Loading User Symbols
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {c000001d, a00f64bb, 146, fffffd90}

Probably caused by : win32k.sys ( win32k!NtGdiExtFloodFill+82b )

Followup: MachineOwner
---------

kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: c000001d, The exception code that was not handled
Arg2: a00f64bb, The address that the exception occurred at
Arg3: 00000146, Parameter 0 of the exception
Arg4: fffffd90, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc000001d - {EXCEPTION}  Illegal Instruction  An attempt was made to execute an illegal instruction.

FAULTING_IP: 
win32k!NtGdiExtFloodFill+82b
a00f64bb ffe8             jmp     eax

EXCEPTION_PARAMETER1:  00000146

EXCEPTION_PARAMETER2:  fffffd90

DEFAULT_BUCKET_ID:  DRIVER_FAULT

BUGCHECK_STR:  0x1E

TRAP_FRAME:  f089b5ec -- (.trap fffffffff089b5ec)
ErrCode = 00000000
eax=e3830008 ebx=f089b6ac ecx=e1997f48 edx=854f8054 esi=00000001 edi=00000000
eip=a00f64bb esp=f089b660 ebp=f089b698 iopl=0         nv up ei pl zr na po nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010246
win32k!NtGdiExtFloodFill+82b:
a00f64bb ffe8             jmp     eax {e3830008}
Resetting default context

LAST_CONTROL_TRANSFER:  from a001b4d8 to a00f64bb

STACK_TEXT:  
f089b698 a001b4d8 3a0108cb 00000000 a000e71f win32k!NtGdiExtFloodFill+0x82b
f089b6b0 a000e7a1 3a0108cb 00000000 00000000 win32k!bDeleteDCInternal+0x2b
f089b6c8 80532f14 3a0108cb 00000000 01010054 win32k!NtGdiDeleteObjectApp+0x82
f089b6c8 77f42c9d 3a0108cb 00000000 01010054 nt!KiSystemService+0xc4
WARNING: Frame IP not in any known module. Following frames may be wrong.
0006a9d4 00000000 00000000 00000000 00000000 0x77f42c9d


FAILED_INSTRUCTION_ADDRESS: 
win32k!NtGdiExtFloodFill+82b
a00f64bb ffe8             jmp     eax

FOLLOWUP_IP: 
win32k!NtGdiExtFloodFill+82b
a00f64bb ffe8             jmp     eax

FOLLOWUP_NAME:  MachineOwner

SYMBOL_NAME:  win32k!NtGdiExtFloodFill+82b

MODULE_NAME:  win32k

IMAGE_NAME:  win32k.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  3db42a96

STACK_COMMAND:  .trap fffffffff089b5ec ; kb

BUCKET_ID:  0x1E_BAD_IP_win32k!NtGdiExtFloodFill+82b

Followup: MachineOwner
---------

x*