Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Loading Dump File [C:UsersLoverDesktopdumpsnvcontainer.exe_200126_135320.dmp]
- User Mini Dump File with Full Memory: Only application data is available
- Comment: '
- *** "C:Program FilesSysinternalsSuiteprocdump.exe" -accepteula -ma -j "C:UsersLoverDesktopdumps" 7644 156 00000000002F0000
- *** Just-In-Time debugger. PID: 7644 Event Handle: 156 JIT Context: .jdinfo 0x2f0000'
- Symbol search path is: C:Symbols;srv*C:Symbols*https://msdl.microsoft.com/download/symbols
- Executable search path is:
- Windows 7 Version 7601 (Service Pack 1) MP (4 procs) Free x64
- Product: WinNt, suite: SingleUserTS
- Machine Name:
- Debug session time: Sun Jan 26 13:53:20.000 2020 (UTC - 8:00)
- System Uptime: 0 days 0:02:21.553
- Process Uptime: not available
- ...........................
- Loading unloaded module list
- .....................
- This dump file has an exception of interest stored in it.
- The stored exception information can be accessed via .ecxr.
- (1ddc.2570): Access violation - code c0000005 (first/second chance not available)
- ntdll!ZwWaitForMultipleObjects+0xa:
- 00000000`7779186a c3 ret
- 0:000> !analyze -v
- *******************************************************************************
- * *
- * Exception Analysis *
- * *
- *******************************************************************************
- *** ERROR: Module load completed but symbols could not be loaded for nvcontainer.exe
- FAULTING_IP:
- LvHook64+83b64
- 00000001`80083b64 ?? ???
- EXCEPTION_RECORD: ffffffffffffffff -- (.exr 0xffffffffffffffff)
- ExceptionAddress: 0000000180083b64 (<Unloaded_LvHook64.dll>+0x0000000000083b64)
- ExceptionCode: c0000005 (Access violation)
- ExceptionFlags: 00000000
- NumberParameters: 2
- Parameter[0]: 0000000000000008
- Parameter[1]: 0000000180083b64
- Attempt to execute non-executable address 0000000180083b64
- PROCESS_NAME: nvcontainer.exe
- ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
- EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
- EXCEPTION_PARAMETER1: 0000000000000008
- EXCEPTION_PARAMETER2: 0000000180083b64
- WRITE_ADDRESS: 0000000180083b64
- FOLLOWUP_IP:
- LvHook64+83b64
- 00000001`80083b64 ?? ???
- MOD_LIST: <ANALYSIS/>
- NTGLOBALFLAG: 0
- APPLICATION_VERIFIER_FLAGS: 0
- FAULTING_THREAD: 0000000000002570
- BUGCHECK_STR: APPLICATION_FAULT_BAD_INSTRUCTION_PTR_SOFTWARE_NX_FAULT_INVALID
- PRIMARY_PROBLEM_CLASS: BAD_INSTRUCTION_PTR_INVALID
- DEFAULT_BUCKET_ID: BAD_INSTRUCTION_PTR_INVALID
- LAST_CONTROL_TRANSFER: from 000000007776b8b4 to 0000000180083b64
- STACK_TEXT:
- 00000000`0016fbd8 00000000`7776b8b4 : 00000000`02326d40 00000000`00000000 00000000`00000000 00000000`0000000a : <Unloaded_LvHook64.dll>+0x83b64
- 00000000`0016fbe0 00000000`77764279 : 00000000`0016fdf0 00000000`00000000 000007ff`fffdf000 00000000`00000000 : ntdll!RtlProcessFlsData+0x84
- 00000000`0016fc20 00000000`777641b0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!LdrShutdownProcess+0xa9
- 00000000`0016fd40 00000001`3f72a6f9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlExitUserProcess+0x90
- 00000000`0016fd70 00000001`3f72a6af : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`0016fdc4 : nvcontainer+0x5a6f9
- 00000000`0016fda0 00000001`3f6f434c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000001 : nvcontainer+0x5a6af
- 00000000`0016fe00 00000000`7753652d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nvcontainer+0x2434c
- 00000000`0016fe40 00000000`7776c541 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : kernel32!BaseThreadInitThunk+0xd
- 00000000`0016fe70 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x1d
- STACK_COMMAND: ~0s; .ecxr ; kb
- SYMBOL_STACK_INDEX: 0
- SYMBOL_NAME: lvhook64!unloaded+83b64
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: LvHook64
- IMAGE_NAME: LvHook64.dll
- DEBUG_FLR_IMAGE_TIMESTAMP: 4ef99ce6
- FAILURE_BUCKET_ID: BAD_INSTRUCTION_PTR_INVALID_c0000005_LvHook64.dll!unloaded
- BUCKET_ID: X64_APPLICATION_FAULT_BAD_INSTRUCTION_PTR_SOFTWARE_NX_FAULT_INVALID_lvhook64!unloaded+83b64
- Followup: MachineOwner
- ---------
Add Comment
Please, Sign In to add comment