Foxtrod89

Command - Dump C:UsersLoverDesktopdumpsnvcontainer.exe_200126_135320.dmp - WinDbg:6.12.0002.633 AMD64

Jan 26th, 2020
547
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.55 KB | None | 0 0
  1.  
  2. Loading Dump File [C:UsersLoverDesktopdumpsnvcontainer.exe_200126_135320.dmp]
  3. User Mini Dump File with Full Memory: Only application data is available
  4.  
  5. Comment: '
  6. *** "C:Program FilesSysinternalsSuiteprocdump.exe" -accepteula -ma -j "C:UsersLoverDesktopdumps" 7644 156 00000000002F0000
  7. *** Just-In-Time debugger. PID: 7644 Event Handle: 156 JIT Context: .jdinfo 0x2f0000'
  8. Symbol search path is: C:Symbols;srv*C:Symbols*https://msdl.microsoft.com/download/symbols
  9. Executable search path is:
  10. Windows 7 Version 7601 (Service Pack 1) MP (4 procs) Free x64
  11. Product: WinNt, suite: SingleUserTS
  12. Machine Name:
  13. Debug session time: Sun Jan 26 13:53:20.000 2020 (UTC - 8:00)
  14. System Uptime: 0 days 0:02:21.553
  15. Process Uptime: not available
  16. ...........................
  17. Loading unloaded module list
  18. .....................
  19. This dump file has an exception of interest stored in it.
  20. The stored exception information can be accessed via .ecxr.
  21. (1ddc.2570): Access violation - code c0000005 (first/second chance not available)
  22. ntdll!ZwWaitForMultipleObjects+0xa:
  23. 00000000`7779186a c3 ret
  24. 0:000> !analyze -v
  25. *******************************************************************************
  26. * *
  27. * Exception Analysis *
  28. * *
  29. *******************************************************************************
  30.  
  31. *** ERROR: Module load completed but symbols could not be loaded for nvcontainer.exe
  32.  
  33. FAULTING_IP:
  34. LvHook64+83b64
  35. 00000001`80083b64 ?? ???
  36.  
  37. EXCEPTION_RECORD: ffffffffffffffff -- (.exr 0xffffffffffffffff)
  38. ExceptionAddress: 0000000180083b64 (<Unloaded_LvHook64.dll>+0x0000000000083b64)
  39. ExceptionCode: c0000005 (Access violation)
  40. ExceptionFlags: 00000000
  41. NumberParameters: 2
  42. Parameter[0]: 0000000000000008
  43. Parameter[1]: 0000000180083b64
  44. Attempt to execute non-executable address 0000000180083b64
  45.  
  46. PROCESS_NAME: nvcontainer.exe
  47.  
  48. ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
  49.  
  50. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
  51.  
  52. EXCEPTION_PARAMETER1: 0000000000000008
  53.  
  54. EXCEPTION_PARAMETER2: 0000000180083b64
  55.  
  56. WRITE_ADDRESS: 0000000180083b64
  57.  
  58. FOLLOWUP_IP:
  59. LvHook64+83b64
  60. 00000001`80083b64 ?? ???
  61.  
  62. MOD_LIST: <ANALYSIS/>
  63.  
  64. NTGLOBALFLAG: 0
  65.  
  66. APPLICATION_VERIFIER_FLAGS: 0
  67.  
  68. FAULTING_THREAD: 0000000000002570
  69.  
  70. BUGCHECK_STR: APPLICATION_FAULT_BAD_INSTRUCTION_PTR_SOFTWARE_NX_FAULT_INVALID
  71.  
  72. PRIMARY_PROBLEM_CLASS: BAD_INSTRUCTION_PTR_INVALID
  73.  
  74. DEFAULT_BUCKET_ID: BAD_INSTRUCTION_PTR_INVALID
  75.  
  76. LAST_CONTROL_TRANSFER: from 000000007776b8b4 to 0000000180083b64
  77.  
  78. STACK_TEXT:
  79. 00000000`0016fbd8 00000000`7776b8b4 : 00000000`02326d40 00000000`00000000 00000000`00000000 00000000`0000000a : <Unloaded_LvHook64.dll>+0x83b64
  80. 00000000`0016fbe0 00000000`77764279 : 00000000`0016fdf0 00000000`00000000 000007ff`fffdf000 00000000`00000000 : ntdll!RtlProcessFlsData+0x84
  81. 00000000`0016fc20 00000000`777641b0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!LdrShutdownProcess+0xa9
  82. 00000000`0016fd40 00000001`3f72a6f9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlExitUserProcess+0x90
  83. 00000000`0016fd70 00000001`3f72a6af : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`0016fdc4 : nvcontainer+0x5a6f9
  84. 00000000`0016fda0 00000001`3f6f434c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000001 : nvcontainer+0x5a6af
  85. 00000000`0016fe00 00000000`7753652d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nvcontainer+0x2434c
  86. 00000000`0016fe40 00000000`7776c541 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : kernel32!BaseThreadInitThunk+0xd
  87. 00000000`0016fe70 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x1d
  88.  
  89.  
  90. STACK_COMMAND: ~0s; .ecxr ; kb
  91.  
  92. SYMBOL_STACK_INDEX: 0
  93.  
  94. SYMBOL_NAME: lvhook64!unloaded+83b64
  95.  
  96. FOLLOWUP_NAME: MachineOwner
  97.  
  98. MODULE_NAME: LvHook64
  99.  
  100. IMAGE_NAME: LvHook64.dll
  101.  
  102. DEBUG_FLR_IMAGE_TIMESTAMP: 4ef99ce6
  103.  
  104. FAILURE_BUCKET_ID: BAD_INSTRUCTION_PTR_INVALID_c0000005_LvHook64.dll!unloaded
  105.  
  106. BUCKET_ID: X64_APPLICATION_FAULT_BAD_INSTRUCTION_PTR_SOFTWARE_NX_FAULT_INVALID_lvhook64!unloaded+83b64
  107.  
  108. Followup: MachineOwner
  109. ---------
Add Comment
Please, Sign In to add comment