Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Loading Dump File [C:\Windows\Minidump\010820-35093-01.dmp]
- Mini Kernel Dump File: Only registers and stack trace are available
- Symbol search path is: srv*
- Executable search path is:
- Windows 10 Kernel Version 18362 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- 18362.1.amd64fre.19h1_release.190318-1202
- Machine Name:
- Kernel base = 0xfffff800`3ea00000 PsLoadedModuleList = 0xfffff800`3ee48170
- Debug session time: Wed Jan 8 20:18:02.868 2020 (UTC + 4:00)
- System Uptime: 0 days 1:05:09.627
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- ................................................
- Loading User Symbols
- Loading unloaded module list
- .....
- For analysis of this file, run !analyze -v
- nt!KeBugCheckEx:
- fffff800`3ebc14e0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffca03`ec8aeac0=0000000000000001
- 3: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- APC_INDEX_MISMATCH (1)
- This is a kernel internal error. The most common reason to see this
- bugcheck is when a filesystem or a driver has a mismatched number of
- calls to disable and re-enable APCs. The key data item is the
- Thread->CombinedApcDisable field. This consists of two separate 16-bit
- fields, the SpecialApcDisable and the KernelApcDisable. A negative value
- of either indicates that a driver has disabled special or normal APCs
- (respectively) without re-enabling them; a positive value indicates that
- a driver has enabled special or normal APCs (respectively) too many times.
- Arguments:
- Arg1: 00007ffe1d3156a4, Address of system call function or worker routine
- Arg2: 0000000000000000, Thread->ApcStateIndex
- Arg3: 000000000000ffff, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
- Arg4: ffffca03ec8aec80, Call type (0 - system call, 1 - worker routine)
- Debugging Details:
- ------------------
- KEY_VALUES_STRING: 1
- Key : Analysis.CPU.Sec
- Value: 4
- Key : Analysis.DebugAnalysisProvider.CPP
- Value: Create: 8007007e on DESKTOP-VN20H4U
- Key : Analysis.DebugData
- Value: CreateObject
- Key : Analysis.DebugModel
- Value: CreateObject
- Key : Analysis.Elapsed.Sec
- Value: 16
- Key : Analysis.Memory.CommitPeak.Mb
- Value: 68
- Key : Analysis.System
- Value: CreateObject
- ADDITIONAL_XML: 1
- BUGCHECK_CODE: 1
- BUGCHECK_P1: 7ffe1d3156a4
- BUGCHECK_P2: 0
- BUGCHECK_P3: ffff
- BUGCHECK_P4: ffffca03ec8aec80
- BLACKBOXBSD: 1 (!blackboxbsd)
- BLACKBOXNTFS: 1 (!blackboxntfs)
- BLACKBOXWINLOGON: 1
- CUSTOMER_CRASH_COUNT: 1
- PROCESS_NAME: chrome.exe
- STACK_TEXT:
- ffffca03`ec8aeab8 fffff800`3ebd32e9 : 00000000`00000001 00007ffe`1d3156a4 00000000`00000000 00000000`0000ffff : nt!KeBugCheckEx
- ffffca03`ec8aeac0 fffff800`3ebd3193 : ffffce01`ba933080 ffffce01`ba933080 00000000`00000000 ffffffff`ff676980 : nt!KiBugCheckDispatch+0x69
- ffffca03`ec8aec00 00007ffe`1d3156a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x1fe
- 000000e6`159fd8b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`1d3156a4
- SYMBOL_NAME: nt!KiSystemServiceExitPico+1fe
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- IMAGE_VERSION: 10.0.18362.476
- STACK_COMMAND: .thread ; .cxr ; kb
- BUCKET_ID_FUNC_OFFSET: 1fe
- FAILURE_BUCKET_ID: 0x1_SysCallNum_1233_nt!KiSystemServiceExitPico
- OS_VERSION: 10.0.18362.1
- BUILDLAB_STR: 19h1_release
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- FAILURE_ID_HASH: {6b317e3f-d7bc-3b92-ec05-dc8c5814e9f4}
- Followup: MachineOwner
- ---------
Add Comment
Please, Sign In to add comment