Advertisement
Guest User

Untitled

a guest
Feb 25th, 2020
175
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 7.23 KB | None | 0 0
  1.  
  2. Microsoft (R) Windows Debugger Version 10.0.18362.1 AMD64
  3. Copyright (c) Microsoft Corporation. All rights reserved.
  4.  
  5.  
  6. Loading Dump File [C:\Users\MrSoloHD\Desktop\MEMORY.DMP]
  7. Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
  8.  
  9. Symbol search path is: srv*
  10. Executable search path is:
  11. Windows 10 Kernel Version 18362 MP (6 procs) Free x64
  12. Product: WinNt, suite: TerminalServer SingleUserTS
  13. Built by: 18362.1.amd64fre.19h1_release.190318-1202
  14. Machine Name:
  15. Kernel base = 0xfffff804`3d600000 PsLoadedModuleList = 0xfffff804`3da48190
  16. Debug session time: Tue Feb 25 14:51:27.673 2020 (UTC - 5:00)
  17. System Uptime: 0 days 0:36:11.463
  18. Loading Kernel Symbols
  19. .......................................Page 200186dca too large to be in the dump file.
  20. Page 200186dc9 too large to be in the dump file.
  21. ........................
  22. ................................................................
  23. ................................................................
  24. ...............
  25. Loading User Symbols
  26. PEB address is NULL !
  27. Loading unloaded module list
  28. ...........
  29. For analysis of this file, run !analyze -v
  30. 3: kd> !analyze -v
  31. *******************************************************************************
  32. * *
  33. * Bugcheck Analysis *
  34. * *
  35. *******************************************************************************
  36.  
  37. SYSTEM_SERVICE_EXCEPTION (3b)
  38. An exception happened while executing a system service routine.
  39. Arguments:
  40. Arg1: 00000000c0000005, Exception code that caused the bugcheck
  41. Arg2: fffff8043dc2a1b1, Address of the instruction which caused the bugcheck
  42. Arg3: ffffb809c4ca6380, Address of the context record for the exception that caused the bugcheck
  43. Arg4: 0000000000000000, zero.
  44.  
  45. Debugging Details:
  46. ------------------
  47.  
  48.  
  49. KEY_VALUES_STRING: 1
  50.  
  51.  
  52. PROCESSES_ANALYSIS: 1
  53.  
  54. SERVICE_ANALYSIS: 1
  55.  
  56. STACKHASH_ANALYSIS: 1
  57.  
  58. TIMELINE_ANALYSIS: 1
  59.  
  60.  
  61. DUMP_CLASS: 1
  62.  
  63. DUMP_QUALIFIER: 401
  64.  
  65. BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
  66.  
  67. SYSTEM_MANUFACTURER: System manufacturer
  68.  
  69. SYSTEM_PRODUCT_NAME: System Product Name
  70.  
  71. SYSTEM_SKU: ASUS_MB_CNL
  72.  
  73. SYSTEM_VERSION: System Version
  74.  
  75. BIOS_VENDOR: American Megatrends Inc.
  76.  
  77. BIOS_VERSION: 1401
  78.  
  79. BIOS_DATE: 11/26/2019
  80.  
  81. BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
  82.  
  83. BASEBOARD_PRODUCT: PRIME Z390-A
  84.  
  85. BASEBOARD_VERSION: Rev 1.xx
  86.  
  87. DUMP_TYPE: 1
  88.  
  89. BUGCHECK_P1: c0000005
  90.  
  91. BUGCHECK_P2: fffff8043dc2a1b1
  92.  
  93. BUGCHECK_P3: ffffb809c4ca6380
  94.  
  95. BUGCHECK_P4: 0
  96.  
  97. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  98.  
  99. FAULTING_IP:
  100. nt!CmpGetNameControlBlock+c1
  101. fffff804`3dc2a1b1 3b1e cmp ebx,dword ptr [rsi]
  102.  
  103. CONTEXT: ffffb809c4ca6380 -- (.cxr 0xffffb809c4ca6380)
  104. rax=ffff840a19a4a000 rbx=0000000007b61a95 rcx=00000000a4ae33c8
  105. rdx=ffff840a19a4ed10 rsi=007200440000006b rdi=0000000000000000
  106. rip=fffff8043dc2a1b1 rsp=ffffb809c4ca6d70 rbp=0000000000000005
  107. r8=ffffb809c4ca6d48 r9=ffff840a3278b8fa r10=0000000000000000
  108. r11=000000000000000a r12=00000000000009a2 r13=ffffb809c4ca7140
  109. r14=0072004400000063 r15=ffff840a2a17e101
  110. iopl=0 nv up ei pl nz na pe nc
  111. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
  112. nt!CmpGetNameControlBlock+0xc1:
  113. fffff804`3dc2a1b1 3b1e cmp ebx,dword ptr [rsi] ds:002b:00720044`0000006b=????????
  114. Resetting default scope
  115.  
  116. BUGCHECK_STR: 0x3B_c0000005
  117.  
  118. CPU_COUNT: 6
  119.  
  120. CPU_MHZ: c18
  121.  
  122. CPU_VENDOR: GenuineIntel
  123.  
  124. CPU_FAMILY: 6
  125.  
  126. CPU_MODEL: 9e
  127.  
  128. CPU_STEPPING: a
  129.  
  130. CPU_MICROCODE: 6,9e,a,0 (F,M,S,R) SIG: B4'00000000 (cache) B4'00000000 (init)
  131.  
  132. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  133.  
  134. PROCESS_NAME: Registry
  135.  
  136. CURRENT_IRQL: 0
  137.  
  138. ANALYSIS_SESSION_HOST: MRSOLOHD
  139.  
  140. ANALYSIS_SESSION_TIME: 02-25-2020 14:54:29.0493
  141.  
  142. ANALYSIS_VERSION: 10.0.18362.1 amd64fre
  143.  
  144. LAST_CONTROL_TRANSFER: from fffff8043dc29db9 to fffff8043dc2a1b1
  145.  
  146. STACK_TEXT:
  147. ffffb809`c4ca6d70 fffff804`3dc29db9 : 00000000`3ceb0005 ffffb809`c4ca7140 00000000`00000001 fffff804`3dc299e5 : nt!CmpGetNameControlBlock+0xc1
  148. ffffb809`c4ca6dd0 fffff804`3dc28177 : 00000000`3ceba3ca 00000000`07b61a95 ffff840a`29b5a3b0 00000000`00000000 : nt!CmpCreateKeyControlBlock+0x149
  149. ffffb809`c4ca6e40 fffff804`3dbf240a : ffff840a`29b5a3b0 00000000`00000003 ffffb809`c4ca7038 ffffb809`c4ca70a0 : nt!CmpWalkOneLevel+0x647
  150. ffffb809`c4ca6f50 fffff804`3dbef474 : ffffb809`0000001c ffffb809`c4ca72a0 ffffb809`c4ca7268 00000000`00000000 : nt!CmpDoParseKey+0x9fa
  151. ffffb809`c4ca71f0 fffff804`3dbed35f : ffffa60f`c1853320 ffff840a`341a6501 00000000`00000000 00000000`00000001 : nt!CmpParseKey+0x274
  152. ffffb809`c4ca7410 fffff804`3dbeb7c1 : ffffa60f`c1853300 ffffb809`c4ca7658 00000000`00000040 ffffa60f`9f2f87a0 : nt!ObpLookupObjectName+0x78f
  153. ffffb809`c4ca75d0 fffff804`3dbf4cdc : 00000000`00000001 00000000`00000000 00000000`00000000 ffffa60f`9f2f87a0 : nt!ObOpenObjectByNameEx+0x201
  154. ffffb809`c4ca7710 fffff804`3dbf4b5d : 00000064`8f2fee20 ffffb809`c4ca7a80 00000000`00000001 00000000`00000000 : nt!ObOpenObjectByName+0x5c
  155. ffffb809`c4ca7760 fffff804`3dbf6b7f : 00000000`00000f34 00007ffd`00501802 00000064`8f2fedb0 00000000`00020019 : nt!CmOpenKey+0x29d
  156. ffffb809`c4ca79c0 fffff804`3d7d334e : ffffa60f`c09b8080 00000242`e0477601 00000000`00000000 ffffa60f`bc5d1860 : nt!NtOpenKeyEx+0xf
  157. ffffb809`c4ca7a00 00007ffd`64e5e414 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2b9
  158. 00000064`8f2fed48 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`64e5e414
  159.  
  160.  
  161. THREAD_SHA1_HASH_MOD_FUNC: 0d76521720d68b325676a51d865688920dcf0638
  162.  
  163. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 406d2cb7e123d666346d0b736e027ae56a2bb59a
  164.  
  165. THREAD_SHA1_HASH_MOD: b28610981796779b4ac02f58898fde25728a775c
  166.  
  167. FOLLOWUP_IP:
  168. nt!CmpGetNameControlBlock+c1
  169. fffff804`3dc2a1b1 3b1e cmp ebx,dword ptr [rsi]
  170.  
  171. FAULT_INSTR_CODE: 840f1e3b
  172.  
  173. SYMBOL_STACK_INDEX: 0
  174.  
  175. SYMBOL_NAME: nt!CmpGetNameControlBlock+c1
  176.  
  177. FOLLOWUP_NAME: MachineOwner
  178.  
  179. MODULE_NAME: nt
  180.  
  181. IMAGE_NAME: ntkrnlmp.exe
  182.  
  183. DEBUG_FLR_IMAGE_TIMESTAMP: 4269a790
  184.  
  185. STACK_COMMAND: .cxr 0xffffb809c4ca6380 ; kb
  186.  
  187. BUCKET_ID_FUNC_OFFSET: c1
  188.  
  189. FAILURE_BUCKET_ID: 0x3B_c0000005_nt!CmpGetNameControlBlock
  190.  
  191. BUCKET_ID: 0x3B_c0000005_nt!CmpGetNameControlBlock
  192.  
  193. PRIMARY_PROBLEM_CLASS: 0x3B_c0000005_nt!CmpGetNameControlBlock
  194.  
  195. TARGET_TIME: 2020-02-25T19:51:27.000Z
  196.  
  197. OSBUILD: 18362
  198.  
  199. OSSERVICEPACK: 0
  200.  
  201. SERVICEPACK_NUMBER: 0
  202.  
  203. OS_REVISION: 0
  204.  
  205. SUITE_MASK: 272
  206.  
  207. PRODUCT_TYPE: 1
  208.  
  209. OSPLATFORM_TYPE: x64
  210.  
  211. OSNAME: Windows 10
  212.  
  213. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
  214.  
  215. OS_LOCALE:
  216.  
  217. USER_LCID: 0
  218.  
  219. OSBUILD_TIMESTAMP: 2005-04-22 21:40:32
  220.  
  221. BUILDDATESTAMP_STR: 190318-1202
  222.  
  223. BUILDLAB_STR: 19h1_release
  224.  
  225. BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
  226.  
  227. ANALYSIS_SESSION_ELAPSED_TIME: 1256
  228.  
  229. ANALYSIS_SOURCE: KM
  230.  
  231. FAILURE_ID_HASH_STRING: km:0x3b_c0000005_nt!cmpgetnamecontrolblock
  232.  
  233. FAILURE_ID_HASH: {8a5e360a-e831-e203-6a33-02da6bab5e29}
  234.  
  235. Followup: MachineOwner
  236. ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement