Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 10.0.19494.1001 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Windows\Minidump\101519-7203-01.dmp]
- Mini Kernel Dump File: Only registers and stack trace are available
- ************* Path validation summary **************
- Response Time (ms) Location
- Deferred srv*
- Symbol search path is: srv*
- Executable search path is:
- Windows 10 Kernel Version 18362 MP (12 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Machine Name:
- Kernel base = 0xfffff800`48800000 PsLoadedModuleList = 0xfffff800`48c48210
- Debug session time: Tue Oct 15 16:21:35.565 2019 (UTC - 6:00)
- System Uptime: 0 days 0:47:18.310
- Loading Kernel Symbols
- ..
- Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
- Run !sym noisy before .reload to track down problems loading symbols.
- .............................................................
- ................................................................
- ................................................................
- .................
- Loading User Symbols
- Loading unloaded module list
- ..........
- For analysis of this file, run !analyze -v
- nt!KeBugCheckEx:
- fffff800`489c1220 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff848e`49415df0=000000000000003b
- 8: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- SYSTEM_SERVICE_EXCEPTION (3b)
- An exception happened while executing a system service routine.
- Arguments:
- Arg1: 00000000c0000005, Exception code that caused the bugcheck
- Arg2: fffff8005de5baa6, Address of the instruction which caused the bugcheck
- Arg3: ffff848e49416720, Address of the context record for the exception that caused the bugcheck
- Arg4: 0000000000000000, zero.
- Debugging Details:
- ------------------
- KEY_VALUES_STRING: 1
- Key : Analysis.CPU.Sec
- Value: 2
- Key : Analysis.DebugAnalysisProvider.CPP
- Value: Create: 8007007e on DESKTOP-1CBU1CD
- Key : Analysis.DebugData
- Value: CreateObject
- Key : Analysis.DebugModel
- Value: CreateObject
- Key : Analysis.Elapsed.Sec
- Value: 4
- Key : Analysis.Memory.CommitPeak.Mb
- Value: 78
- Key : Analysis.System
- Value: CreateObject
- DUMP_FILE_ATTRIBUTES: 0x8
- Kernel Generated Triage Dump
- BUGCHECK_CODE: 3b
- BUGCHECK_P1: c0000005
- BUGCHECK_P2: fffff8005de5baa6
- BUGCHECK_P3: ffff848e49416720
- BUGCHECK_P4: 0
- CONTEXT: ffff848e49416720 -- (.cxr 0xffff848e49416720)
- rax=0000000000000000 rbx=ffff9e88961f5080 rcx=e925b84a64500000
- rdx=ffffdc0bde5eb3a8 rsi=000001b6950a6740 rdi=0000000000000001
- rip=fffff8005de5baa6 rsp=ffff848e49417110 rbp=ffff848e49417a80
- r8=ffff848e494170e8 r9=00000000ffffffff r10=fffff80048838fa0
- r11=ffff848e494179e0 r12=0000000000002cd0 r13=000001b694f97220
- r14=ffffdc0bde5eb370 r15=00000000c000007b
- iopl=0 nv up ei pl zr na po nc
- cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
- dxgkrnl!NtNotifyPresentToCompositionSurface+0x2e6:
- fffff800`5de5baa6 38498b cmp byte ptr [rcx-75h],cl ds:002b:e925b84a`644fff8b=??
- Resetting default scope
- CUSTOMER_CRASH_COUNT: 1
- PROCESS_NAME: Wow.exe
- STACK_TEXT:
- ffff848e`49417110 fffff800`489d2b15 : ffff9e88`961f5080 ffff9e88`961f5080 000001b6`950a6740 00000000`00000020 : dxgkrnl!NtNotifyPresentToCompositionSurface+0x2e6
- ffff848e`49417a00 00007ffd`b3e877c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
- 0000000e`b9f9d958 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`b3e877c4
- CHKIMG_EXTENSION: !chkimg -lo 50 -db !dxgkrnl
- 10 errors : !dxgkrnl (fffff8005de5b9a4-fffff8005de5bafc)
- fffff8005de5b9a0 00 c0 4c 8b *de 24 38 48 8b 7c 24 50 *25 8b 64 24 ..L..$8H.|$P%.d$
- fffff8005de5b9b0 40 eb 06 41 *fe 0d 00 00 c0 4c 8b 15 14 16 06 00 @..A.....L......
- ...
- fffff8005de5baa0 8b 73 30 49 *b7 7b 38 49 8b e3 41 5f *8f 5e 41 5c .s0I.{8I..A_.^A\
- fffff8005de5bab0 c3 cc cc cc *f8 cc cc cc cc cc cc cc fc cc cc cc ................
- ...
- fffff8005de5bae0 5c 24 20 49 *7c 5b b0 33 f6 49 89 73 *02 49 21 5b \$ I|[.3.I.s.I![
- fffff8005de5baf0 c0 33 c0 49 *aa 43 d0 49 89 43 d8 49 *92 43 e0 48 .3.I.C.I.C.I.C.H
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- MEMORY_CORRUPTOR: STRIDE
- STACK_COMMAND: .cxr 0xffff848e49416720 ; kb
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_STRIDE
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- FAILURE_ID_HASH: {574dbc1b-92cb-fb09-cb7a-cacc1bb2c511}
- Followup: memory_corruption
- ---------
- NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.1910.3003.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\atlmfc.natvis'
- NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.1910.3003.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\concurrency.natvis'
- NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.1910.3003.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\cpp_rest.natvis'
- NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.1910.3003.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\stl.natvis'
- NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.1910.3003.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Data.Json.natvis'
- NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.1910.3003.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Geolocation.natvis'
- NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.1910.3003.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Sensors.natvis'
- NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.1910.3003.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Media.natvis'
- NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.1910.3003.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\windows.natvis'
- NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.1910.3003.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\winrt.natvis'
- NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.1910.3003.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Kernel.natvis'
- Microsoft (R) Windows Debugger Version 10.0.19494.1001 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Windows\Minidump\090919-8046-01.dmp]
- Could not open dump file [C:\Windows\Minidump\090919-8046-01.dmp], Win32 error 0n2
- "The system cannot find the file specified."
- Microsoft (R) Windows Debugger Version 10.0.19494.1001 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Windows\Minidump\101419-11156-01.dmp]
- Mini Kernel Dump File: Only registers and stack trace are available
- ************* Path validation summary **************
- Response Time (ms) Location
- Deferred srv*
- Symbol search path is: srv*
- Executable search path is:
- Windows 10 Kernel Version 18362 MP (12 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Machine Name:
- Kernel base = 0xfffff807`0e600000 PsLoadedModuleList = 0xfffff807`0ea48210
- Debug session time: Mon Oct 14 15:38:36.820 2019 (UTC - 6:00)
- System Uptime: 0 days 0:12:21.564
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- ................................................................
- .................
- Loading User Symbols
- Loading unloaded module list
- .........
- For analysis of this file, run !analyze -v
- nt!KeBugCheckEx:
- fffff807`0e7c1220 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffcd87`0b337420=0000000000000050
- 3: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- PAGE_FAULT_IN_NONPAGED_AREA (50)
- Invalid system memory was referenced. This cannot be protected by try-except.
- Typically the address is just plain bad or it is pointing at freed memory.
- Arguments:
- Arg1: fffff8c325e44d60, memory referenced.
- Arg2: 0000000000000010, value 0 = read operation, 1 = write operation.
- Arg3: fffff8c325e44d60, If non-zero, the instruction address which referenced the bad memory
- address.
- Arg4: 0000000000000002, (reserved)
- Debugging Details:
- ------------------
- Could not read faulting driver name
- KEY_VALUES_STRING: 1
- Key : Analysis.CPU.Sec
- Value: 1
- Key : Analysis.DebugAnalysisProvider.CPP
- Value: Create: 8007007e on DESKTOP-1CBU1CD
- Key : Analysis.DebugData
- Value: CreateObject
- Key : Analysis.DebugModel
- Value: CreateObject
- Key : Analysis.Elapsed.Sec
- Value: 1
- Key : Analysis.Memory.CommitPeak.Mb
- Value: 78
- Key : Analysis.System
- Value: CreateObject
- DUMP_FILE_ATTRIBUTES: 0x8
- Kernel Generated Triage Dump
- BUGCHECK_CODE: 50
- BUGCHECK_P1: fffff8c325e44d60
- BUGCHECK_P2: 10
- BUGCHECK_P3: fffff8c325e44d60
- BUGCHECK_P4: 2
- READ_ADDRESS: fffff8070eb733b8: Unable to get MiVisibleState
- Unable to get NonPagedPoolStart
- Unable to get NonPagedPoolEnd
- Unable to get PagedPoolStart
- Unable to get PagedPoolEnd
- fffff8070ea2a3c8: Unable to get Flags value from nt!KdVersionBlock
- fffff8070ea2a3c8: Unable to get Flags value from nt!KdVersionBlock
- unable to get nt!MmSpecialPagesInUse
- fffff8c325e44d60
- MM_INTERNAL_CODE: 2
- CUSTOMER_CRASH_COUNT: 1
- PROCESS_NAME: dwm.exe
- TRAP_FRAME: ffffcd870b3376c0 -- (.trap 0xffffcd870b3376c0)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=fffff8c325e44d60 rbx=0000000000000000 rcx=ffffe081d22f6a40
- rdx=ffffe081c81ea8a8 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff8c325e44d60 rsp=ffffcd870b337858 rbp=ffffcd870b3378d8
- r8=ffffcd870b337838 r9=00000000ffffffff r10=7ffffffffffffffc
- r11=ffffd002aa26a080 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl zr na po nc
- fffff8c3`25e44d60 ?? ???
- Resetting default scope
- FAILED_INSTRUCTION_ADDRESS:
- +0
- fffff8c3`25e44d60 ?? ???
- STACK_TEXT:
- ffffcd87`0b337418 fffff807`0e7e33d6 : 00000000`00000050 fffff8c3`25e44d60 00000000`00000010 ffffcd87`0b3376c0 : nt!KeBugCheckEx
- ffffcd87`0b337420 fffff807`0e672edf : ffffe081`d22ed000 00000000`00000010 00000000`00000000 fffff8c3`25e44d60 : nt!MiSystemFault+0x1d66a6
- ffffcd87`0b337520 fffff807`0e7cf320 : 00000000`0000057b 00000000`000000d0 ffffcd87`0b3379a8 00000000`00000064 : nt!MmAccessFault+0x34f
- ffffcd87`0b3376c0 fffff8c3`25e44d60 : ffff893c`eadf84cb 00000000`00000000 ffff8956`c0608ed0 00000000`00000001 : nt!KiPageFault+0x360
- ffffcd87`0b337858 ffff893c`eadf84cb : 00000000`00000000 ffff8956`c0608ed0 00000000`00000001 00000000`00000000 : 0xfffff8c3`25e44d60
- ffffcd87`0b337860 ffff893c`eadf8226 : ffffcd87`0b337a80 ffffcd87`0b3379a8 ffffcd87`0b337958 ffffe081`d22f6a40 : win32kbase!DirectComposition::CConnection::BeginFrame+0x1fb
- ffffcd87`0b337920 fffff807`0e7d2b15 : 00000000`000001fc ffffd002`aa26a080 00000000`000003e8 000001fe`83a9d420 : win32kbase!NtDCompositionBeginFrame+0x196
- ffffcd87`0b337a00 00007ffe`82f13404 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
- 000000e1`44a9f538 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`82f13404
- SYMBOL_NAME: win32kbase!DirectComposition::CConnection::BeginFrame+1fb
- MODULE_NAME: win32kbase
- IMAGE_NAME: win32kbase.sys
- IMAGE_VERSION: 10.0.18362.418
- STACK_COMMAND: .thread ; .cxr ; kb
- BUCKET_ID_FUNC_OFFSET: 1fb
- FAILURE_BUCKET_ID: AV_INVALID_BAD_IP_win32kbase!DirectComposition::CConnection::BeginFrame
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- FAILURE_ID_HASH: {c40542bf-cb23-3a7f-7278-fff0840dfa4d}
- Followup: MachineOwner
- ---------
Add Comment
Please, Sign In to add comment