Advertisement
Guest User

Untitled

a guest
Aug 18th, 2021
177
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.56 KB | None | 0 0
  1.  
  2. Microsoft (R) Windows Debugger Version 10.0.22415.1002 AMD64
  3. Copyright (c) Microsoft Corporation. All rights reserved.
  4.  
  5.  
  6. Loading Dump File [C:\Windows\MEMORY.DMP]
  7. Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
  8.  
  9. Symbol search path is: srv*
  10. Executable search path is:
  11. Windows 10 Kernel Version 19041 MP (12 procs) Free x64
  12. Product: WinNt, suite: TerminalServer SingleUserTS
  13. Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
  14. Machine Name:
  15. Kernel base = 0xfffff807`39600000 PsLoadedModuleList = 0xfffff807`3a22a190
  16. Debug session time: Wed Aug 18 11:03:55.640 2021 (UTC + 2:00)
  17. System Uptime: 0 days 10:23:19.276
  18. Loading Kernel Symbols
  19. ...............................................................
  20. ........Page 176bcf not present in the dump file. Type ".hh dbgerr004" for details
  21. ........................................................
  22. .........................................................
  23. Loading User Symbols
  24.  
  25. Loading unloaded module list
  26. .......
  27. For analysis of this file, run !analyze -v
  28. nt!KeBugCheckEx:
  29. fffff807`399f71d0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffc101`08dc6160=000000000000001e
  30. 2: kd> !analyze -v
  31. *******************************************************************************
  32. * *
  33. * Bugcheck Analysis *
  34. * *
  35. *******************************************************************************
  36.  
  37. KMODE_EXCEPTION_NOT_HANDLED (1e)
  38. This is a very common BugCheck. Usually the exception address pinpoints
  39. the driver/function that caused the problem. Always note this address
  40. as well as the link date of the driver/image that contains this address.
  41. Arguments:
  42. Arg1: ffffffffc0000005, The exception code that was not handled
  43. Arg2: fffff8073988019f, The address that the exception occurred at
  44. Arg3: 0000000000000000, Parameter 0 of the exception
  45. Arg4: ffffffffffffffff, Parameter 1 of the exception
  46.  
  47. Debugging Details:
  48. ------------------
  49.  
  50.  
  51. KEY_VALUES_STRING: 1
  52.  
  53. Key : Analysis.CPU.mSec
  54. Value: 2452
  55.  
  56. Key : Analysis.DebugAnalysisManager
  57. Value: Create
  58.  
  59. Key : Analysis.Elapsed.mSec
  60. Value: 2663
  61.  
  62. Key : Analysis.Init.CPU.mSec
  63. Value: 436
  64.  
  65. Key : Analysis.Init.Elapsed.mSec
  66. Value: 3351
  67.  
  68. Key : Analysis.Memory.CommitPeak.Mb
  69. Value: 74
  70.  
  71. Key : WER.OS.Branch
  72. Value: vb_release
  73.  
  74. Key : WER.OS.Timestamp
  75. Value: 2019-12-06T14:06:00Z
  76.  
  77. Key : WER.OS.Version
  78. Value: 10.0.19041.1
  79.  
  80.  
  81. BUGCHECK_CODE: 1e
  82.  
  83. BUGCHECK_P1: ffffffffc0000005
  84.  
  85. BUGCHECK_P2: fffff8073988019f
  86.  
  87. BUGCHECK_P3: 0
  88.  
  89. BUGCHECK_P4: ffffffffffffffff
  90.  
  91. READ_ADDRESS: ffffffffffffffff
  92.  
  93. EXCEPTION_PARAMETER2: ffffffffffffffff
  94.  
  95. BLACKBOXBSD: 1 (!blackboxbsd)
  96.  
  97.  
  98. BLACKBOXNTFS: 1 (!blackboxntfs)
  99.  
  100.  
  101. BLACKBOXWINLOGON: 1
  102.  
  103. PROCESS_NAME: System
  104.  
  105. TRAP_FRAME: 4c674d8d48000002 -- (.trap 0x4c674d8d48000002)
  106. Unable to read trap frame at 4c674d8d`48000002
  107.  
  108. STACK_TEXT:
  109. ffffc101`08dc6158 fffff807`39af5a2e : 00000000`0000001e ffffffff`c0000005 fffff807`3988019f 00000000`00000000 : nt!KeBugCheckEx
  110. ffffc101`08dc6160 fffff807`39a00092 : fffff807`39af5a0c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
  111. ffffc101`08dc61a0 fffff807`398e6dd7 : ffffc101`08dc6710 00000000`00000000 ffff890e`fcc37c60 fffff807`399fad3e : nt!RtlpExecuteHandlerForException+0x12
  112. ffffc101`08dc61d0 fffff807`398e59c6 : ffff890e`fcc37598 ffffc101`08dc6e20 ffff890e`fcc37598 00000000`00000000 : nt!RtlDispatchException+0x297
  113. ffffc101`08dc68f0 fffff807`399f8062 : ba0f7589`4c07458d 401f45c7`0002001f 4c674d8d`48000002 457f0ff3`20247489 : nt!KiDispatchException+0x186
  114. ffffc101`08dc6fb0 fffff807`399f8030 : fffff807`39a092a5 ffffc101`08d2c180 ffffc101`09328180 00000000`00000246 : nt!KxExceptionDispatchOnExceptionStack+0x12
  115. ffff890e`fcc37458 fffff807`39a092a5 : ffffc101`08d2c180 ffffc101`09328180 00000000`00000246 fffff807`398150c2 : nt!KiExceptionDispatchOnExceptionStackContinue
  116. ffff890e`fcc37460 fffff807`39a04fe0 : fffff807`39926db0 fffff807`39923b60 00000000`00000c00 ffffc101`09328180 : nt!KiExceptionDispatch+0x125
  117. ffff890e`fcc37640 fffff807`3988019f : ffff890e`fcc37832 ffffd78a`281a1b00 ffff890e`fcc378a9 ffffd78a`2819be68 : nt!KiGeneralProtectionFault+0x320
  118. ffff890e`fcc377d0 fffff807`3987fd99 : ffffd78a`2819be68 ffff890e`fcc37b10 ffffd78a`281a1bb8 ffff890e`fcc37800 : nt!KiAcquireKobjectLockSafe+0xf
  119. ffff890e`fcc37800 fffff807`3987f825 : ffffd78a`28199bd0 00000000`00000000 ffff890e`fcc37b10 ffffd78a`2811be70 : nt!KiExpireTimer2+0x1d9
  120. ffff890e`fcc37910 fffff807`39899d14 : 00000000`00000000 00000000`00000000 00000000`0000002a 00000000`0015c505 : nt!KiTimer2Expiration+0x165
  121. ffff890e`fcc379d0 fffff807`399fad3e : ffffffff`00000000 ffffc101`08d2c180 ffffc101`08d37340 ffffd78a`364a6080 : nt!KiRetireDpcList+0x874
  122. ffff890e`fcc37c60 00000000`00000000 : ffff890e`fcc38000 ffff890e`fcc32000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
  123.  
  124.  
  125. SYMBOL_NAME: nt!KiAcquireKobjectLockSafe+f
  126.  
  127. MODULE_NAME: nt
  128.  
  129. IMAGE_NAME: ntkrnlmp.exe
  130.  
  131. STACK_COMMAND: .thread ; .cxr ; kb
  132.  
  133. BUCKET_ID_FUNC_OFFSET: f
  134.  
  135. FAILURE_BUCKET_ID: 0x1E_c0000005_R_nt!KiAcquireKobjectLockSafe
  136.  
  137. OS_VERSION: 10.0.19041.1
  138.  
  139. BUILDLAB_STR: vb_release
  140.  
  141. OSPLATFORM_TYPE: x64
  142.  
  143. OSNAME: Windows 10
  144.  
  145. FAILURE_ID_HASH: {da928a6c-3541-7bfa-b2e9-6544a7348002}
  146.  
  147. Followup: MachineOwner
  148. ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement