Advertisement
Guest User

Untitled

a guest
Jan 19th, 2020
109
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 10.94 KB | None | 0 0
  1. *******************************************************************************
  2. * *
  3. * Bugcheck Analysis *
  4. * *
  5. *******************************************************************************
  6.  
  7. SYSTEM_SERVICE_EXCEPTION (3b)
  8. An exception happened while executing a system service routine.
  9. Arguments:
  10. Arg1: 00000000c0000005, Exception code that caused the bugcheck
  11. Arg2: fffff8007f23d8d9, Address of the instruction which caused the bugcheck
  12. Arg3: ffffda08f459c010, Address of the context record for the exception that caused the bugcheck
  13. Arg4: 0000000000000000, zero.
  14.  
  15. Debugging Details:
  16. ------------------
  17.  
  18.  
  19. KEY_VALUES_STRING: 1
  20.  
  21. Key : Analysis.CPU.Sec
  22. Value: 5
  23.  
  24. Key : Analysis.DebugAnalysisProvider.CPP
  25. Value: Create: 8007007e on DESKTOP-VN20H4U
  26.  
  27. Key : Analysis.DebugData
  28. Value: CreateObject
  29.  
  30. Key : Analysis.DebugModel
  31. Value: CreateObject
  32.  
  33. Key : Analysis.Elapsed.Sec
  34. Value: 6
  35.  
  36. Key : Analysis.Memory.CommitPeak.Mb
  37. Value: 67
  38.  
  39. Key : Analysis.System
  40. Value: CreateObject
  41.  
  42.  
  43. ADDITIONAL_XML: 1
  44.  
  45. BUGCHECK_CODE: 3b
  46.  
  47. BUGCHECK_P1: c0000005
  48.  
  49. BUGCHECK_P2: fffff8007f23d8d9
  50.  
  51. BUGCHECK_P3: ffffda08f459c010
  52.  
  53. BUGCHECK_P4: 0
  54.  
  55. CONTEXT: ffffda08f459c010 -- (.cxr 0xffffda08f459c010)
  56. rax=0000000000000006 rbx=0000000000000020 rcx=000000000000005a
  57. rdx=0000000000000003 rsi=ffffb40183a80180 rdi=ffff9083807e3080
  58. rip=fffff8007f23d8d9 rsp=ffffda08f459ca00 rbp=00000000000068b8
  59. r8=ffef9083807e38a0 r9=0000000000000003 r10=0000000000000000
  60. r11=000000000028b810 r12=0000000000000000 r13=ffffb40183a80180
  61. r14=ffff9083807e3080 r15=ffff9083807e3180
  62. iopl=0 nv up di pl nz ac po nc
  63. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010016
  64. nt!KiEndThreadAccountingPeriod+0x99:
  65. fffff800`7f23d8d9 498b0cc0 mov rcx,qword ptr [r8+rax*8] ds:002b:ffef9083`807e38d0=????????????????
  66. Resetting default scope
  67.  
  68. BLACKBOXBSD: 1 (!blackboxbsd)
  69.  
  70.  
  71. BLACKBOXNTFS: 1 (!blackboxntfs)
  72.  
  73.  
  74. BLACKBOXPNP: 1 (!blackboxpnp)
  75.  
  76.  
  77. BLACKBOXWINLOGON: 1
  78.  
  79. CUSTOMER_CRASH_COUNT: 1
  80.  
  81. PROCESS_NAME: chrome.exe
  82.  
  83. STACK_TEXT:
  84. ffffda08`f459ca00 fffff800`7f23bc5f : ffffb401`83a80180 fffff800`00000009 ffffb401`83a80180 00000000`00000000 : nt!KiEndThreadAccountingPeriod+0x99
  85. ffffda08`f459ca30 fffff800`7f23b644 : ffff9083`807e3080 fffff800`7dd37180 ffff9083`80ab61f0 ffff9083`00000000 : nt!KiSwapThread+0x9f
  86. ffffda08`f459cad0 fffff800`7f3040e4 : 00000000`00000001 00000000`00000000 ffffda08`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x144
  87. ffffda08`f459cb70 fffff800`7f8b0495 : ffffda08`f459cc80 000001ee`5f0b7e90 000001ee`5ed41e70 00000019`00000000 : nt!KeWaitForAlertByThreadId+0xd4
  88. ffffda08`f459cbd0 fffff800`7f3d2d15 : 00000000`00000004 00000000`00000000 00000000`00000000 ffff9083`7b5339e0 : nt!NtWaitForAlertByThreadId+0x65
  89. ffffda08`f459cc00 00007ffc`6631f9f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
  90. 00000019`b55ff598 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`6631f9f4
  91.  
  92.  
  93. SYMBOL_NAME: nt!KiEndThreadAccountingPeriod+99
  94.  
  95. MODULE_NAME: nt
  96.  
  97. IMAGE_NAME: ntkrnlmp.exe
  98.  
  99. IMAGE_VERSION: 10.0.18362.476
  100.  
  101. STACK_COMMAND: .cxr 0xffffda08f459c010 ; kb
  102.  
  103. BUCKET_ID_FUNC_OFFSET: 99
  104.  
  105. FAILURE_BUCKET_ID: 0x3B_c0000005_nt!KiEndThreadAccountingPeriod
  106.  
  107. OS_VERSION: 10.0.18362.1
  108.  
  109. BUILDLAB_STR: 19h1_release
  110.  
  111. OSPLATFORM_TYPE: x64
  112.  
  113. OSNAME: Windows 10
  114.  
  115. FAILURE_ID_HASH: {5e3e5b86-2325-a032-3abd-5aad11b8d9f4}
  116.  
  117. Followup: MachineOwner
  118. ---------
  119.  
  120. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2001.2001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\atlmfc.natvis'
  121. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2001.2001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\concurrency.natvis'
  122. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2001.2001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\cpp_rest.natvis'
  123. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2001.2001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\stl.natvis'
  124. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2001.2001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Data.Json.natvis'
  125. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2001.2001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Geolocation.natvis'
  126. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2001.2001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Sensors.natvis'
  127. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2001.2001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Media.natvis'
  128. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2001.2001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\windows.natvis'
  129. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2001.2001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\winrt.natvis'
  130. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2001.2001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Kernel.natvis'
  131.  
  132. Microsoft (R) Windows Debugger Version 10.0.19528.1000 AMD64
  133. Copyright (c) Microsoft Corporation. All rights reserved.
  134.  
  135.  
  136. Loading Dump File [C:\Windows\Minidump\011920-32484-01.dmp]
  137. Mini Kernel Dump File: Only registers and stack trace are available
  138.  
  139.  
  140. ************* Path validation summary **************
  141. Response Time (ms) Location
  142. Deferred srv*
  143. Symbol search path is: srv*
  144. Executable search path is:
  145. Windows 10 Kernel Version 18362 MP (4 procs) Free x64
  146. Product: WinNt, suite: TerminalServer SingleUserTS
  147. 18362.1.amd64fre.19h1_release.190318-1202
  148. Machine Name:
  149. Kernel base = 0xfffff800`47600000 PsLoadedModuleList = 0xfffff800`47a48170
  150. Debug session time: Sun Jan 19 22:21:42.070 2020 (UTC + 4:00)
  151. System Uptime: 0 days 0:55:52.829
  152. Loading Kernel Symbols
  153. ...............................................................
  154. ................................................................
  155. ......................................................
  156. Loading User Symbols
  157. Loading unloaded module list
  158. ........
  159. For analysis of this file, run !analyze -v
  160. nt!KeBugCheckEx:
  161. fffff800`477c14e0 48894c2408 mov qword ptr [rsp+8],rcx ss:fffff800`4da7c000=000000000000003b
  162. 0: kd> !analyze -v
  163. *******************************************************************************
  164. * *
  165. * Bugcheck Analysis *
  166. * *
  167. *******************************************************************************
  168.  
  169. SYSTEM_SERVICE_EXCEPTION (3b)
  170. An exception happened while executing a system service routine.
  171. Arguments:
  172. Arg1: 00000000c0000005, Exception code that caused the bugcheck
  173. Arg2: fffff8004763de19, Address of the instruction which caused the bugcheck
  174. Arg3: fffff8004da7c930, Address of the context record for the exception that caused the bugcheck
  175. Arg4: 0000000000000000, zero.
  176.  
  177. Debugging Details:
  178. ------------------
  179.  
  180.  
  181. KEY_VALUES_STRING: 1
  182.  
  183. Key : Analysis.CPU.Sec
  184. Value: 4
  185.  
  186. Key : Analysis.DebugAnalysisProvider.CPP
  187. Value: Create: 8007007e on DESKTOP-VN20H4U
  188.  
  189. Key : Analysis.DebugData
  190. Value: CreateObject
  191.  
  192. Key : Analysis.DebugModel
  193. Value: CreateObject
  194.  
  195. Key : Analysis.Elapsed.Sec
  196. Value: 5
  197.  
  198. Key : Analysis.Memory.CommitPeak.Mb
  199. Value: 80
  200.  
  201. Key : Analysis.System
  202. Value: CreateObject
  203.  
  204.  
  205. ADDITIONAL_XML: 1
  206.  
  207. BUGCHECK_CODE: 3b
  208.  
  209. BUGCHECK_P1: c0000005
  210.  
  211. BUGCHECK_P2: fffff8004763de19
  212.  
  213. BUGCHECK_P3: fffff8004da7c930
  214.  
  215. BUGCHECK_P4: 0
  216.  
  217. CONTEXT: fffff8004da7c930 -- (.cxr 0xfffff8004da7c930)
  218. rax=ffff9f85c7ca81a0 rbx=ffff9f85c4fb0180 rcx=fffe9f85c2f321a0
  219. rdx=ffff9f85c4fb01a0 rsi=0000000000000000 rdi=fffff80046f7bfe0
  220. rip=fffff8004763de19 rsp=ffffc281019fc610 rbp=00000000000000af
  221. r8=00000000000017e0 r9=fffff80047600000 r10=0000000000000000
  222. r11=ffffc281019fc698 r12=00000000000000af r13=fffff80046f77180
  223. r14=0000000000000001 r15=fffff80046f7a800
  224. iopl=0 nv up ei pl nz na pe nc
  225. cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00010202
  226. nt!KiCancelTimer+0xc9:
  227. fffff800`4763de19 48395108 cmp qword ptr [rcx+8],rdx ds:002b:fffe9f85`c2f321a8=????????????????
  228. Resetting default scope
  229.  
  230. BLACKBOXBSD: 1 (!blackboxbsd)
  231.  
  232.  
  233. BLACKBOXNTFS: 1 (!blackboxntfs)
  234.  
  235.  
  236. BLACKBOXWINLOGON: 1
  237.  
  238. CUSTOMER_CRASH_COUNT: 1
  239.  
  240. PROCESS_NAME: RazerCortex.exe
  241.  
  242. BAD_STACK_POINTER: fffff8004da7bff8
  243.  
  244. STACK_TEXT:
  245. ffffc281`019fc610 fffff800`4763c7e2 : ffffb200`00000001 00000000`00000000 00000000`00000000 ffff9f85`c4fb0180 : nt!KiCancelTimer+0xc9
  246. ffffc281`019fc6a0 fffff800`4763b644 : ffff9f85`c4fb0080 00000000`00000000 ffffb200`08680180 ffff9f85`00000000 : nt!KiSwapThread+0xc22
  247. ffffc281`019fc740 fffff800`4763ade5 : 00000000`000000af ffffb200`00000000 00000048`00080000 00000000`00000000 : nt!KiCommitThreadWait+0x144
  248. ffffc281`019fc7e0 fffff800`4763e05d : ffffc281`019fc9b8 40400000`0000001b 00000000`00000000 00000000`00000000 : nt!KeWaitForSingleObject+0x255
  249. ffffc281`019fc8c0 fffff800`4763829e : ffff9f85`c16b3390 ffffc281`019fc9a0 00000000`00010224 fffff800`477599a0 : nt!ExpWaitForResource+0x6d
  250. ffffc281`019fc940 fffff800`4763746f : ffff9f85`c16b3390 00000000`00000000 ffff9f85`c58a2f00 00000000`00000000 : nt!ExpAcquireResourceExclusiveLite+0x33e
  251. ffffc281`019fca00 fffff1a7`40bd84e7 : ffff9f85`c58a2f00 00000000`00989680 00000000`00000000 00000000`00000001 : nt!ExEnterCriticalRegionAndAcquireResourceExclusive+0x3f
  252. ffffc281`019fca40 fffff1a7`408f7879 : 00000000`00000001 ffff9f85`c4fb0080 00000000`00000000 00000000`00000000 : win32kbase!EnterCrit+0x87
  253. ffffc281`019fcb60 fffff800`477d2d15 : ffff9f85`c4fb0080 00007ff9`e0545930 00000000`00000020 00000000`0151b720 : win32kfull!NtUserGetMessage+0x49
  254. ffffc281`019fcc00 00007ff9`e054fd74 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
  255. 00000000`00f8e2b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`e054fd74
  256.  
  257.  
  258. SYMBOL_NAME: win32kbase!EnterCrit+87
  259.  
  260. MODULE_NAME: win32kbase
  261.  
  262. IMAGE_NAME: win32kbase.sys
  263.  
  264. IMAGE_VERSION: 10.0.18362.476
  265.  
  266. STACK_COMMAND: .cxr 0xfffff8004da7c930 ; kb
  267.  
  268. BUCKET_ID_FUNC_OFFSET: 87
  269.  
  270. FAILURE_BUCKET_ID: 0x3B_c0000005_STACKPTR_ERROR_win32kbase!EnterCrit
  271.  
  272. OS_VERSION: 10.0.18362.1
  273.  
  274. BUILDLAB_STR: 19h1_release
  275.  
  276. OSPLATFORM_TYPE: x64
  277.  
  278. OSNAME: Windows 10
  279.  
  280. FAILURE_ID_HASH: {2e01f63e-ba31-6ba0-dc9a-11ad48715d03}
  281.  
  282. Followup: MachineOwner
  283. ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement