Advertisement
Guest User

Untitled

a guest
Aug 18th, 2020
175
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 8.07 KB | None | 0 0
  1.  
  2. Microsoft (R) Windows Debugger Version 10.0.18362.1 AMD64
  3. Copyright (c) Microsoft Corporation. All rights reserved.
  4.  
  5.  
  6. Loading Dump File [C:\Windows\MEMORY.DMP]
  7. Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
  8.  
  9. Symbol search path is: srv*
  10. Executable search path is:
  11. Windows 10 Kernel Version 18362 MP (12 procs) Free x64
  12. Product: WinNt, suite: TerminalServer SingleUserTS
  13. Built by: 18362.1.amd64fre.19h1_release.190318-1202
  14. Machine Name:
  15. Kernel base = 0xfffff807`4b800000 PsLoadedModuleList = 0xfffff807`4bc480f0
  16. Debug session time: Tue Aug 18 19:42:34.126 2020 (UTC + 2:00)
  17. System Uptime: 0 days 0:17:51.816
  18. Loading Kernel Symbols
  19. .......................................Page 2001009f8 too large to be in the dump file.
  20. Page 2001009f7 too large to be in the dump file.
  21. ........................
  22. ................................................................
  23. .......Page 20010d024 too large to be in the dump file.
  24. .........Page 20010d028 too large to be in the dump file.
  25. .......Page 200127325 too large to be in the dump file.
  26. .........................................
  27. ...............................................
  28. Loading User Symbols
  29. PEB is paged out (Peb.Ldr = 000000e5`8356c018). Type ".hh dbgerr001" for details
  30. Loading unloaded module list
  31. ..
  32. For analysis of this file, run !analyze -v
  33. 1: kd> !analyze -v
  34. *******************************************************************************
  35. * *
  36. * Bugcheck Analysis *
  37. * *
  38. *******************************************************************************
  39.  
  40. KMODE_EXCEPTION_NOT_HANDLED (1e)
  41. This is a very common bugcheck. Usually the exception address pinpoints
  42. the driver/function that caused the problem. Always note this address
  43. as well as the link date of the driver/image that contains this address.
  44. Arguments:
  45. Arg1: ffffffffc0000005, The exception code that was not handled
  46. Arg2: fffff8074b9d535a, The address that the exception occurred at
  47. Arg3: 0000000000000000, Parameter 0 of the exception
  48. Arg4: ffffffffffffffff, Parameter 1 of the exception
  49.  
  50. Debugging Details:
  51. ------------------
  52.  
  53.  
  54. KEY_VALUES_STRING: 1
  55.  
  56.  
  57. PROCESSES_ANALYSIS: 1
  58.  
  59. SERVICE_ANALYSIS: 1
  60.  
  61. STACKHASH_ANALYSIS: 1
  62.  
  63. TIMELINE_ANALYSIS: 1
  64.  
  65.  
  66. DUMP_CLASS: 1
  67.  
  68. DUMP_QUALIFIER: 401
  69.  
  70. BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
  71.  
  72. SYSTEM_MANUFACTURER: System manufacturer
  73.  
  74. SYSTEM_PRODUCT_NAME: System Product Name
  75.  
  76. SYSTEM_SKU: SKU
  77.  
  78. SYSTEM_VERSION: System Version
  79.  
  80. BIOS_VENDOR: American Megatrends Inc.
  81.  
  82. BIOS_VERSION: 1002
  83.  
  84. BIOS_DATE: 07/02/2018
  85.  
  86. BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
  87.  
  88. BASEBOARD_PRODUCT: ROG STRIX Z370-F GAMING
  89.  
  90. BASEBOARD_VERSION: Rev X.0x
  91.  
  92. DUMP_TYPE: 1
  93.  
  94. BUGCHECK_P1: ffffffffc0000005
  95.  
  96. BUGCHECK_P2: fffff8074b9d535a
  97.  
  98. BUGCHECK_P3: 0
  99.  
  100. BUGCHECK_P4: ffffffffffffffff
  101.  
  102. READ_ADDRESS: ffffffffffffffff
  103.  
  104. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%p verwies auf Arbeitsspeicher bei 0x%p. Der Vorgang %s konnte im Arbeitsspeicher nicht durchgef hrt werden.
  105.  
  106. FAULTING_IP:
  107. nt!memcpy+21a
  108. fffff807`4b9d535a f30f6f4410f0 movdqu xmm0,xmmword ptr [rax+rdx-10h]
  109.  
  110. EXCEPTION_PARAMETER2: ffffffffffffffff
  111.  
  112. BUGCHECK_STR: 0x1E_c0000005_R
  113.  
  114. CPU_COUNT: c
  115.  
  116. CPU_MHZ: e70
  117.  
  118. CPU_VENDOR: GenuineIntel
  119.  
  120. CPU_FAMILY: 6
  121.  
  122. CPU_MODEL: 9e
  123.  
  124. CPU_STEPPING: a
  125.  
  126. CPU_MICROCODE: 6,9e,a,0 (F,M,S,R) SIG: 96'00000000 (cache) 96'00000000 (init)
  127.  
  128. BLACKBOXBSD: 1 (!blackboxbsd)
  129.  
  130.  
  131. BLACKBOXNTFS: 1 (!blackboxntfs)
  132.  
  133.  
  134. BLACKBOXPNP: 1 (!blackboxpnp)
  135.  
  136.  
  137. BLACKBOXWINLOGON: 1
  138.  
  139. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  140.  
  141. PROCESS_NAME: RainbowSix.exe
  142.  
  143. CURRENT_IRQL: 0
  144.  
  145. ANALYSIS_SESSION_HOST: GAMING-PC
  146.  
  147. ANALYSIS_SESSION_TIME: 08-18-2020 21:19:57.0488
  148.  
  149. ANALYSIS_VERSION: 10.0.18362.1 amd64fre
  150.  
  151. LAST_CONTROL_TRANSFER: from fffff8074ba1a023 to fffff8074b9c23c0
  152.  
  153. STACK_TEXT:
  154. fffff28c`241f6348 fffff807`4ba1a023 : 00000000`0000001e ffffffff`c0000005 fffff807`4b9d535a 00000000`00000000 : nt!KeBugCheckEx
  155. fffff28c`241f6350 fffff807`4b9d431d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x18c383
  156. fffff28c`241f6a00 fffff807`4b9d00a0 : fffff28c`241f6f38 ffff9f4f`b5401600 fffff28c`241f6f38 fffff807`4b866397 : nt!KiExceptionDispatch+0x11d
  157. fffff28c`241f6be0 fffff807`4b9d535a : fffff807`4be09df7 ffff8e88`381eb3c0 fffff807`4b819ebd ffff8e88`381eb410 : nt!KiGeneralProtectionFault+0x320
  158. fffff28c`241f6d78 fffff807`4be09df7 : ffff8e88`381eb3c0 fffff807`4b819ebd ffff8e88`381eb410 fffff807`4bd00d10 : nt!memcpy+0x21a
  159. fffff28c`241f6d80 fffff807`4be09b78 : ffff8e88`3f0ad0b0 00000000`00000000 00000000`00000000 ffffa28b`3f7d73d0 : nt!ObpCaptureObjectName+0x167
  160. fffff28c`241f6e10 fffff807`4be09fad : ffff8e88`3f0ad010 ffff8e88`28e9d2f0 00000000`00000000 00000000`00000312 : nt!ObpCaptureObjectCreateInformation+0x1d8
  161. fffff28c`241f6eb0 fffff807`4be135fc : ffff8e88`00000001 00000000`00000000 00000000`00000000 ffff8e88`28efe820 : nt!ObOpenObjectByNameEx+0xcd
  162. fffff28c`241f6ff0 fffff807`4be1347d : fffff28c`241f74c0 fffff28c`241f7360 00000000`00000000 00000000`005bde80 : nt!ObOpenObjectByName+0x5c
  163. fffff28c`241f7040 fffff807`4be95d92 : ffffa28b`3f7d73d0 00000000`005d0000 fffff28c`241f7558 00000000`00020019 : nt!CmOpenKey+0x29d
  164. fffff28c`241f72a0 fffff807`4b9d414e : 00000000`00000000 00000000`0000001c 00000000`00000000 00000000`00000000 : nt!NtOpenKey+0x12
  165. fffff28c`241f72e0 fffff807`4b9c61e0 : fffff807`4bef8cdf 00000000`00000000 00000000`00501802 fffff28c`241f75e8 : nt!KiSystemServiceExitPico+0x2b9
  166. fffff28c`241f7478 fffff807`4bef8cdf : 00000000`00000000 00000000`00501802 fffff28c`241f75e8 00000000`00000001 : nt!KiServiceLinkage
  167. fffff28c`241f7480 fffff807`4bf663f4 : 00000000`00000010 00000000`00000030 ffff8e88`33ae20b0 00000000`000007b0 : nt!IopOpenRegistryKey+0x47
  168. fffff28c`241f7500 fffff807`4c05f1fb : ffff8e88`381eb040 00000000`0000007e ffff8e88`33ae2180 ffff8e88`33ae2150 : nt!IopUnloadDriver+0x9c
  169. fffff28c`241f7630 fffff807`4b9d414e : ffff8e88`293f87a8 ffff8e88`28f5b040 00000000`00000010 ffff8e88`293f8000 : nt!NtUnloadDriver+0xb
  170. fffff28c`241f7660 fffff807`4b9c61e0 : ffff8e88`33ae1b81 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2b9
  171. fffff28c`241f77f8 ffff8e88`33ae1b81 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
  172. fffff28c`241f7800 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffff8e88`33ae1b81
  173.  
  174.  
  175. THREAD_SHA1_HASH_MOD_FUNC: 582f55d910998f89d469872581c20d219223e869
  176.  
  177. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 03d21faac6329923c1e28c62ad9ad7b4b058e9ea
  178.  
  179. THREAD_SHA1_HASH_MOD: 82d14546c43bd06881f781d6d197c4c7f7ceb9cb
  180.  
  181. FOLLOWUP_IP:
  182. nt!KiDispatchException+18c383
  183. fffff807`4ba1a023 cc int 3
  184.  
  185. FAULT_INSTR_CODE: 86f741cc
  186.  
  187. SYMBOL_STACK_INDEX: 1
  188.  
  189. SYMBOL_NAME: nt!KiDispatchException+18c383
  190.  
  191. FOLLOWUP_NAME: MachineOwner
  192.  
  193. MODULE_NAME: nt
  194.  
  195. IMAGE_NAME: ntkrnlmp.exe
  196.  
  197. DEBUG_FLR_IMAGE_TIMESTAMP: 7530c6d3
  198.  
  199. STACK_COMMAND: .thread ; .cxr ; kb
  200.  
  201. BUCKET_ID_FUNC_OFFSET: 18c383
  202.  
  203. FAILURE_BUCKET_ID: 0x1E_c0000005_R_nt!KiDispatchException
  204.  
  205. BUCKET_ID: 0x1E_c0000005_R_nt!KiDispatchException
  206.  
  207. PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_R_nt!KiDispatchException
  208.  
  209. TARGET_TIME: 2020-08-18T17:42:34.000Z
  210.  
  211. OSBUILD: 18362
  212.  
  213. OSSERVICEPACK: 0
  214.  
  215. SERVICEPACK_NUMBER: 0
  216.  
  217. OS_REVISION: 0
  218.  
  219. SUITE_MASK: 272
  220.  
  221. PRODUCT_TYPE: 1
  222.  
  223. OSPLATFORM_TYPE: x64
  224.  
  225. OSNAME: Windows 10
  226.  
  227. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
  228.  
  229. OS_LOCALE:
  230.  
  231. USER_LCID: 0
  232.  
  233. OSBUILD_TIMESTAMP: 2032-04-21 05:28:19
  234.  
  235. BUILDDATESTAMP_STR: 190318-1202
  236.  
  237. BUILDLAB_STR: 19h1_release
  238.  
  239. BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
  240.  
  241. ANALYSIS_SESSION_ELAPSED_TIME: 6e8
  242.  
  243. ANALYSIS_SOURCE: KM
  244.  
  245. FAILURE_ID_HASH_STRING: km:0x1e_c0000005_r_nt!kidispatchexception
  246.  
  247. FAILURE_ID_HASH: {8cda4994-5937-8d70-909d-3f5236ba02c6}
  248.  
  249. Followup: MachineOwner
  250. ---------
  251.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement