Advertisement
Guest User

Untitled

a guest
Jun 13th, 2021
972
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 29.77 KB | None | 0 0
  1. Microsoft (R) Windows Debugger Version 10.0.21349.1004 AMD64
  2. Copyright (c) Microsoft Corporation. All rights reserved.
  3.  
  4.  
  5. Loading Dump File [C:\Windows\Minidump\061221-10984-01.dmp]
  6. Mini Kernel Dump File: Only registers and stack trace are available
  7.  
  8. Symbol search path is: srv*
  9. Executable search path is:
  10. Windows 10 Kernel Version 19041 MP (12 procs) Free x64
  11. Product: WinNt, suite: TerminalServer SingleUserTS
  12. Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
  13. Machine Name:
  14. Kernel base = 0xfffff805`43200000 PsLoadedModuleList = 0xfffff805`43e2a230
  15. Debug session time: Sat Jun 12 23:59:14.557 2021 (UTC - 5:00)
  16. System Uptime: 0 days 0:09:42.203
  17. Loading Kernel Symbols
  18. ...............................................................
  19. ................................................................
  20. ................................................................
  21. ..............
  22. Loading User Symbols
  23. Loading unloaded module list
  24. ........
  25. For analysis of this file, run !analyze -v
  26. nt!KeBugCheckEx:
  27. fffff805`435f6c20 48894c2408 mov qword ptr [rsp+8],rcx ss:ffffd381`d8bbf420=000000000000003b
  28. 4: kd> !analyze -v
  29. *******************************************************************************
  30. * *
  31. * Bugcheck Analysis *
  32. * *
  33. *******************************************************************************
  34.  
  35. SYSTEM_SERVICE_EXCEPTION (3b)
  36. An exception happened while executing a system service routine.
  37. Arguments:
  38. Arg1: 00000000c0000005, Exception code that caused the BugCheck
  39. Arg2: ffffa91b373bc358, Address of the instruction which caused the BugCheck
  40. Arg3: ffffd381d8bbfd20, Address of the context record for the exception that caused the BugCheck
  41. Arg4: 0000000000000000, zero.
  42.  
  43. Debugging Details:
  44. ------------------
  45.  
  46.  
  47. KEY_VALUES_STRING: 1
  48.  
  49. Key : Analysis.CPU.mSec
  50. Value: 4921
  51.  
  52. Key : Analysis.DebugAnalysisManager
  53. Value: Create
  54.  
  55. Key : Analysis.Elapsed.mSec
  56. Value: 33318
  57.  
  58. Key : Analysis.Init.CPU.mSec
  59. Value: 499
  60.  
  61. Key : Analysis.Init.Elapsed.mSec
  62. Value: 26276
  63.  
  64. Key : Analysis.Memory.CommitPeak.Mb
  65. Value: 89
  66.  
  67. Key : WER.OS.Branch
  68. Value: vb_release
  69.  
  70. Key : WER.OS.Timestamp
  71. Value: 2019-12-06T14:06:00Z
  72.  
  73. Key : WER.OS.Version
  74. Value: 10.0.19041.1
  75.  
  76.  
  77. BUGCHECK_CODE: 3b
  78.  
  79. BUGCHECK_P1: c0000005
  80.  
  81. BUGCHECK_P2: ffffa91b373bc358
  82.  
  83. BUGCHECK_P3: ffffd381d8bbfd20
  84.  
  85. BUGCHECK_P4: 0
  86.  
  87. CONTEXT: ffffd381d8bbfd20 -- (.cxr 0xffffd381d8bbfd20)
  88. rax=000000007fffafac rbx=ffffa94f86c2f320 rcx=ffffa94f86cd18a0
  89. rdx=d9ffa94f86cc7ab0 rsi=ffffa94f86c2eb48 rdi=0000000000000200
  90. rip=ffffa91b373bc358 rsp=ffffd381d8bc0720 rbp=ffffa94f86c2f368
  91. r8=0000000000000000 r9=000000000000002f r10=ffffa91b3704e0f0
  92. r11=ffff76fe11400000 r12=0000000000000001 r13=0000000000000001
  93. r14=ffffa94f86c2f354 r15=ffffa94f86c2f350
  94. iopl=0 nv up ei pl nz na po nc
  95. cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00050206
  96. win32kfull!TimersProc+0x1e8:
  97. ffffa91b`373bc358 8b8a10040000 mov ecx,dword ptr [rdx+410h] ds:002b:d9ffa94f`86cc7ec0=????????
  98. Resetting default scope
  99.  
  100. BLACKBOXBSD: 1 (!blackboxbsd)
  101.  
  102.  
  103. BLACKBOXNTFS: 1 (!blackboxntfs)
  104.  
  105.  
  106. BLACKBOXWINLOGON: 1
  107.  
  108. CUSTOMER_CRASH_COUNT: 1
  109.  
  110. PROCESS_NAME: csrss.exe
  111.  
  112. STACK_TEXT:
  113. ffffd381`d8bc0720 ffffa91b`373bbe56 : 00000000`00000010 00000000`0008e23b 00000000`00000001 00000000`00000004 : win32kfull!TimersProc+0x1e8
  114. ffffd381`d8bc07b0 ffffa91b`37080913 : ffffac0b`453f0080 ffffac0b`453f0080 00000000`00000000 00000000`00000005 : win32kfull!RawInputThread+0x7f6
  115. ffffd381`d8bc0970 ffffa91b`37393ad0 : ffffac0b`453f0080 00000000`00000000 00000000`00000005 00000000`00000005 : win32kbase!xxxCreateSystemThreads+0xc3
  116. ffffd381`d8bc0aa0 ffffa91b`37f1474d : ffffac0b`453f0080 ffffac0b`453f0080 00000000`00000000 00000000`00000000 : win32kfull!NtUserCallNoParam+0x70
  117. ffffd381`d8bc0ad0 fffff805`436085b8 : ffffac0b`00000005 00000000`00000005 000001c7`10804350 00000000`000004b8 : win32k!NtUserCallNoParam+0x15
  118. ffffd381`d8bc0b00 00007ffb`49cb10e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
  119. 0000007e`e6affa38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`49cb10e4
  120.  
  121.  
  122. SYMBOL_NAME: win32kfull!TimersProc+1e8
  123.  
  124. MODULE_NAME: win32kfull
  125.  
  126. IMAGE_NAME: win32kfull.sys
  127.  
  128. IMAGE_VERSION: 10.0.19041.1055
  129.  
  130. STACK_COMMAND: .cxr 0xffffd381d8bbfd20 ; kb
  131.  
  132. BUCKET_ID_FUNC_OFFSET: 1e8
  133.  
  134. FAILURE_BUCKET_ID: 0x3B_c0000005_win32kfull!TimersProc
  135.  
  136. OS_VERSION: 10.0.19041.1
  137.  
  138. BUILDLAB_STR: vb_release
  139.  
  140. OSPLATFORM_TYPE: x64
  141.  
  142. OSNAME: Windows 10
  143.  
  144. FAILURE_ID_HASH: {e19a4cac-ba4d-937b-93bc-07ff9528cd63}
  145.  
  146. Followup: MachineOwner
  147. ---------
  148.  
  149. 4: kd> lmvm win32kfull
  150. Browse full module list
  151. start end module name
  152. ffffa91b`372e0000 ffffa91b`37696000 win32kfull # (pdb symbols) C:\ProgramData\Dbg\sym\win32kfull.pdb\53FBCE4396D1F439C8A85D9FB79695FB1\win32kfull.pdb
  153. Loaded symbol image file: win32kfull.sys
  154. Mapped memory image file: C:\ProgramData\Dbg\sym\win32kfull.sys\198B748C3b6000\win32kfull.sys
  155. Image path: \SystemRoot\System32\win32kfull.sys
  156. Image name: win32kfull.sys
  157. Browse all global symbols functions data
  158. Image was built with /Brepro flag.
  159. Timestamp: 198B748C (This is a reproducible build file hash, not a timestamp)
  160. CheckSum: 003AE6A4
  161. ImageSize: 003B6000
  162. File version: 10.0.19041.1055
  163. Product version: 10.0.19041.1055
  164. File flags: 0 (Mask 3F)
  165. File OS: 40004 NT Win32
  166. File type: 3.7 Driver
  167. File date: 00000000.00000000
  168. Translations: 0409.04b0
  169. Information from resource tables:
  170. CompanyName: Microsoft Corporation
  171. ProductName: Microsoft® Windows® Operating System
  172. InternalName: win32kfull.sys
  173. OriginalFilename: win32kfull.sys
  174. ProductVersion: 10.0.19041.1055
  175. FileVersion: 10.0.19041.1055 (WinBuild.160101.0800)
  176. FileDescription: Full/Desktop Win32k Kernel Driver
  177. LegalCopyright: © Microsoft Corporation. All rights reserved.
  178. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\atlmfc.natvis'
  179. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\ObjectiveC.natvis'
  180. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\concurrency.natvis'
  181. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\cpp_rest.natvis'
  182. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Kernel.natvis'
  183. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\stl.natvis'
  184. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Data.Json.natvis'
  185. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Geolocation.natvis'
  186. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Sensors.natvis'
  187. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Media.natvis'
  188. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\windows.natvis'
  189. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\winrt.natvis'
  190.  
  191. Microsoft (R) Windows Debugger Version 10.0.21349.1004 AMD64
  192. Copyright (c) Microsoft Corporation. All rights reserved.
  193.  
  194.  
  195. Loading Dump File [C:\Windows\Minidump\061221-9796-01.dmp]
  196. Mini Kernel Dump File: Only registers and stack trace are available
  197.  
  198.  
  199. ************* Path validation summary **************
  200. Response Time (ms) Location
  201. Deferred srv*
  202. Symbol search path is: srv*
  203. Executable search path is:
  204. Windows 10 Kernel Version 19041 MP (12 procs) Free x64
  205. Product: WinNt, suite: TerminalServer SingleUserTS
  206. Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
  207. Machine Name:
  208. Kernel base = 0xfffff803`81a00000 PsLoadedModuleList = 0xfffff803`8262a230
  209. Debug session time: Sat Jun 12 23:31:48.953 2021 (UTC - 5:00)
  210. System Uptime: 0 days 19:17:09.601
  211. Loading Kernel Symbols
  212. ...............................................................
  213. ................................................................
  214. ................................................................
  215. ...............
  216. Loading User Symbols
  217. Loading unloaded module list
  218. .............
  219. For analysis of this file, run !analyze -v
  220. nt!KeBugCheckEx:
  221. fffff803`81df6c20 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffffe88`00f54a00=000000000000001e
  222. 11: kd> !analyze -v
  223. *******************************************************************************
  224. * *
  225. * Bugcheck Analysis *
  226. * *
  227. *******************************************************************************
  228.  
  229. KMODE_EXCEPTION_NOT_HANDLED (1e)
  230. This is a very common BugCheck. Usually the exception address pinpoints
  231. the driver/function that caused the problem. Always note this address
  232. as well as the link date of the driver/image that contains this address.
  233. Arguments:
  234. Arg1: ffffffffc0000005, The exception code that was not handled
  235. Arg2: fffff80381d1652d, The address that the exception occurred at
  236. Arg3: 0000000000000000, Parameter 0 of the exception
  237. Arg4: ffffffffffffffff, Parameter 1 of the exception
  238.  
  239. Debugging Details:
  240. ------------------
  241.  
  242.  
  243. KEY_VALUES_STRING: 1
  244.  
  245. Key : Analysis.CPU.mSec
  246. Value: 3890
  247.  
  248. Key : Analysis.DebugAnalysisManager
  249. Value: Create
  250.  
  251. Key : Analysis.Elapsed.mSec
  252. Value: 8657
  253.  
  254. Key : Analysis.Init.CPU.mSec
  255. Value: 249
  256.  
  257. Key : Analysis.Init.Elapsed.mSec
  258. Value: 5526
  259.  
  260. Key : Analysis.Memory.CommitPeak.Mb
  261. Value: 75
  262.  
  263. Key : WER.OS.Branch
  264. Value: vb_release
  265.  
  266. Key : WER.OS.Timestamp
  267. Value: 2019-12-06T14:06:00Z
  268.  
  269. Key : WER.OS.Version
  270. Value: 10.0.19041.1
  271.  
  272.  
  273. BUGCHECK_CODE: 1e
  274.  
  275. BUGCHECK_P1: ffffffffc0000005
  276.  
  277. BUGCHECK_P2: fffff80381d1652d
  278.  
  279. BUGCHECK_P3: 0
  280.  
  281. BUGCHECK_P4: ffffffffffffffff
  282.  
  283. READ_ADDRESS: fffff803826fb390: Unable to get MiVisibleState
  284. Unable to get NonPagedPoolStart
  285. Unable to get NonPagedPoolEnd
  286. Unable to get PagedPoolStart
  287. Unable to get PagedPoolEnd
  288. unable to get nt!MmSpecialPagesInUse
  289. ffffffffffffffff
  290.  
  291. EXCEPTION_PARAMETER2: ffffffffffffffff
  292.  
  293. BLACKBOXBSD: 1 (!blackboxbsd)
  294.  
  295.  
  296. BLACKBOXNTFS: 1 (!blackboxntfs)
  297.  
  298.  
  299. BLACKBOXPNP: 1 (!blackboxpnp)
  300.  
  301.  
  302. BLACKBOXWINLOGON: 1
  303.  
  304. CUSTOMER_CRASH_COUNT: 1
  305.  
  306. PROCESS_NAME: svchost.exe
  307.  
  308. STACK_TEXT:
  309. fffffe88`00f549f8 fffff803`81e3b74b : 00000000`0000001e ffffffff`c0000005 fffff803`81d1652d 00000000`00000000 : nt!KeBugCheckEx
  310. fffffe88`00f54a00 fffff803`81e08cac : fffffe88`00f55300 ffff8a84`006cec00 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x1b579b
  311. fffffe88`00f550c0 fffff803`81e049e0 : 00000000`00000000 00000000`00000001 fffffe88`00f556a8 fffffe88`00f556b8 : nt!KiExceptionDispatch+0x12c
  312. fffffe88`00f552a0 fffff803`81d1652d : 00000000`00000000 fffff803`81d24b64 ffff8a84`04c1b001 fffffe88`00f556a0 : nt!KiGeneralProtectionFault+0x320
  313. fffffe88`00f55430 fffff803`81d15841 : ffff8a83`ffa00340 ffff8a83`ffa02900 ffff8a83`ffa06080 00000000`00000080 : nt!RtlpHpLfhSlotAllocate+0x36d
  314. fffffe88`00f55580 fffff803`823b31c4 : ffff8a84`00000000 00000000`00000000 00000000`36364d43 fffff803`81ff0bd4 : nt!ExAllocateHeapPool+0x2b1
  315. fffffe88`00f556c0 fffff803`81fe6edd : 00000000`00000003 fffffe88`00f55810 00000000`00000005 00000000`00000000 : nt!ExAllocatePoolWithTag+0x64
  316. fffffe88`00f55710 fffff803`81fefc0d : 00000000`00000000 00000000`00000000 ffff8a84`12d3baf0 00000000`00000000 : nt!CmpGetSymbolicLinkTarget+0x20d
  317. fffffe88`00f55950 fffff803`81fee303 : ffff8a84`0000001c fffffe88`00f55ca0 fffffe88`00f55c58 ffffac89`fb9e4010 : nt!CmpDoParseKey+0xa3d
  318. fffffe88`00f55bf0 fffff803`81ff23ce : fffff803`81fee001 00000000`00000000 ffffac89`fb9e4010 ffff8a83`00000000 : nt!CmpParseKey+0x2c3
  319. fffffe88`00f55d90 fffff803`821014aa : ffffac89`fb9e4000 fffffe88`00f55ff8 00000000`00000240 ffffac89`e20c4220 : nt!ObpLookupObjectName+0x3fe
  320. fffffe88`00f55f60 fffff803`8210128c : 00000000`00000000 00000000`00000000 00000000`00000000 ffffac89`e20c4220 : nt!ObOpenObjectByNameEx+0x1fa
  321. fffffe88`00f56090 fffff803`82100db1 : fffffe88`00f56580 fffffe88`00f56400 00000000`00000000 00000000`00000000 : nt!ObOpenObjectByName+0x5c
  322. fffffe88`00f560e0 fffff803`82093f42 : ffffac89`ff4dba60 fffff803`7e7d8b99 ffffac89`ff4dba00 00000000`00000000 : nt!CmOpenKey+0x2c1
  323. fffffe88`00f56340 fffff803`81e085b8 : 00000000`00000000 ffffac89`ecbb03d0 fffffe88`00f56420 00000000`00000000 : nt!NtOpenKey+0x12
  324. fffffe88`00f56380 fffff803`81dfaa80 : fffff803`81fc7e47 ffff8a84`04a77df0 fffff803`81c52696 ffffac89`ecc0ee88 : nt!KiSystemServiceCopyEnd+0x28
  325. fffffe88`00f56518 fffff803`81fc7e47 : ffff8a84`04a77df0 fffff803`81c52696 ffffac89`ecc0ee88 ffff8a84`04a77df0 : nt!KiServiceLinkage
  326. fffffe88`00f56520 fffff803`82005cf3 : fffffe88`00f56840 00000000`00000000 ffffac89`f54f6040 00000000`00000000 : nt!MiRegQueryDWORD+0xf3
  327. fffffe88`00f565f0 fffff803`81ffa52f : 00000000`00000000 fffffe88`00f56840 ffff8a84`04b61e60 ffffac89`ecc0ec00 : nt!MiValidateExistingImage+0xe7
  328. fffffe88`00f566a0 fffff803`81ffb2ed : 00000000`00000000 fffffe88`00f56840 ffffac89`f54f6040 ffffac8a`012048f0 : nt!MiShareExistingControlArea+0xc7
  329. fffffe88`00f566d0 fffff803`81ffaa64 : ffffac89`ecc0ec80 00000000`00000000 ffffac8a`012048f0 00000000`00000000 : nt!MiCreateImageOrDataSection+0x1ad
  330. fffffe88`00f567c0 fffff803`81ffa847 : 00000000`01000000 fffffe88`00f56b80 00000000`00000001 00000000`00000010 : nt!MiCreateSection+0xf4
  331. fffffe88`00f56940 fffff803`81ffa62c : 000000dc`0357f268 00000000`0000000d 00000000`00000000 00000000`00000001 : nt!MiCreateSectionCommon+0x207
  332. fffffe88`00f56a20 fffff803`81e085b8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtCreateSection+0x5c
  333. fffffe88`00f56a90 00007ffe`0800d764 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
  334. 000000dc`0357f218 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`0800d764
  335.  
  336.  
  337. SYMBOL_NAME: nt!RtlpHpLfhSlotAllocate+36d
  338.  
  339. MODULE_NAME: nt
  340.  
  341. IMAGE_NAME: ntkrnlmp.exe
  342.  
  343. IMAGE_VERSION: 10.0.19041.1052
  344.  
  345. STACK_COMMAND: .thread ; .cxr ; kb
  346.  
  347. BUCKET_ID_FUNC_OFFSET: 36d
  348.  
  349. FAILURE_BUCKET_ID: 0x1E_c0000005_R_nt!RtlpHpLfhSlotAllocate
  350.  
  351. OS_VERSION: 10.0.19041.1
  352.  
  353. BUILDLAB_STR: vb_release
  354.  
  355. OSPLATFORM_TYPE: x64
  356.  
  357. OSNAME: Windows 10
  358.  
  359. FAILURE_ID_HASH: {5f2edb0e-188e-44d6-b543-6de2bf6feaf3}
  360.  
  361. Followup: MachineOwner
  362. ---------
  363.  
  364. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\atlmfc.natvis'
  365. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\ObjectiveC.natvis'
  366. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\concurrency.natvis'
  367. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\cpp_rest.natvis'
  368. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Kernel.natvis'
  369. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\stl.natvis'
  370. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Data.Json.natvis'
  371. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Geolocation.natvis'
  372. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Sensors.natvis'
  373. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Media.natvis'
  374. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\windows.natvis'
  375. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\winrt.natvis'
  376.  
  377. Microsoft (R) Windows Debugger Version 10.0.21349.1004 AMD64
  378. Copyright (c) Microsoft Corporation. All rights reserved.
  379.  
  380.  
  381. Loading Dump File [C:\Windows\Minidump\061221-9718-01.dmp]
  382. Mini Kernel Dump File: Only registers and stack trace are available
  383.  
  384.  
  385. ************* Path validation summary **************
  386. Response Time (ms) Location
  387. Deferred srv*
  388. Symbol search path is: srv*
  389. Executable search path is:
  390. Windows 10 Kernel Version 19041 MP (12 procs) Free x64
  391. Product: WinNt, suite: TerminalServer SingleUserTS
  392. Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
  393. Machine Name:
  394. Kernel base = 0xfffff800`4b200000 PsLoadedModuleList = 0xfffff800`4be2a230
  395. Debug session time: Sat Jun 12 23:32:37.148 2021 (UTC - 5:00)
  396. System Uptime: 0 days 0:00:14.795
  397. Loading Kernel Symbols
  398. ...............................................................
  399. ................................................................
  400. ................................................................
  401. .........
  402. Loading User Symbols
  403. Loading unloaded module list
  404. .......
  405. For analysis of this file, run !analyze -v
  406. nt!KeBugCheckEx:
  407. fffff800`4b5f6c20 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffffa87`5724b570=000000000000003b
  408. 3: kd> !analyze -v
  409. *******************************************************************************
  410. * *
  411. * Bugcheck Analysis *
  412. * *
  413. *******************************************************************************
  414.  
  415. SYSTEM_SERVICE_EXCEPTION (3b)
  416. An exception happened while executing a system service routine.
  417. Arguments:
  418. Arg1: 00000000c0000005, Exception code that caused the BugCheck
  419. Arg2: fffff8004b895d58, Address of the instruction which caused the BugCheck
  420. Arg3: fffffa875724be70, Address of the context record for the exception that caused the BugCheck
  421. Arg4: 0000000000000000, zero.
  422.  
  423. Debugging Details:
  424. ------------------
  425.  
  426.  
  427. KEY_VALUES_STRING: 1
  428.  
  429. Key : Analysis.CPU.mSec
  430. Value: 2733
  431.  
  432. Key : Analysis.DebugAnalysisManager
  433. Value: Create
  434.  
  435. Key : Analysis.Elapsed.mSec
  436. Value: 5697
  437.  
  438. Key : Analysis.Init.CPU.mSec
  439. Value: 280
  440.  
  441. Key : Analysis.Init.Elapsed.mSec
  442. Value: 4526
  443.  
  444. Key : Analysis.Memory.CommitPeak.Mb
  445. Value: 75
  446.  
  447. Key : WER.OS.Branch
  448. Value: vb_release
  449.  
  450. Key : WER.OS.Timestamp
  451. Value: 2019-12-06T14:06:00Z
  452.  
  453. Key : WER.OS.Version
  454. Value: 10.0.19041.1
  455.  
  456.  
  457. BUGCHECK_CODE: 3b
  458.  
  459. BUGCHECK_P1: c0000005
  460.  
  461. BUGCHECK_P2: fffff8004b895d58
  462.  
  463. BUGCHECK_P3: fffffa875724be70
  464.  
  465. BUGCHECK_P4: 0
  466.  
  467. CONTEXT: fffffa875724be70 -- (.cxr 0xfffffa875724be70)
  468. rax=0000000000000016 rbx=d9ff818c2c446ea0 rcx=ffff818c2dc1cc10
  469. rdx=d9ff818c2c446ebc rsi=ffffb08c64b223f0 rdi=ffff818c2dc1cc10
  470. rip=fffff8004b895d58 rsp=fffffa875724c870 rbp=fffff8004be19a00
  471. r8=fffffa875724c8b0 r9=ffffb08c64b223f0 r10=0000000054777445
  472. r11=0000000000001001 r12=fffff8004be19a20 r13=0000000000000000
  473. r14=ffff818c2dc1cc28 r15=fffffa875724ca00
  474. iopl=0 nv up ei ng nz na pe nc
  475. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050282
  476. nt!TraitsCompare+0xc:
  477. fffff800`4b895d58 663b02 cmp ax,word ptr [rdx] ds:002b:d9ff818c`2c446ebc=????
  478. Resetting default scope
  479.  
  480. CUSTOMER_CRASH_COUNT: 1
  481.  
  482. PROCESS_NAME: GameManagerService.exe
  483.  
  484. STACK_TEXT:
  485. fffffa87`5724c870 fffff800`4b8d85be : fffff800`4be19a40 ffffc0e0`00000000 b08c64b2`00000000 00000000`000000c0 : nt!TraitsCompare+0xc
  486. fffffa87`5724c8a0 fffff800`4b8d848a : 00000000`00000000 fffffa87`5724cb80 ffffb08c`64b223f0 ffff818c`00000000 : nt!EtwpSetProviderTraitsCommon+0xfe
  487. fffffa87`5724c960 fffff800`4b8fac63 : ffffb08c`64b223f0 00000000`00000018 00000000`50777445 ffffb08c`64b223f0 : nt!EtwpSetProviderTraitsUm+0x166
  488. fffffa87`5724c9e0 fffff800`4b6085b8 : 00000000`0000001e 00000000`00000000 00000000`00000018 00000000`004fb978 : nt!NtTraceControl+0x6d3
  489. fffffa87`5724ca90 00007ffe`a45d0674 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
  490. 00000000`0013e4b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`a45d0674
  491.  
  492.  
  493. SYMBOL_NAME: nt!TraitsCompare+c
  494.  
  495. MODULE_NAME: nt
  496.  
  497. IMAGE_NAME: ntkrnlmp.exe
  498.  
  499. IMAGE_VERSION: 10.0.19041.1052
  500.  
  501. STACK_COMMAND: .cxr 0xfffffa875724be70 ; kb
  502.  
  503. BUCKET_ID_FUNC_OFFSET: c
  504.  
  505. FAILURE_BUCKET_ID: 0x3B_c0000005_nt!TraitsCompare
  506.  
  507. OS_VERSION: 10.0.19041.1
  508.  
  509. BUILDLAB_STR: vb_release
  510.  
  511. OSPLATFORM_TYPE: x64
  512.  
  513. OSNAME: Windows 10
  514.  
  515. FAILURE_ID_HASH: {60751898-0d39-6f31-94ec-7f8aa1612e65}
  516.  
  517. Followup: MachineOwner
  518. ---------
  519.  
  520. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\atlmfc.natvis'
  521. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\ObjectiveC.natvis'
  522. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\concurrency.natvis'
  523. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\cpp_rest.natvis'
  524. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Kernel.natvis'
  525. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\stl.natvis'
  526. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Data.Json.natvis'
  527. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Geolocation.natvis'
  528. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Sensors.natvis'
  529. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Media.natvis'
  530. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\windows.natvis'
  531. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\winrt.natvis'
  532.  
  533. Microsoft (R) Windows Debugger Version 10.0.21349.1004 AMD64
  534. Copyright (c) Microsoft Corporation. All rights reserved.
  535.  
  536.  
  537. Loading Dump File [C:\Windows\Minidump\061221-9468-01.dmp]
  538. Mini Kernel Dump File: Only registers and stack trace are available
  539.  
  540.  
  541. ************* Path validation summary **************
  542. Response Time (ms) Location
  543. Deferred srv*
  544. Symbol search path is: srv*
  545. Executable search path is:
  546. Windows 10 Kernel Version 19041 MP (12 procs) Free x64
  547. Product: WinNt, suite: TerminalServer SingleUserTS
  548. Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
  549. Machine Name:
  550. Kernel base = 0xfffff800`42800000 PsLoadedModuleList = 0xfffff800`4342a230
  551. Debug session time: Sat Jun 12 23:43:00.811 2021 (UTC - 5:00)
  552. System Uptime: 0 days 0:09:54.459
  553. Loading Kernel Symbols
  554. ...............................................................
  555. ................................................................
  556. ................................................................
  557. ...............
  558. Loading User Symbols
  559. Loading unloaded module list
  560. ........
  561. For analysis of this file, run !analyze -v
  562. nt!KeBugCheckEx:
  563. fffff800`42bf6c20 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff9c80`4f130160=000000000000001e
  564. 8: kd> !analyze -v
  565. *******************************************************************************
  566. * *
  567. * Bugcheck Analysis *
  568. * *
  569. *******************************************************************************
  570.  
  571. KMODE_EXCEPTION_NOT_HANDLED (1e)
  572. This is a very common BugCheck. Usually the exception address pinpoints
  573. the driver/function that caused the problem. Always note this address
  574. as well as the link date of the driver/image that contains this address.
  575. Arguments:
  576. Arg1: ffffffffc0000005, The exception code that was not handled
  577. Arg2: fffff80042b11b56, The address that the exception occurred at
  578. Arg3: 0000000000000000, Parameter 0 of the exception
  579. Arg4: ffffffffffffffff, Parameter 1 of the exception
  580.  
  581. Debugging Details:
  582. ------------------
  583.  
  584. *** WARNING: Unable to verify checksum for win32k.sys
  585.  
  586. KEY_VALUES_STRING: 1
  587.  
  588. Key : Analysis.CPU.mSec
  589. Value: 3046
  590.  
  591. Key : Analysis.DebugAnalysisManager
  592. Value: Create
  593.  
  594. Key : Analysis.Elapsed.mSec
  595. Value: 5361
  596.  
  597. Key : Analysis.Init.CPU.mSec
  598. Value: 296
  599.  
  600. Key : Analysis.Init.Elapsed.mSec
  601. Value: 6853
  602.  
  603. Key : Analysis.Memory.CommitPeak.Mb
  604. Value: 81
  605.  
  606. Key : WER.OS.Branch
  607. Value: vb_release
  608.  
  609. Key : WER.OS.Timestamp
  610. Value: 2019-12-06T14:06:00Z
  611.  
  612. Key : WER.OS.Version
  613. Value: 10.0.19041.1
  614.  
  615.  
  616. BUGCHECK_CODE: 1e
  617.  
  618. BUGCHECK_P1: ffffffffc0000005
  619.  
  620. BUGCHECK_P2: fffff80042b11b56
  621.  
  622. BUGCHECK_P3: 0
  623.  
  624. BUGCHECK_P4: ffffffffffffffff
  625.  
  626. READ_ADDRESS: fffff800434fb390: Unable to get MiVisibleState
  627. Unable to get NonPagedPoolStart
  628. Unable to get NonPagedPoolEnd
  629. Unable to get PagedPoolStart
  630. Unable to get PagedPoolEnd
  631. unable to get nt!MmSpecialPagesInUse
  632. ffffffffffffffff
  633.  
  634. EXCEPTION_PARAMETER2: ffffffffffffffff
  635.  
  636. BLACKBOXBSD: 1 (!blackboxbsd)
  637.  
  638.  
  639. BLACKBOXNTFS: 1 (!blackboxntfs)
  640.  
  641.  
  642. BLACKBOXWINLOGON: 1
  643.  
  644. CUSTOMER_CRASH_COUNT: 1
  645.  
  646. PROCESS_NAME: System
  647.  
  648. TRAP_FRAME: fffff80381d297a7 -- (.trap 0xfffff80381d297a7)
  649. Unable to read trap frame at fffff803`81d297a7
  650.  
  651. STACK_TEXT:
  652. ffff9c80`4f130158 fffff800`42cf5b6e : 00000000`0000001e ffffffff`c0000005 fffff800`42b11b56 00000000`00000000 : nt!KeBugCheckEx
  653. ffff9c80`4f130160 fffff800`42bffae2 : fffff800`42cf5b4c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
  654. ffff9c80`4f1301a0 fffff800`42a87547 : ffff9c80`4f130710 00000000`00000000 ffff838a`c588bc60 fffff800`42bfa78e : nt!RtlpExecuteHandlerForException+0x12
  655. ffff9c80`4f1301d0 fffff800`42a86136 : ffff838a`c588b598 ffff9c80`4f130e20 ffff838a`c588b598 c9ff9c80`4f340180 : nt!RtlDispatchException+0x297
  656. ffff9c80`4f1308f0 fffff800`42bf7ab2 : ffff9a81`bc530210 ffffffff`c0000005 fffff803`81d297a7 fffff803`81d29558 : nt!KiDispatchException+0x186
  657. ffff9c80`4f130fb0 fffff800`42bf7a80 : fffff800`42c08ca5 fffff800`42ac7520 fffff800`42ac42d0 00000000`0000000c : nt!KxExceptionDispatchOnExceptionStack+0x12
  658. ffff838a`c588b458 fffff800`42c08ca5 : fffff800`42ac7520 fffff800`42ac42d0 00000000`0000000c ffff9c80`4f284180 : nt!KiExceptionDispatchOnExceptionStackContinue
  659. ffff838a`c588b460 fffff800`42c049e0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x125
  660. ffff838a`c588b640 fffff800`42b11b56 : 00000000`00400a02 00000000`00000000 00400a02`00000010 000001fe`9817b93e : nt!KiGeneralProtectionFault+0x320
  661. ffff838a`c588b7d0 fffff800`42b0a996 : ffffc88d`82c7f188 ffff838a`00000000 ffffc88d`82c7f250 00000000`00000000 : nt!KiTryUnwaitThread+0x186
  662. ffff838a`c588b830 fffff800`42b0a53c : ffffc88d`82c7f180 00000000`00000004 ffff838a`c588bb18 ffffc88d`00000002 : nt!KiTimerWaitTest+0x1e6
  663. ffff838a`c588b8e0 fffff800`42b2279d : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`000058ac : nt!KiProcessExpiredTimerList+0xdc
  664. ffff838a`c588b9d0 fffff800`42bfa78e : ffffffff`00000000 ffff9c80`4f110180 ffff9c80`4f11b340 ffffc88d`81a6a080 : nt!KiRetireDpcList+0x5dd
  665. ffff838a`c588bc60 00000000`00000000 : ffff838a`c588c000 ffff838a`c5886000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
  666.  
  667.  
  668. SYMBOL_NAME: nt!KiTryUnwaitThread+186
  669.  
  670. MODULE_NAME: nt
  671.  
  672. IMAGE_NAME: ntkrnlmp.exe
  673.  
  674. IMAGE_VERSION: 10.0.19041.1052
  675.  
  676. STACK_COMMAND: .thread ; .cxr ; kb
  677.  
  678. BUCKET_ID_FUNC_OFFSET: 186
  679.  
  680. FAILURE_BUCKET_ID: 0x1E_c0000005_R_nt!KiTryUnwaitThread
  681.  
  682. OS_VERSION: 10.0.19041.1
  683.  
  684. BUILDLAB_STR: vb_release
  685.  
  686. OSPLATFORM_TYPE: x64
  687.  
  688. OSNAME: Windows 10
  689.  
  690. FAILURE_ID_HASH: {4abda1ba-718c-fcea-57ff-6e531adb2ce2}
  691.  
  692. Followup: MachineOwner
  693. ---------
  694.  
  695. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\atlmfc.natvis'
  696. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\ObjectiveC.natvis'
  697. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\concurrency.natvis'
  698. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\cpp_rest.natvis'
  699. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Kernel.natvis'
  700. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\stl.natvis'
  701. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Data.Json.natvis'
  702. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Geolocation.natvis'
  703. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Sensors.natvis'
  704. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Media.natvis'
  705. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\windows.natvis'
  706. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\winrt.natvis'
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement