Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 10.0.18362.1 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Windows\MEMORY.DMP]
- Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
- Symbol search path is: srv*
- Executable search path is:
- Windows 10 Kernel Version 18362 MP (16 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 18362.1.amd64fre.19h1_release.190318-1202
- Machine Name:
- Kernel base = 0xfffff805`1f800000 PsLoadedModuleList = 0xfffff805`1fc46490
- Debug session time: Sun Sep 8 12:26:20.566 2019 (UTC + 2:00)
- System Uptime: 0 days 9:57:29.213
- Loading Kernel Symbols
- ...............................................................
- ..........Page 108e47 not present in the dump file. Type ".hh dbgerr004" for details
- ...............................................Page 101fe3 not present in the dump file. Type ".hh dbgerr004" for details
- .Page 101f70 not present in the dump file. Type ".hh dbgerr004" for details
- ..Page 100c19 not present in the dump file. Type ".hh dbgerr004" for details
- ....
- ..............................................
- Loading User Symbols
- PEB is paged out (Peb.Ldr = 000000cd`e8475018). Type ".hh dbgerr001" for details
- Loading unloaded module list
- .........
- For analysis of this file, run !analyze -v
- 10: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- SYSTEM_SERVICE_EXCEPTION (3b)
- An exception happened while executing a system service routine.
- Arguments:
- Arg1: 00000000c0000005, Exception code that caused the bugcheck
- Arg2: fffff8051f84563d, Address of the instruction which caused the bugcheck
- Arg3: ffffd7881a83c440, Address of the context record for the exception that caused the bugcheck
- Arg4: 0000000000000000, zero.
- Debugging Details:
- ------------------
- Page 101fe3 not present in the dump file. Type ".hh dbgerr004" for details
- Page 101fe3 not present in the dump file. Type ".hh dbgerr004" for details
- KEY_VALUES_STRING: 1
- PROCESSES_ANALYSIS: 1
- SERVICE_ANALYSIS: 1
- STACKHASH_ANALYSIS: 1
- TIMELINE_ANALYSIS: 1
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 401
- BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
- SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
- SYSTEM_PRODUCT_NAME: X570 AORUS ELITE
- SYSTEM_SKU: Default string
- SYSTEM_VERSION: -CF
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: F3
- BIOS_DATE: 06/13/2019
- BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
- BASEBOARD_PRODUCT: X570 AORUS ELITE
- BASEBOARD_VERSION: x.x
- DUMP_TYPE: 1
- BUGCHECK_P1: c0000005
- BUGCHECK_P2: fffff8051f84563d
- BUGCHECK_P3: ffffd7881a83c440
- BUGCHECK_P4: 0
- EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Instruktionen p 0x%p refererade till minnet p 0x%p. Minnet kunde inte vara %s.
- FAULTING_IP:
- nt!ExFreeHeapPool+21d
- fffff805`1f84563d 488b5328 mov rdx,qword ptr [rbx+28h]
- CONTEXT: ffffd7881a83c440 -- (.cxr 0xffffd7881a83c440)
- rax=000000000006eaf0 rbx=64c07a394bb147fc rcx=ffffc300b9eb43c0
- rdx=0000000000000008 rsi=ffff868eba55f900 rdi=ffff868eba55f8e0
- rip=fffff8051f84563d rsp=ffffd7881a83ce30 rbp=0000000020206f49
- r8=0000000000000018 r9=ffffc300b9e92000 r10=0000000000000000
- r11=0000000000000fff r12=00000000000009c8 r13=0000000000000001
- r14=00000000000003c0 r15=000000000000000e
- iopl=0 nv up ei pl zr na po nc
- cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
- nt!ExFreeHeapPool+0x21d:
- fffff805`1f84563d 488b5328 mov rdx,qword ptr [rbx+28h] ds:002b:64c07a39`4bb14824=????????????????
- Resetting default scope
- BUGCHECK_STR: 0x3B_c0000005
- CPU_COUNT: 10
- CPU_MHZ: e09
- CPU_VENDOR: AuthenticAMD
- CPU_FAMILY: 17
- CPU_MODEL: 71
- CPU_STEPPING: 0
- BLACKBOXBSD: 1 (!blackboxbsd)
- BLACKBOXNTFS: 1 (!blackboxntfs)
- BLACKBOXPNP: 1 (!blackboxpnp)
- BLACKBOXWINLOGON: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- PROCESS_NAME: svchost.exe
- CURRENT_IRQL: 1
- ANALYSIS_SESSION_HOST: DESKTOP-A309V2V
- ANALYSIS_SESSION_TIME: 09-08-2019 13:04:21.0105
- ANALYSIS_VERSION: 10.0.18362.1 amd64fre
- IRP_ADDRESS: ffff868eb90f4868
- LAST_CONTROL_TRANSFER: from fffff8051fb6d0a9 to fffff8051f84563d
- STACK_TEXT:
- ffffd788`1a83ce30 fffff805`1fb6d0a9 : 00000000`00000005 00000000`00000000 00000000`00000000 01000000`00100000 : nt!ExFreeHeapPool+0x21d
- ffffd788`1a83cf50 fffff805`1f845dae : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExFreePool+0x9
- ffffd788`1a83cf80 fffff805`1f8476bc : ffff868e`b90f48e0 00000000`00000000 00000000`00000001 00000000`00000000 : nt!IopCompleteRequest+0x8e
- ffffd788`1a83d070 fffff805`1f846f47 : 00000000`00000368 00000000`00000300 ffff868e`b90f48d0 00000000`00000038 : nt!IopfCompleteRequest+0x75c
- ffffd788`1a83d180 fffff805`536f8c73 : 00000000`00000012 ffff868e`ba55f900 00000000`00000012 fffff805`53716788 : nt!IofCompleteRequest+0x17
- ffffd788`1a83d1b0 fffff805`1f831819 : ffff868e`b90f48d0 00000000`00000000 00000000`00000001 ffff868e`bd5e6cd0 : NDProxy!PxIODispatch+0x1ab3
- ffffd788`1a83e820 fffff805`1fde7215 : ffffd788`1a83eb80 ffff868e`b90f48d0 00000000`00000001 ffff868e`bd5e6cd0 : nt!IofCallDriver+0x59
- ffffd788`1a83e860 fffff805`1fde7020 : 00000000`00000000 ffffd788`1a83eb80 ffff868e`b90f48d0 ffffd788`1a83eb80 : nt!IopSynchronousServiceTail+0x1a5
- ffffd788`1a83e900 fffff805`1fde63f6 : 00000000`00000082 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0xc10
- ffffd788`1a83ea20 fffff805`1f9d1518 : 00000000`00000000 ffff868e`bd531d80 ffff868e`00000000 fffff805`1feace00 : nt!NtDeviceIoControlFile+0x56
- ffffd788`1a83ea90 00007ffd`95fdc144 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
- 000000cd`e831e108 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`95fdc144
- THREAD_SHA1_HASH_MOD_FUNC: 5a03fc89789fe75ed816e1fe5b2a57f6bc1ccd62
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 4a15e47e4ad641315cdf09b2c641d862b3f4b537
- THREAD_SHA1_HASH_MOD: 81674e2cfd0c76eaaadcec495f7b9bbeaf28034e
- FOLLOWUP_IP:
- nt!ExFreePool+9
- fffff805`1fb6d0a9 4883c428 add rsp,28h
- FAULT_INSTR_CODE: 28c48348
- SYMBOL_STACK_INDEX: 1
- SYMBOL_NAME: nt!ExFreePool+9
- FOLLOWUP_NAME: Pool_corruption
- IMAGE_NAME: Pool_Corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MODULE_NAME: Pool_Corruption
- STACK_COMMAND: .cxr 0xffffd7881a83c440 ; kb
- BUCKET_ID_FUNC_OFFSET: 9
- FAILURE_BUCKET_ID: 0x3B_c0000005_nt!ExFreePool
- BUCKET_ID: 0x3B_c0000005_nt!ExFreePool
- PRIMARY_PROBLEM_CLASS: 0x3B_c0000005_nt!ExFreePool
- TARGET_TIME: 2019-09-08T10:26:20.000Z
- OSBUILD: 18362
- OSSERVICEPACK: 0
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
- OS_LOCALE:
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 1998-05-30 23:12:57
- BUILDDATESTAMP_STR: 190318-1202
- BUILDLAB_STR: 19h1_release
- BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
- ANALYSIS_SESSION_ELAPSED_TIME: 42ec
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:0x3b_c0000005_nt!exfreepool
- FAILURE_ID_HASH: {c9913766-80de-cdf5-a1a8-15c856d3f064}
- Followup: Pool_corruption
- ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement