Microsoft (R) Windows Debugger Version 10.0.19041.685 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\avery\Desktop\070521-7171-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff802
3a000000 PsLoadedModuleList = 0xfffff802
3ac2a230
Debug session time: Mon Jul 5 17:18:54.670 2021 (UTC - 7:00)
System Uptime: 0 days 0:00:44.279
Loading Kernel Symbols
...............................................................
................................................................
.............................................................
Loading User Symbols
Loading unloaded module list
............
For analysis of this file, run !analyze -v
6: kd> !analyze -v
***
***
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8023a378628, The address that the exception occurred at
Arg3: ffff8482b9f362f8, Exception Record Address
Arg4: ffff8482b9f35b30, Context Record Address
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Write
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G64RNUH
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 4
Key : Analysis.Memory.CommitPeak.Mb
Value: 81
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8023a378628
BUGCHECK_P3: ffff8482b9f362f8
BUGCHECK_P4: ffff8482b9f35b30
EXCEPTION_RECORD: ffff8482b9f362f8 -- (.exr 0xffff8482b9f362f8)
ExceptionAddress: fffff8023a378628 (nt!KeSetIdealProcessorThreadByNumber+0x0000000000000014)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000001
Parameter[1]: ffffd68c206e3919
Attempt to write to address ffffd68c206e3919
CONTEXT: ffff8482b9f35b30 -- (.cxr 0xffff8482b9f35b30)
rax=0000000000000000 rbx=ffffd68c55e2f040 rcx=ffffd68c55e2f040
rdx=ffff8482b9f365b4 rsi=0000000000000004 rdi=ffff8482b9f369c0
rip=fffff8023a378628 rsp=ffff8482b9f36530 rbp=ffff8482b9f36860
r8=ffff8482b9f365b4 r9=fffff8023a000000 r10=ffffffff80004600
r11=ffff9f0e23a7b080 r12=0000000000000000 r13=ffffd68c4bf0e100
r14=0000000000000003 r15=00007fffffff0000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!KeSetIdealProcessorThreadByNumber+0x14:
fffff802
3a378628 088bd9488bca or byte ptr [rbx-3574B727h],cl ds:002b:ffffd68c
206e3919=??
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
WRITE_ADDRESS: fffff8023acfb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8023ac0f388: Unable to get Flags value from nt!KdVersionBlock
fffff8023ac0f388: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffd68c206e3919
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000001
EXCEPTION_PARAMETER2: ffffd68c206e3919
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
ffff8482
b9f36530 fffff802
3a6e15e6 : ffffd68c
55e2f040 00000000
00000004 00000000
00000000 00000000
00000000 : nt!KeSetIdealProcessorThreadByNumber+0x14
ffff8482
b9f36560 fffff802
3a4085b8 : 00000000
00000000 00000000
00000000 00000000
00000000 00000000
00000000 : nt!NtSetInformationThread+0xd46
ffff8482
b9f367e0 fffff802
3a3faa80 : fffff802
4171a25d 00000000
00800000 ffffd68c
56b03e40 00000000
00000040 : nt!KiSystemServiceCopyEnd+0x28
ffff8482
b9f36978 fffff802
4171a25d : 00000000
00800000 ffffd68c
56b03e40 00000000
00000040 00000000
00000000 : nt!KiServiceLinkage
ffff8482
b9f36980 fffff802
41719f69 : 00000000
00000000 00000000
00800000 ffffd68c
5586d400 fffff802
41719f30 : HTTP!UlpInitializeThreadPoolWorkers+0x2b9
ffff8482
b9f36aa0 fffff802
3a274843 : ffffd68c
52b4d720 ffffd68c
52aade30 ffffd68c
5586d400 fffff802
407d5440 : HTTP!UlpThreadPoolStarter+0x39
ffff8482
b9f36b00 fffff802
3a341225 : ffffd68c
4bf0e100 ffffd68c
4bf0e100 fffff802
3a2747b0 ffffd68c
00000000 : nt!IopProcessWorkItem+0x93
ffff8482
b9f36b70 fffff802
3a2f53b5 : ffffd68c
4bf0e100 00000000
00000080 ffffd68c
49874080 000f8067
bcbbbdff : nt!ExpWorkerThread+0x105
ffff8482
b9f36c10 fffff802
3a3fe278 : ffffc400
2adc0180 ffffd68c
4bf0e100 fffff802
3a2f5360 ffff9f0e
23b90c89 : nt!PspSystemThreadStartup+0x55
ffff8482
b9f36c60 00000000
00000000 : ffff8482
b9f37000 ffff8482
b9f31000 00000000
00000000 00000000
00000000 : nt!KiStartSystemThread+0x28
CHKIMG_EXTENSION: !chkimg -lo 50 -db !nt
18 errors : !nt (fffff8023a378010-fffff8023a378eb8)
fffff8023a378010 *4a 03 e8 5d 01 00 00 eb 96 cc cc cc cc cc cc cc J..]............
...
fffff8023a378270 48 c1 e0 0c 48 03 c1 4c *7b c0 72 20 48 8b 5b 08 H...H..L{.r H.[.
...
fffff8023a378440 *09 00 00 c0 eb df 48 8b 05 83 57 cb ff eb b2 cc ......H...W.....
fffff8023a378450 *ce cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc ................
...
fffff8023a378470 *08 66 89 44 24 30 8b 44 *2c 78 89 44 24 28 48 8b .f.D$0.D,x.D$(H.
...
fffff8023a378620 83 ec 20 83 64 24 48 00 *08 8b d9 48 8b ca 49 8b .. .d$H....H..I.
fffff8023a378630 *f8 e8 3a 89 fa ff 83 f8 ff 74 30 4c 8d 44 24 48 ..:......t0L.D$H
...
fffff8023a3786e0 8b e0 00 00 00 48 8d 4e *38 44 8b 83 c0 00 00 00 .....H.N8D......
...
fffff8023a378840 *8b 43 e8 48 8b f1 48 0f be 41 42 48 8d 14 c0 48 .C.H..H..ABH...H
...
fffff8023a378860 8a 00 48 8b bb c8 00 00 *08 48 8b 6b 20 4c 8b 73 ..H......H.k L.s
fffff8023a378870 18 e8 1a 10 fd ff 48 8b *1b 48 39 5a 08 0f 85 eb ......H..H9Z....
...
fffff8023a378c20 5f c3 cc cc cc cc cc cc *ce cc cc cc cc cc cc cc _...............
fffff8023a378c30 40 53 48 83 ec 40 0f 10 *0a 48 8b d9 4c 8d 4c 24
@sh..@...H..L.L$
...
fffff8023a378ce0 c0 0f 84 29 70 0f 00 0f *12 06 44 89 78 14 48 8d ...)p.....D.x.H.
...
fffff8023a378e50 48 8d 93 c8 38 00 00 48 *8b 54 24 30 48 8d 05 4d H...8..H.T$0H..M
...
fffff8023a378e70 05 cb e9 ed ff 4c 89 7c *34 28 48 89 45 e0 49 8b .....L.|4(H.E.I.
...
fffff8023a378eb0 8d 4f 68 e8 c8 41 40 00 *4d 33 c0 33 d2 49 8b cc .Oh..A@.M3.3.I..
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
MEMORY_CORRUPTOR: STRIDE
STACK_COMMAND: .cxr 0xffff8482b9f35b30 ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_STRIDE
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {574dbc1b-92cb-fb09-cb7a-cacc1bb2c511}
Followup: memory_corruption
---------