Advertisement
Guest User

dmp4

a guest
Jan 12th, 2022
158
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.82 KB | None | 0 0
  1.  
  2. Microsoft (R) Windows Debugger Version 10.0.22000.194 X86
  3. Copyright (c) Microsoft Corporation. All rights reserved.
  4.  
  5.  
  6. Loading Dump File [C:\Windows\Minidump\011122-4640-01.dmp]
  7. Mini Kernel Dump File: Only registers and stack trace are available
  8.  
  9. Symbol search path is: srv*
  10. Executable search path is:
  11. Windows 10 Kernel Version 19041 MP (12 procs) Free x64
  12. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  13. Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
  14. Machine Name:
  15. Kernel base = 0xfffff805`49c00000 PsLoadedModuleList = 0xfffff805`4a82a1b0
  16. Debug session time: Tue Jan 11 23:02:53.219 2022 (UTC - 5:00)
  17. System Uptime: 0 days 2:37:29.841
  18. Loading Kernel Symbols
  19. ...............................................................
  20. ................................................................
  21. ................................................................
  22.  
  23. Loading User Symbols
  24. Loading unloaded module list
  25. .......
  26. For analysis of this file, run !analyze -v
  27. 4: kd> !analyze -v
  28. *******************************************************************************
  29. * *
  30. * Bugcheck Analysis *
  31. * *
  32. *******************************************************************************
  33.  
  34. UNEXPECTED_KERNEL_MODE_TRAP (7f)
  35. This means a trap occurred in kernel mode, and it's a trap of a kind
  36. that the kernel isn't allowed to have/catch (bound trap) or that
  37. is always instant death (double fault). The first number in the
  38. bugcheck params is the number of the trap (8 = double fault, etc)
  39. Consult an Intel x86 family manual to learn more about what these
  40. traps are. Here is a *portion* of those codes:
  41. If kv shows a taskGate
  42. use .tss on the part before the colon, then kv.
  43. Else if kv shows a trapframe
  44. use .trap on that value
  45. Else
  46. .trap on the appropriate frame will show where the trap was taken
  47. (on x86, this will be the ebp that goes with the procedure KiTrap)
  48. Endif
  49. kb will then show the corrected stack.
  50. Arguments:
  51. Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
  52. Arg2: ffffcb0181743e70
  53. Arg3: ffffc582d203f5d8
  54. Arg4: 00000000000001f0
  55.  
  56. Debugging Details:
  57. ------------------
  58.  
  59.  
  60. KEY_VALUES_STRING: 1
  61.  
  62. Key : Analysis.CPU.mSec
  63. Value: 3562
  64.  
  65. Key : Analysis.DebugAnalysisManager
  66. Value: Create
  67.  
  68. Key : Analysis.Elapsed.mSec
  69. Value: 5666
  70.  
  71. Key : Analysis.Init.CPU.mSec
  72. Value: 1202
  73.  
  74. Key : Analysis.Init.Elapsed.mSec
  75. Value: 7620
  76.  
  77. Key : Analysis.Memory.CommitPeak.Mb
  78. Value: 82
  79.  
  80. Key : WER.OS.Branch
  81. Value: vb_release
  82.  
  83. Key : WER.OS.Timestamp
  84. Value: 2019-12-06T14:06:00Z
  85.  
  86. Key : WER.OS.Version
  87. Value: 10.0.19041.1
  88.  
  89.  
  90. BUGCHECK_CODE: 7f
  91.  
  92. BUGCHECK_P1: 8
  93.  
  94. BUGCHECK_P2: ffffcb0181743e70
  95.  
  96. BUGCHECK_P3: ffffc582d203f5d8
  97.  
  98. BUGCHECK_P4: 1f0
  99.  
  100. TRAP_FRAME: ffffcb0181743e70 -- (.trap 0xffffcb0181743e70)
  101. NOTE: The trap frame does not contain all registers.
  102. Some register values may be zeroed or incorrect.
  103. rax=ffffde83a91af038 rbx=0000000000000000 rcx=0000000000000001
  104. rdx=ffffde83a91af038 rsi=0000000000000000 rdi=0000000000000000
  105. rip=00000000000001f0 rsp=ffffc582d203f5d8 rbp=00000000000009d2
  106. r8=000000000000005e r9=5455555155515515 r10=0000000000000017
  107. r11=00000000000000e0 r12=0000000000000000 r13=0000000000000000
  108. r14=0000000000000000 r15=0000000000000000
  109. iopl=0 nv up ei pl nz na po nc
  110. 00000000`000001f0 ?? ???
  111. Resetting default scope
  112.  
  113. BLACKBOXBSD: 1 (!blackboxbsd)
  114.  
  115.  
  116. BLACKBOXNTFS: 1 (!blackboxntfs)
  117.  
  118.  
  119. BLACKBOXPNP: 1 (!blackboxpnp)
  120.  
  121.  
  122. BLACKBOXWINLOGON: 1
  123.  
  124. CUSTOMER_CRASH_COUNT: 1
  125.  
  126. PROCESS_NAME: SkyrimSE.exe
  127.  
  128. BAD_STACK_POINTER: ffffc582d203f5d8
  129.  
  130. STACK_TEXT:
  131. ffffcb01`81743d28 fffff805`4a009069 : 00000000`0000007f 00000000`00000008 ffffcb01`81743e70 ffffc582`d203f5d8 : nt!KeBugCheckEx
  132. ffffcb01`81743d30 fffff805`4a003e83 : f88b41c8`458948c0 48d98b48`28458d48 b841a043`8949d18b 9843c749`00000006 : nt!KiBugCheckDispatch+0x69
  133. ffffcb01`81743e70 00000000`000001f0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x2c3
  134. ffffc582`d203f5d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x1f0
  135.  
  136.  
  137. SYMBOL_NAME: nt!KiDoubleFaultAbort+2c3
  138.  
  139. MODULE_NAME: nt
  140.  
  141. IMAGE_NAME: ntkrnlmp.exe
  142.  
  143. IMAGE_VERSION: 10.0.19041.1415
  144.  
  145. STACK_COMMAND: .thread ; .cxr ; kb
  146.  
  147. BUCKET_ID_FUNC_OFFSET: 2c3
  148.  
  149. FAILURE_BUCKET_ID: 0x7f_8_STACKPTR_ERROR_nt!KiDoubleFaultAbort
  150.  
  151. OS_VERSION: 10.0.19041.1
  152.  
  153. BUILDLAB_STR: vb_release
  154.  
  155. OSPLATFORM_TYPE: x64
  156.  
  157. OSNAME: Windows 10
  158.  
  159. FAILURE_ID_HASH: {c5b9990d-856b-1bb5-7662-4621e5941c84}
  160.  
  161. Followup: MachineOwner
  162. ---------
  163.  
  164.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement