Advertisement
Guest User

Dumo_04-06-19

a guest
Jun 4th, 2019
128
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.70 KB | None | 0 0
  1. Microsoft (R) Windows Debugger Version 10.0.18869.1002 AMD64
  2. Copyright (c) Microsoft Corporation. All rights reserved.
  3.  
  4.  
  5. Loading Dump File [C:\WINDOWS\MEMORY.DMP]
  6. Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
  7.  
  8.  
  9. ************* Path validation summary **************
  10. Response Time (ms) Location
  11. Deferred srv*
  12. Symbol search path is: srv*
  13. Executable search path is:
  14. Windows 10 Kernel Version 17763 MP (12 procs) Free x64
  15. Product: WinNt, suite: TerminalServer SingleUserTS
  16. Built by: 17763.1.amd64fre.rs5_release.180914-1434
  17. Machine Name:
  18. Kernel base = 0xfffff807`4b400000 PsLoadedModuleList = 0xfffff807`4b81b5d0
  19. Debug session time: Tue Jun 4 22:42:21.005 2019 (UTC + 2:00)
  20. System Uptime: 0 days 1:36:06.745
  21. Loading Kernel Symbols
  22. ...............................................................
  23. .................Page 7f8fff not present in the dump file. Type ".hh dbgerr004" for details
  24. ...............................................
  25. ................................................................
  26. ..........
  27. Loading User Symbols
  28. PEB is paged out (Peb.Ldr = 00000000`00208018). Type ".hh dbgerr001" for details
  29. Loading unloaded module list
  30. ...................................
  31. For analysis of this file, run !analyze -v
  32. nt!KeBugCheckEx:
  33. fffff807`4b5b3ef0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffffa8c`3ea02530=000000000000003b
  34. 7: kd> !analyze -v
  35. *******************************************************************************
  36. * *
  37. * Bugcheck Analysis *
  38. * *
  39. *******************************************************************************
  40.  
  41. SYSTEM_SERVICE_EXCEPTION (3b)
  42. An exception happened while executing a system service routine.
  43. Arguments:
  44. Arg1: 00000000c0000005, Exception code that caused the bugcheck
  45. Arg2: fffff8074ba11d29, Address of the instruction which caused the bugcheck
  46. Arg3: fffffa8c3ea02e60, Address of the context record for the exception that caused the bugcheck
  47. Arg4: 0000000000000000, zero.
  48.  
  49. Debugging Details:
  50. ------------------
  51.  
  52.  
  53. KEY_VALUES_STRING: 1
  54.  
  55. Key : Analysis.CPU.Sec
  56. Value: 3
  57.  
  58. Key : Analysis.Elapsed.Sec
  59. Value: 4
  60.  
  61. Key : Analysis.Memory.CommitPeak.Mb
  62. Value: 61
  63.  
  64.  
  65. PROCESSES_ANALYSIS: 1
  66.  
  67. SERVICE_ANALYSIS: 1
  68.  
  69. STACKHASH_ANALYSIS: 1
  70.  
  71. TIMELINE_ANALYSIS: 1
  72.  
  73.  
  74. DUMP_CLASS: 1
  75.  
  76. DUMP_QUALIFIER: 401
  77.  
  78. BUILD_VERSION_STRING: 17763.1.amd64fre.rs5_release.180914-1434
  79.  
  80. SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
  81.  
  82. SYSTEM_PRODUCT_NAME: X470 AORUS ULTRA GAMING
  83.  
  84. SYSTEM_SKU: Default string
  85.  
  86. SYSTEM_VERSION: Default string
  87.  
  88. BIOS_VENDOR: American Megatrends Inc.
  89.  
  90. BIOS_VERSION: F31
  91.  
  92. BIOS_DATE: 05/06/2019
  93.  
  94. BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
  95.  
  96. BASEBOARD_PRODUCT: X470 AORUS ULTRA GAMING-CF
  97.  
  98. BASEBOARD_VERSION: Default string
  99.  
  100. DUMP_TYPE: 1
  101.  
  102. BUGCHECK_P1: c0000005
  103.  
  104. BUGCHECK_P2: fffff8074ba11d29
  105.  
  106. BUGCHECK_P3: fffffa8c3ea02e60
  107.  
  108. BUGCHECK_P4: 0
  109.  
  110. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%p verwies auf Arbeitsspeicher bei 0x%p. Der Vorgang %s konnte im Arbeitsspeicher nicht durchgef hrt werden.
  111.  
  112. FAULTING_IP:
  113. nt!AlpcpReceiveSynchronousReply+119
  114. fffff807`4ba11d29 488b6c2470 mov rbp,qword ptr [rsp+70h]
  115.  
  116. CONTEXT: fffffa8c3ea02e60 -- (.cxr 0xfffffa8c3ea02e60)
  117. rax=0000000000000020 rbx=000000000a7d3f38 rcx=a0c2281d2bc70000
  118. rdx=0000000000000001 rsi=fffffa8c3ea038f8 rdi=0000000000000000
  119. rip=fffff8074ba11d29 rsp=fffffa8c3ea03850 rbp=ffffd4850cbd1080
  120. r8=0000000000000001 r9=7ffff8074b81bab8 r10=7ffffffffffffffc
  121. r11=0000000000000000 r12=0000000000000000 r13=ffffd4850c6c0c80
  122. r14=000000007e000000 r15=ffffd4850c6c0c80
  123. iopl=0 nv up ei ng nz na po nc
  124. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
  125. nt!AlpcpReceiveSynchronousReply+0x119:
  126. fffff807`4ba11d29 488b6c2470 mov rbp,qword ptr [rsp+70h] ss:0018:fffffa8c`3ea038c0=0000000022843a48
  127. Resetting default scope
  128.  
  129. BUGCHECK_STR: 0x3B_c0000005
  130.  
  131. CPU_COUNT: c
  132.  
  133. CPU_MHZ: e10
  134.  
  135. CPU_VENDOR: AuthenticAMD
  136.  
  137. CPU_FAMILY: 17
  138.  
  139. CPU_MODEL: 1
  140.  
  141. CPU_STEPPING: 1
  142.  
  143. BLACKBOXBSD: 1 (!blackboxbsd)
  144.  
  145.  
  146. BLACKBOXPNP: 1 (!blackboxpnp)
  147.  
  148.  
  149. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  150.  
  151. PROCESS_NAME: Wow.exe
  152.  
  153. CURRENT_IRQL: 0
  154.  
  155. ANALYSIS_SESSION_HOST: DESKTOP-OVERTRY
  156.  
  157. ANALYSIS_SESSION_TIME: 06-04-2019 22:49:30.0679
  158.  
  159. ANALYSIS_VERSION: 10.0.18869.1002 amd64fre
  160.  
  161. LAST_CONTROL_TRANSFER: from fffff8074ba1182f to fffff8074ba11d29
  162.  
  163. STACK_TEXT:
  164. fffffa8c`3ea03850 fffff807`4ba1182f : fffffa8c`3ea03820 00000000`0a7d3f38 00000000`22843a48 00000000`7e000000 : nt!AlpcpReceiveSynchronousReply+0x119
  165. fffffa8c`3ea038b0 fffff807`4ba0f802 : ffffd485`0c6c0c80 ffffa653`c0020000 00000000`22843a48 00000000`0a7d3f38 : nt!AlpcpProcessSynchronousRequest+0x34f
  166. fffffa8c`3ea039d0 fffff807`4b5c5088 : ffffd485`0cbd1080 fffffa8c`3ea03b80 00000000`0009e5c8 fffffa8c`3ea03aa8 : nt!NtAlpcSendWaitReceivePort+0x1e2
  167. fffffa8c`3ea03a90 00007ffd`e3640894 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
  168. 00000000`0009e5a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`e3640894
  169.  
  170.  
  171. THREAD_SHA1_HASH_MOD_FUNC: 8e3828ddfd60e1eaee661b7dacaefe6696669028
  172.  
  173. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: becaec470ec2559d4729be95ca11a4506b2df9d7
  174.  
  175. THREAD_SHA1_HASH_MOD: d084f7dfa548ce4e51810e4fd5914176ebc66791
  176.  
  177. FOLLOWUP_IP:
  178. nt!AlpcpReceiveSynchronousReply+119
  179. fffff807`4ba11d29 488b6c2470 mov rbp,qword ptr [rsp+70h]
  180.  
  181. FAULT_INSTR_CODE: 246c8b48
  182.  
  183. SYMBOL_STACK_INDEX: 0
  184.  
  185. SYMBOL_NAME: nt!AlpcpReceiveSynchronousReply+119
  186.  
  187. FOLLOWUP_NAME: MachineOwner
  188.  
  189. MODULE_NAME: nt
  190.  
  191. IMAGE_NAME: ntkrnlmp.exe
  192.  
  193. DEBUG_FLR_IMAGE_TIMESTAMP: 7fd0bac2
  194.  
  195. STACK_COMMAND: .cxr 0xfffffa8c3ea02e60 ; kb
  196.  
  197. BUCKET_ID_FUNC_OFFSET: 119
  198.  
  199. FAILURE_BUCKET_ID: 0x3B_c0000005_nt!AlpcpReceiveSynchronousReply
  200.  
  201. BUCKET_ID: 0x3B_c0000005_nt!AlpcpReceiveSynchronousReply
  202.  
  203. PRIMARY_PROBLEM_CLASS: 0x3B_c0000005_nt!AlpcpReceiveSynchronousReply
  204.  
  205. TARGET_TIME: 2019-06-04T20:42:21.000Z
  206.  
  207. OSBUILD: 17763
  208.  
  209. OSSERVICEPACK: 0
  210.  
  211. SERVICEPACK_NUMBER: 0
  212.  
  213. OS_REVISION: 0
  214.  
  215. SUITE_MASK: 272
  216.  
  217. PRODUCT_TYPE: 1
  218.  
  219. OSPLATFORM_TYPE: x64
  220.  
  221. OSNAME: Windows 10
  222.  
  223. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
  224.  
  225. OS_LOCALE:
  226.  
  227. USER_LCID: 0
  228.  
  229. OSBUILD_TIMESTAMP: 2037-12-14 07:42:10
  230.  
  231. BUILDDATESTAMP_STR: 180914-1434
  232.  
  233. BUILDLAB_STR: rs5_release
  234.  
  235. BUILDOSVER_STR: 10.0.17763.1.amd64fre.rs5_release.180914-1434
  236.  
  237. ANALYSIS_SESSION_ELAPSED_TIME: fbc
  238.  
  239. ANALYSIS_SOURCE: KM
  240.  
  241. FAILURE_ID_HASH_STRING: km:0x3b_c0000005_nt!alpcpreceivesynchronousreply
  242.  
  243. FAILURE_ID_HASH: {c96a81f0-da4a-df0c-6260-e946f8c63145}
  244.  
  245. Followup: MachineOwner
  246. ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement