgr!FltpPerformPreCallbacks+0x2


    f79fba44 f82c0c48 f79fba78 00000000 81ad8020 fltmgr!FltpPassThroughInternal+0x3

    f79fba60 f82c1059 f79fba01 fe75cd88 82397e40 fltmgr!FltpPassThrough+0x1c2

    f79fba90 804edfe3 81ad8020 fd998e00 0b2e6000 fltmgr!FltpDispatch+0x10d

    f79fbaa0 804ee9ae 00000000 fe75cd78 fe75cd88 nt!IopfCallDriver+0x31

    f79fbab4 804ee9d5 81ad8020 fe75cd0b fe75cd90 nt!IopPageReadInternal+0xf4

    f79fbad4 80512a30 81da9f90 fe75cdb0 fe75cd90 nt!IoPageRead+0x1b

    f79fbb50 8051bfa0 c071e2a0 e3c54320 c071e2a0 nt!MiDispatchFault+0x286

    f79fbbb4 8053f90c 00000000 e3c54320 00000000 nt!MmAccessFault+0x7b4

    f79fbbb4 806034e5 00000000 e3c54320 00000000 nt!KiTrap0E+0xcc

    f79fbc54 805af96a e3c4c6c8 00000190 e1e5d001 nt!ExMapHandleToPointerEx+0x2d

    f79fbc7c 805c078d 00000190 00000040 823cac68 nt!ObReferenceObjectByHandle+0x12e

    f79fbd48 8053ca28 00000190 00000010 00dcff88 nt!NtQueryInformationThread+0x43d

    f79fbd48 7c90eb94 00000190 00000010 00dcff88 nt!KiFastCallEntry+0xf8

    00dcff8c 00000000 00000000 00000000 00000000 0x7c90eb94




    f879b5dc ??              ???



    FOLLOWUP_NAME:  MachineOwner





    BUCKET_ID:  0x8E_PROCMON11+15dc

    Followup: MachineOwner



Skip to main content