Guest User

Untitled

a guest
Apr 9th, 2023
45
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.60 KB | None | 0 0
  1.  
  2. Microsoft (R) Windows Debugger Version 10.0.22621.755 AMD64
  3. Copyright (c) Microsoft Corporation. All rights reserved.
  4.  
  5. Using NET for debugging
  6. Opened WinSock 2.0
  7. Waiting to reconnect...
  8. You can get the target MAC address by running .kdtargetmac command.
  9. Connected to Windows 10 22621 x64 target at (Mon Apr 10 03:17:16.844 2023 (UTC + 2:00)), ptr64 TRUE
  10. Kernel Debugger connection established.
  11. Symbol search path is: srv*
  12. Executable search path is:
  13. Windows 10 Kernel Version 22621 MP (1 procs) Free x64
  14. Edition build lab: 22621.1.amd64fre.ni_release.220506-1250
  15. Machine Name:
  16. Kernel base = 0xfffff805`06600000 PsLoadedModuleList = 0xfffff805`07213430
  17. System Uptime: 0 days 0:00:00.908
  18. KDTARGET: Refreshing KD connection
  19. Access violation - code c0000005 (!!! second chance !!!)
  20. nt!ExpInterlockedPushEntrySList+0xd:
  21. fffff805`06a334ad 498b02 mov rax,qword ptr [r10]
  22. 1: kd> !analyze -v
  23. Connected to Windows 10 22621 x64 target at (Mon Apr 10 03:19:57.923 2023 (UTC + 2:00)), ptr64 TRUE
  24. Loading Kernel Symbols
  25. ...............................................................
  26. ................................................................
  27. .........................................................
  28. Loading User Symbols
  29.  
  30. Loading unloaded module list
  31. .......
  32. *******************************************************************************
  33. * *
  34. * Bugcheck Analysis *
  35. * *
  36. *******************************************************************************
  37.  
  38. Unknown bugcheck code (0)
  39. Unknown bugcheck description
  40. Arguments:
  41. Arg1: 0000000000000000
  42. Arg2: 0000000000000000
  43. Arg3: 0000000000000000
  44. Arg4: 0000000000000000
  45.  
  46. Debugging Details:
  47. ------------------
  48.  
  49.  
  50. KEY_VALUES_STRING: 1
  51.  
  52. Key : AV.Dereference
  53. Value: NullPtr
  54.  
  55. Key : AV.Fault
  56. Value: Read
  57.  
  58. Key : Analysis.CPU.mSec
  59. Value: 2718
  60.  
  61. Key : Analysis.DebugAnalysisManager
  62. Value: Create
  63.  
  64. Key : Analysis.Elapsed.mSec
  65. Value: 63841
  66.  
  67. Key : Analysis.Init.CPU.mSec
  68. Value: 1999
  69.  
  70. Key : Analysis.Init.Elapsed.mSec
  71. Value: 167540
  72.  
  73. Key : Analysis.Memory.CommitPeak.Mb
  74. Value: 83
  75.  
  76. Key : WER.OS.Branch
  77. Value: ni_release
  78.  
  79. Key : WER.OS.Timestamp
  80. Value: 2022-05-06T12:50:00Z
  81.  
  82. Key : WER.OS.Version
  83. Value: 10.0.22621.1
  84.  
  85.  
  86. BUGCHECK_CODE: 0
  87.  
  88. BUGCHECK_P1: 0
  89.  
  90. BUGCHECK_P2: 0
  91.  
  92. BUGCHECK_P3: 0
  93.  
  94. BUGCHECK_P4: 0
  95.  
  96. PROCESS_NAME: System
  97.  
  98. READ_ADDRESS: 0000000000000000
  99.  
  100. ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  101.  
  102. EXCEPTION_CODE_STR: c0000005
  103.  
  104. EXCEPTION_PARAMETER1: 0000000000000000
  105.  
  106. EXCEPTION_PARAMETER2: 0000000000000000
  107.  
  108. STACK_TEXT:
  109. ffffa70a`22087638 fffff805`068f51b9 : fffff805`278c105f fffff805`06600000 00000000`01047000 fffff805`278c1a20 : nt!ExpInterlockedPushEntrySList+0xd
  110. ffffa70a`22087648 00000000`00000000 : ffffe301`786ff000 fffff805`068f519c 00000000`01047000 fffff805`06600000 : nt!KeAllocateInterrupt+0x89
  111.  
  112.  
  113. SYMBOL_NAME: nt!ExpInterlockedPushEntrySList+d
  114.  
  115. MODULE_NAME: nt
  116.  
  117. IMAGE_NAME: ntkrnlmp.exe
  118.  
  119. STACK_COMMAND: .cxr; .ecxr ; kb
  120.  
  121. BUCKET_ID_FUNC_OFFSET: d
  122.  
  123. FAILURE_BUCKET_ID: ACCESS_VIOLATION_nt!ExpInterlockedPushEntrySList
  124.  
  125. OS_VERSION: 10.0.22621.1
  126.  
  127. BUILDLAB_STR: ni_release
  128.  
  129. OSPLATFORM_TYPE: x64
  130.  
  131. OSNAME: Windows 10
  132.  
  133. FAILURE_ID_HASH: {bf933696-8d93-97e5-92d7-700b9d51efd0}
  134.  
  135. Followup: MachineOwner
  136. ---------
  137.  
  138.  
Advertisement
Add Comment
Please, Sign In to add comment