Advertisement
Guest User

Untitled

a guest
Oct 22nd, 2019
122
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.34 KB | None | 0 0
  1. 4: kd> !thread ffffb10cb2671080
  2. THREAD ffffb10cb2671080 Cid 041c.044c Teb: 000000fb81c85000 Win32Thread: 0000000000000000 RUNNING on processor 4
  3. IRP List:
  4. ffffb10cb2ad79a0: (0006,0280) Flags: 00060030 Mdl: 00000000
  5. Not impersonating
  6. DeviceMap ffffe48fce5ebbc0
  7. Owning Process ffffb10cb26b3240 Image: svchost.exe
  8. Attached Process N/A Image: N/A
  9. Wait Start TickCount 9801 Ticks: 53 (0:00:00:00.828)
  10. Context Switch Count 18 IdealProcessor: 4
  11. UserTime 00:00:00.015
  12. KernelTime 00:00:00.000
  13. Win32 Start Address ntdll!TppWorkerThread (0x00007ffa50153d60)
  14. Stack Init ffff8e8637b63c90 Current ffff8e8637b62f30
  15. Base ffff8e8637b64000 Limit ffff8e8637b5e000 Call 0000000000000000
  16. Priority 8 BasePriority 8 PriorityDecrement 0 IoPriority 2 PagePriority 5
  17. Child-SP RetAddr : Args to Child : Call Site
  18. ffff8e86`37b63938 fffff806`5becb1d9 : 00000000`000000ef ffffb10c`b26b3240 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
  19. ffff8e86`37b63940 fffff806`5bdc6e8b : ffffb10c`b26b3240 fffff806`5b69c719 ffffb10c`b26b3240 fffff806`5b69c870 : nt!PspCatchCriticalBreak+0x115
  20. ffff8e86`37b639e0 fffff806`5bc39400 : ffffb10c`00000000 00000000`00000000 ffffb10c`b26b3240 ffffb10c`b26b3240 : nt!PspTerminateAllThreads+0x175c17
  21. ffff8e86`37b63a50 fffff806`5bc391e9 : ffffffff`ffffffff ffff8e86`37b63b80 ffffb10c`b26b3240 fffff806`5bbc7501 : nt!PspTerminateProcess+0xe0
  22. ffff8e86`37b63a90 fffff806`5b7d2b18 : ffffb10c`0000041c ffffb10c`b2671080 ffffb10c`b26b3240 000000fb`8237fadc : nt!NtTerminateProcess+0xa9
  23. ffff8e86`37b63b00 00007ffa`501bc644 : 00007ffa`5022fc5f 00007ffa`5025f980 000000fb`8237faa0 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 (TrapFrame @ ffff8e86`37b63b00)
  24. 000000fb`8237e968 00007ffa`5022fc5f : 00007ffa`5025f980 000000fb`8237faa0 00000000`00000000 00000000`00000088 : ntdll!NtTerminateProcess+0x14
  25. 000000fb`8237e970 00007ffa`501c3cdd : 00007ffa`5025f980 00000000`00000008 00000274`296c0000 00000000`00000000 : ntdll!TppWorkerpInnerExceptionFilter+0x5b
  26. 000000fb`8237e9a0 00007ffa`501ac6d6 : 00000274`298afb80 00000274`296c0000 00000274`298015c0 00007ffa`50160474 : ntdll!TppWorkerThread$filt$3+0x19
  27. 000000fb`8237e9e0 00007ffa`501bbcae : 00007ffa`5025fa40 000000fb`8237f6b0 000000fb`8237faa0 000000fb`8237faa0 : ntdll!_C_specific_handler+0x96
  28. 000000fb`8237ea50 00007ffa`501c11ff : 00000000`00000000 000000fb`8237eff0 000000fb`8237f6b0 00000000`00000000 : ntdll!_GSHandlerCheck_SEH+0x6a
  29. 000000fb`8237ea80 00007ffa`5018a289 : 000000fb`00000001 00007ffa`50120000 00000000`00000000 00007ffa`5028cbfc : ntdll!RtlpExecuteHandlerForException+0xf
  30. 000000fb`8237eab0 00007ffa`501bfe6e : 00000274`296c0100 00000274`296c0280 00000000`00000000 00000000`00000021 : ntdll!RtlDispatchException+0x219
  31. 000000fb`8237f1c0 00007ffa`4b141b24 : 00000000`80070538 00000000`00000001 00000274`2a289000 00000000`00000000 : ntdll!KiUserExceptionDispatch+0x2e (TrapFrame @ 000000fb`8237f5e8)
  32. 000000fb`8237f8d0 00007ffa`4b157e20 : 00000274`29ba95f0 00000000`00000000 00000000`00000003 000000fb`0001001c : rpcss!CSecDescriptor::DecRefCount+0xc
  33. 000000fb`8237f900 00007ffa`4b16585a : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : rpcss!ReadPermissions+0xf8
  34. 000000fb`8237f960 00007ffa`4b1620a3 : 00000274`00000004 00000000`00000bf8 00000274`2985a750 00000000`00000acc : rpcss!ReadRemoteActivationKeys+0x14a
  35. 000000fb`8237f9b0 00007ffa`5014eb1b : 00000274`298438c0 00000000`7ffe0386 00000000`00000000 00000000`00000000 : rpcss!CRegistryWatcher::TimerCallbackFn+0x13
  36. 000000fb`8237f9e0 00007ffa`501505ac : 00000274`29810b40 00000274`298438c0 00000000`00000000 00007ffa`00000000 : ntdll!RtlpTpWaitCallback+0x9b
  37. 000000fb`8237fa50 00007ffa`501541c2 : 00000274`29810cc8 00000274`2985b350 00000000`00000000 00000000`00000000 : ntdll!TppExecuteWaitCallback+0xa4
  38. 000000fb`8237faa0 00007ffa`4e4e7bd4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!TppWorkerThread+0x462
  39. 000000fb`8237fe60 00007ffa`5018ced1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : KERNEL32!BaseThreadInitThunk+0x14
  40. 000000fb`8237fe90 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x21
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement