Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 10.0.18362.1 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Windows\MEMORY.DMP]
- Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
- Symbol search path is: srv*
- Executable search path is:
- Windows 10 Kernel Version 18362 MP (12 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 18362.1.amd64fre.19h1_release.190318-1202
- Machine Name:
- Kernel base = 0xfffff807`4b800000 PsLoadedModuleList = 0xfffff807`4bc480f0
- Debug session time: Tue Aug 18 19:42:34.126 2020 (UTC + 2:00)
- System Uptime: 0 days 0:17:51.816
- Loading Kernel Symbols
- .......................................Page 2001009f8 too large to be in the dump file.
- Page 2001009f7 too large to be in the dump file.
- ........................
- ................................................................
- .......Page 20010d024 too large to be in the dump file.
- .........Page 20010d028 too large to be in the dump file.
- .......Page 200127325 too large to be in the dump file.
- .........................................
- ...............................................
- Loading User Symbols
- PEB is paged out (Peb.Ldr = 000000e5`8356c018). Type ".hh dbgerr001" for details
- Loading unloaded module list
- ..
- For analysis of this file, run !analyze -v
- 1: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- KMODE_EXCEPTION_NOT_HANDLED (1e)
- This is a very common bugcheck. Usually the exception address pinpoints
- the driver/function that caused the problem. Always note this address
- as well as the link date of the driver/image that contains this address.
- Arguments:
- Arg1: ffffffffc0000005, The exception code that was not handled
- Arg2: fffff8074b9d535a, The address that the exception occurred at
- Arg3: 0000000000000000, Parameter 0 of the exception
- Arg4: ffffffffffffffff, Parameter 1 of the exception
- Debugging Details:
- ------------------
- KEY_VALUES_STRING: 1
- PROCESSES_ANALYSIS: 1
- SERVICE_ANALYSIS: 1
- STACKHASH_ANALYSIS: 1
- TIMELINE_ANALYSIS: 1
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 401
- BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
- SYSTEM_MANUFACTURER: System manufacturer
- SYSTEM_PRODUCT_NAME: System Product Name
- SYSTEM_SKU: SKU
- SYSTEM_VERSION: System Version
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: 1002
- BIOS_DATE: 07/02/2018
- BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
- BASEBOARD_PRODUCT: ROG STRIX Z370-F GAMING
- BASEBOARD_VERSION: Rev X.0x
- DUMP_TYPE: 1
- BUGCHECK_P1: ffffffffc0000005
- BUGCHECK_P2: fffff8074b9d535a
- BUGCHECK_P3: 0
- BUGCHECK_P4: ffffffffffffffff
- READ_ADDRESS: ffffffffffffffff
- EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%p verwies auf Arbeitsspeicher bei 0x%p. Der Vorgang %s konnte im Arbeitsspeicher nicht durchgef hrt werden.
- FAULTING_IP:
- nt!memcpy+21a
- fffff807`4b9d535a f30f6f4410f0 movdqu xmm0,xmmword ptr [rax+rdx-10h]
- EXCEPTION_PARAMETER2: ffffffffffffffff
- BUGCHECK_STR: 0x1E_c0000005_R
- CPU_COUNT: c
- CPU_MHZ: e70
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 9e
- CPU_STEPPING: a
- CPU_MICROCODE: 6,9e,a,0 (F,M,S,R) SIG: 96'00000000 (cache) 96'00000000 (init)
- BLACKBOXBSD: 1 (!blackboxbsd)
- BLACKBOXNTFS: 1 (!blackboxntfs)
- BLACKBOXPNP: 1 (!blackboxpnp)
- BLACKBOXWINLOGON: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- PROCESS_NAME: RainbowSix.exe
- CURRENT_IRQL: 0
- ANALYSIS_SESSION_HOST: GAMING-PC
- ANALYSIS_SESSION_TIME: 08-18-2020 21:19:57.0488
- ANALYSIS_VERSION: 10.0.18362.1 amd64fre
- LAST_CONTROL_TRANSFER: from fffff8074ba1a023 to fffff8074b9c23c0
- STACK_TEXT:
- fffff28c`241f6348 fffff807`4ba1a023 : 00000000`0000001e ffffffff`c0000005 fffff807`4b9d535a 00000000`00000000 : nt!KeBugCheckEx
- fffff28c`241f6350 fffff807`4b9d431d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x18c383
- fffff28c`241f6a00 fffff807`4b9d00a0 : fffff28c`241f6f38 ffff9f4f`b5401600 fffff28c`241f6f38 fffff807`4b866397 : nt!KiExceptionDispatch+0x11d
- fffff28c`241f6be0 fffff807`4b9d535a : fffff807`4be09df7 ffff8e88`381eb3c0 fffff807`4b819ebd ffff8e88`381eb410 : nt!KiGeneralProtectionFault+0x320
- fffff28c`241f6d78 fffff807`4be09df7 : ffff8e88`381eb3c0 fffff807`4b819ebd ffff8e88`381eb410 fffff807`4bd00d10 : nt!memcpy+0x21a
- fffff28c`241f6d80 fffff807`4be09b78 : ffff8e88`3f0ad0b0 00000000`00000000 00000000`00000000 ffffa28b`3f7d73d0 : nt!ObpCaptureObjectName+0x167
- fffff28c`241f6e10 fffff807`4be09fad : ffff8e88`3f0ad010 ffff8e88`28e9d2f0 00000000`00000000 00000000`00000312 : nt!ObpCaptureObjectCreateInformation+0x1d8
- fffff28c`241f6eb0 fffff807`4be135fc : ffff8e88`00000001 00000000`00000000 00000000`00000000 ffff8e88`28efe820 : nt!ObOpenObjectByNameEx+0xcd
- fffff28c`241f6ff0 fffff807`4be1347d : fffff28c`241f74c0 fffff28c`241f7360 00000000`00000000 00000000`005bde80 : nt!ObOpenObjectByName+0x5c
- fffff28c`241f7040 fffff807`4be95d92 : ffffa28b`3f7d73d0 00000000`005d0000 fffff28c`241f7558 00000000`00020019 : nt!CmOpenKey+0x29d
- fffff28c`241f72a0 fffff807`4b9d414e : 00000000`00000000 00000000`0000001c 00000000`00000000 00000000`00000000 : nt!NtOpenKey+0x12
- fffff28c`241f72e0 fffff807`4b9c61e0 : fffff807`4bef8cdf 00000000`00000000 00000000`00501802 fffff28c`241f75e8 : nt!KiSystemServiceExitPico+0x2b9
- fffff28c`241f7478 fffff807`4bef8cdf : 00000000`00000000 00000000`00501802 fffff28c`241f75e8 00000000`00000001 : nt!KiServiceLinkage
- fffff28c`241f7480 fffff807`4bf663f4 : 00000000`00000010 00000000`00000030 ffff8e88`33ae20b0 00000000`000007b0 : nt!IopOpenRegistryKey+0x47
- fffff28c`241f7500 fffff807`4c05f1fb : ffff8e88`381eb040 00000000`0000007e ffff8e88`33ae2180 ffff8e88`33ae2150 : nt!IopUnloadDriver+0x9c
- fffff28c`241f7630 fffff807`4b9d414e : ffff8e88`293f87a8 ffff8e88`28f5b040 00000000`00000010 ffff8e88`293f8000 : nt!NtUnloadDriver+0xb
- fffff28c`241f7660 fffff807`4b9c61e0 : ffff8e88`33ae1b81 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2b9
- fffff28c`241f77f8 ffff8e88`33ae1b81 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
- fffff28c`241f7800 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffff8e88`33ae1b81
- THREAD_SHA1_HASH_MOD_FUNC: 582f55d910998f89d469872581c20d219223e869
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 03d21faac6329923c1e28c62ad9ad7b4b058e9ea
- THREAD_SHA1_HASH_MOD: 82d14546c43bd06881f781d6d197c4c7f7ceb9cb
- FOLLOWUP_IP:
- nt!KiDispatchException+18c383
- fffff807`4ba1a023 cc int 3
- FAULT_INSTR_CODE: 86f741cc
- SYMBOL_STACK_INDEX: 1
- SYMBOL_NAME: nt!KiDispatchException+18c383
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- DEBUG_FLR_IMAGE_TIMESTAMP: 7530c6d3
- STACK_COMMAND: .thread ; .cxr ; kb
- BUCKET_ID_FUNC_OFFSET: 18c383
- FAILURE_BUCKET_ID: 0x1E_c0000005_R_nt!KiDispatchException
- BUCKET_ID: 0x1E_c0000005_R_nt!KiDispatchException
- PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_R_nt!KiDispatchException
- TARGET_TIME: 2020-08-18T17:42:34.000Z
- OSBUILD: 18362
- OSSERVICEPACK: 0
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
- OS_LOCALE:
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2032-04-21 05:28:19
- BUILDDATESTAMP_STR: 190318-1202
- BUILDLAB_STR: 19h1_release
- BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
- ANALYSIS_SESSION_ELAPSED_TIME: 6e8
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:0x1e_c0000005_r_nt!kidispatchexception
- FAILURE_ID_HASH: {8cda4994-5937-8d70-909d-3f5236ba02c6}
- Followup: MachineOwner
- ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement