Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 10.0.22415.1002 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Windows\MEMORY.DMP]
- Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
- Symbol search path is: srv*
- Executable search path is:
- Windows 10 Kernel Version 19041 MP (12 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
- Machine Name:
- Kernel base = 0xfffff807`39600000 PsLoadedModuleList = 0xfffff807`3a22a190
- Debug session time: Wed Aug 18 11:03:55.640 2021 (UTC + 2:00)
- System Uptime: 0 days 10:23:19.276
- Loading Kernel Symbols
- ...............................................................
- ........Page 176bcf not present in the dump file. Type ".hh dbgerr004" for details
- ........................................................
- .........................................................
- Loading User Symbols
- Loading unloaded module list
- .......
- For analysis of this file, run !analyze -v
- nt!KeBugCheckEx:
- fffff807`399f71d0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffc101`08dc6160=000000000000001e
- 2: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- KMODE_EXCEPTION_NOT_HANDLED (1e)
- This is a very common BugCheck. Usually the exception address pinpoints
- the driver/function that caused the problem. Always note this address
- as well as the link date of the driver/image that contains this address.
- Arguments:
- Arg1: ffffffffc0000005, The exception code that was not handled
- Arg2: fffff8073988019f, The address that the exception occurred at
- Arg3: 0000000000000000, Parameter 0 of the exception
- Arg4: ffffffffffffffff, Parameter 1 of the exception
- Debugging Details:
- ------------------
- KEY_VALUES_STRING: 1
- Key : Analysis.CPU.mSec
- Value: 2452
- Key : Analysis.DebugAnalysisManager
- Value: Create
- Key : Analysis.Elapsed.mSec
- Value: 2663
- Key : Analysis.Init.CPU.mSec
- Value: 436
- Key : Analysis.Init.Elapsed.mSec
- Value: 3351
- Key : Analysis.Memory.CommitPeak.Mb
- Value: 74
- Key : WER.OS.Branch
- Value: vb_release
- Key : WER.OS.Timestamp
- Value: 2019-12-06T14:06:00Z
- Key : WER.OS.Version
- Value: 10.0.19041.1
- BUGCHECK_CODE: 1e
- BUGCHECK_P1: ffffffffc0000005
- BUGCHECK_P2: fffff8073988019f
- BUGCHECK_P3: 0
- BUGCHECK_P4: ffffffffffffffff
- READ_ADDRESS: ffffffffffffffff
- EXCEPTION_PARAMETER2: ffffffffffffffff
- BLACKBOXBSD: 1 (!blackboxbsd)
- BLACKBOXNTFS: 1 (!blackboxntfs)
- BLACKBOXWINLOGON: 1
- PROCESS_NAME: System
- TRAP_FRAME: 4c674d8d48000002 -- (.trap 0x4c674d8d48000002)
- Unable to read trap frame at 4c674d8d`48000002
- STACK_TEXT:
- ffffc101`08dc6158 fffff807`39af5a2e : 00000000`0000001e ffffffff`c0000005 fffff807`3988019f 00000000`00000000 : nt!KeBugCheckEx
- ffffc101`08dc6160 fffff807`39a00092 : fffff807`39af5a0c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
- ffffc101`08dc61a0 fffff807`398e6dd7 : ffffc101`08dc6710 00000000`00000000 ffff890e`fcc37c60 fffff807`399fad3e : nt!RtlpExecuteHandlerForException+0x12
- ffffc101`08dc61d0 fffff807`398e59c6 : ffff890e`fcc37598 ffffc101`08dc6e20 ffff890e`fcc37598 00000000`00000000 : nt!RtlDispatchException+0x297
- ffffc101`08dc68f0 fffff807`399f8062 : ba0f7589`4c07458d 401f45c7`0002001f 4c674d8d`48000002 457f0ff3`20247489 : nt!KiDispatchException+0x186
- ffffc101`08dc6fb0 fffff807`399f8030 : fffff807`39a092a5 ffffc101`08d2c180 ffffc101`09328180 00000000`00000246 : nt!KxExceptionDispatchOnExceptionStack+0x12
- ffff890e`fcc37458 fffff807`39a092a5 : ffffc101`08d2c180 ffffc101`09328180 00000000`00000246 fffff807`398150c2 : nt!KiExceptionDispatchOnExceptionStackContinue
- ffff890e`fcc37460 fffff807`39a04fe0 : fffff807`39926db0 fffff807`39923b60 00000000`00000c00 ffffc101`09328180 : nt!KiExceptionDispatch+0x125
- ffff890e`fcc37640 fffff807`3988019f : ffff890e`fcc37832 ffffd78a`281a1b00 ffff890e`fcc378a9 ffffd78a`2819be68 : nt!KiGeneralProtectionFault+0x320
- ffff890e`fcc377d0 fffff807`3987fd99 : ffffd78a`2819be68 ffff890e`fcc37b10 ffffd78a`281a1bb8 ffff890e`fcc37800 : nt!KiAcquireKobjectLockSafe+0xf
- ffff890e`fcc37800 fffff807`3987f825 : ffffd78a`28199bd0 00000000`00000000 ffff890e`fcc37b10 ffffd78a`2811be70 : nt!KiExpireTimer2+0x1d9
- ffff890e`fcc37910 fffff807`39899d14 : 00000000`00000000 00000000`00000000 00000000`0000002a 00000000`0015c505 : nt!KiTimer2Expiration+0x165
- ffff890e`fcc379d0 fffff807`399fad3e : ffffffff`00000000 ffffc101`08d2c180 ffffc101`08d37340 ffffd78a`364a6080 : nt!KiRetireDpcList+0x874
- ffff890e`fcc37c60 00000000`00000000 : ffff890e`fcc38000 ffff890e`fcc32000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
- SYMBOL_NAME: nt!KiAcquireKobjectLockSafe+f
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- STACK_COMMAND: .thread ; .cxr ; kb
- BUCKET_ID_FUNC_OFFSET: f
- FAILURE_BUCKET_ID: 0x1E_c0000005_R_nt!KiAcquireKobjectLockSafe
- OS_VERSION: 10.0.19041.1
- BUILDLAB_STR: vb_release
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- FAILURE_ID_HASH: {da928a6c-3541-7bfa-b2e9-6544a7348002}
- Followup: MachineOwner
- ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement