Advertisement
Guest User

Untitled

a guest
May 2nd, 2024
40
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.29 KB | None | 0 0
  1. *******************************************************************************
  2. * *
  3. * Exception Analysis *
  4. * *
  5. *******************************************************************************
  6.  
  7.  
  8. KEY_VALUES_STRING: 1
  9.  
  10. Key : AV.Dereference
  11. Value: NullClassPtr
  12.  
  13. Key : AV.Fault
  14. Value: Read
  15.  
  16. Key : Analysis.CPU.mSec
  17. Value: 1265
  18.  
  19. Key : Analysis.Elapsed.mSec
  20. Value: 21645
  21.  
  22. Key : Analysis.IO.Other.Mb
  23. Value: 35
  24.  
  25. Key : Analysis.IO.Read.Mb
  26. Value: 0
  27.  
  28. Key : Analysis.IO.Write.Mb
  29. Value: 48
  30.  
  31. Key : Analysis.Init.CPU.mSec
  32. Value: 218
  33.  
  34. Key : Analysis.Init.Elapsed.mSec
  35. Value: 12259
  36.  
  37. Key : Analysis.Memory.CommitPeak.Mb
  38. Value: 89
  39.  
  40. Key : Failure.Bucket
  41. Value: NULL_CLASS_PTR_READ_c0000005_plutonium-bootstrapper-win32.exe!Unknown
  42.  
  43. Key : Failure.Hash
  44. Value: {2444a9ef-94d9-1c25-c91c-7f8756c05b15}
  45.  
  46. Key : Timeline.OS.Boot.DeltaSec
  47. Value: 23441
  48.  
  49. Key : Timeline.Process.Start.DeltaSec
  50. Value: 101
  51.  
  52. Key : WER.OS.Branch
  53. Value: vb_release
  54.  
  55. Key : WER.OS.Version
  56. Value: 10.0.19041.1
  57.  
  58. Key : WER.Process.Version
  59. Value: 1.0.0.1
  60.  
  61.  
  62. FILE_IN_CAB: plutonium-r4035-t6mp-2024-05-02_08-18-29.dmp
  63.  
  64. NTGLOBALFLAG: 0
  65.  
  66. CONTEXT: (.ecxr)
  67. eax=00000000 ebx=00000000 ecx=4d032728 edx=4d017f38 esi=4ff963a0 edi=4d032f30
  68. eip=0054162c esp=0019dc04 ebp=4d0522c0 iopl=0 nv up ei pl zr na pe nc
  69. cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010246
  70. plutonium_bootstrapper_win32+0x14162c:
  71. 0054162c 668b4806 mov cx,word ptr [eax+6] ds:002b:00000006=????
  72. Resetting default scope
  73.  
  74. EXCEPTION_RECORD: (.exr -1)
  75. ExceptionAddress: 0054162c (plutonium_bootstrapper_win32+0x0014162c)
  76. ExceptionCode: c0000005 (Access violation)
  77. ExceptionFlags: 00000000
  78. NumberParameters: 2
  79. Parameter[0]: 00000000
  80. Parameter[1]: 00000006
  81. Attempt to read from address 00000006
  82.  
  83. PROCESS_NAME: plutonium-bootstrapper-win32.exe
  84.  
  85. READ_ADDRESS: 00000006
  86.  
  87. ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  88.  
  89. EXCEPTION_CODE_STR: c0000005
  90.  
  91. EXCEPTION_PARAMETER1: 00000000
  92.  
  93. EXCEPTION_PARAMETER2: 00000006
  94.  
  95. STACK_TEXT:
  96. WARNING: Stack unwind information not available. Following frames may be wrong.
  97. 0019dc04 007d27ed 00000000 4ff963a0 00000001 plutonium_bootstrapper_win32+0x14162c
  98. 0019dc4c 007077ab 00000000 4ff963a0 4d032728 plutonium_bootstrapper_win32+0x3d27ed
  99. 00000000 00000000 00000000 00000000 00000000 plutonium_bootstrapper_win32+0x3077ab
  100.  
  101.  
  102. STACK_COMMAND: ~0s; .ecxr ; kb
  103.  
  104. SYMBOL_NAME: plutonium_bootstrapper_win32+14162c
  105.  
  106. MODULE_NAME: plutonium_bootstrapper_win32
  107.  
  108. IMAGE_NAME: plutonium-bootstrapper-win32.exe
  109.  
  110. FAILURE_BUCKET_ID: NULL_CLASS_PTR_READ_c0000005_plutonium-bootstrapper-win32.exe!Unknown
  111.  
  112. OS_VERSION: 10.0.19041.1
  113.  
  114. BUILDLAB_STR: vb_release
  115.  
  116. OSPLATFORM_TYPE: x86
  117.  
  118. OSNAME: Windows 10
  119.  
  120. IMAGE_VERSION: 1.0.0.1
  121.  
  122. FAILURE_ID_HASH: {2444a9ef-94d9-1c25-c91c-7f8756c05b15}
  123.  
  124. Followup: MachineOwner
  125. ---------
  126.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement