0:000> !analyze -v
***
***
GetUrlPageData2 (WinHttp) failed: 12002.
DUMP_CLASS: 2
DUMP_QUALIFIER: 400
CONTEXT: (.ecxr)
rax=0000000000000000 rbx=00000000cbdff270 rcx=efc4fa79302a0000
rdx=0000000000000000 rsi=000000d6cbdff288 rdi=000000d6cbdff240
rip=000000006e626771 rsp=000000d6cbdff130 rbp=0000000000000009
r8=000000d6cbdff018 r9=0000000000000009 r10=0000000000000000
r11=0000000000000246 r12=000001f9ef8a5240 r13=000000d6cbdff288
r14=000001f9ed6bc0e0 r15=0000000000000004
iopl=0 nv up ei pl nz na po nc
cs=0033 ss=0000 ds=0000 es=0000 fs=0053 gs=002b efl=00010206
tmmon64+0x26771:
00000000
6e626771 4c8b65e0 mov r12,qword ptr [rbp-20h] ss:ffffffff
ffffffe9=????????????????
Resetting default scope
FAULTING_IP:
tmmon64+26771
00000000
6e626771 4c8b65e0 mov r12,qword ptr [rbp-20h]
EXCEPTION_RECORD: (.exr -1)
ExceptionAddress: 000000006e626771 (tmmon64+0x0000000000026771)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffe9
Attempt to read from address ffffffffffffffe9
PROCESS_NAME: chrome.exe
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffe9
FOLLOWUP_IP:
tmmon64+26771
00000000
6e626771 4c8b65e0 mov r12,qword ptr [rbp-20h]
READ_ADDRESS: ffffffffffffffe9
WATSON_BKT_PROCSTAMP: 5ec2030e
WATSON_BKT_PROCVER: 2.6.0.2038
WATSON_BKT_MODULE: tmmon64.dll
WATSON_BKT_MODSTAMP: 5ec2030e
WATSON_BKT_MODOFFSET: 26771
WATSON_BKT_MODVER: 2.6.0.2038
BUILD_VERSION_STRING: 10.0.19041.662 (WinBuild.160101.0800)
MODLIST_WITH_TSCHKSUM_HASH: 3f2d8de51a52755ef95a48c8f03f65960ab33700
MODLIST_SHA1_HASH: 6d0cbad9f87926b1a6aa8088dfacc9b02659f3c7
NTGLOBALFLAG: 0
PROCESS_BAM_CURRENT_THROTTLED: 0
PROCESS_BAM_PREVIOUS_THROTTLED: 0
DUMP_FLAGS: 0
DUMP_TYPE: 2
ANALYSIS_SESSION_HOST: ANDREW2-PC
ANALYSIS_SESSION_TIME: 12-06-2020 15:46:32.0758
ANALYSIS_VERSION: 10.0.15063.400 amd64fre
THREAD_ATTRIBUTES:
OS_LOCALE: ENU
PROBLEM_CLASSES:
ID: [0n292]
Type: [@ACCESS_VIOLATION]
Class: Addendum
Scope: BUCKET_ID
Name: Omit
Data: Omit
PID: [Unspecified]
TID: [0x1e08]
Frame: [0] : tmmon64
ID: [0n264]
Type: [INVALID_POINTER_READ]
Class: Primary
Scope: DEFAULT_BUCKET_ID (Failure Bucket ID prefix)
BUCKET_ID
Name: Add
Data: Omit
PID: [Unspecified]
TID: [0x1e08]
Frame: [0] : tmmon64
ID: [0n105]
Type: [AFTER_CALL]
Class: Addendum
Scope: DEFAULT_BUCKET_ID (Failure Bucket ID prefix)
BUCKET_ID
Name: Add
Data: Omit
PID: [0x2d6c]
TID: [0x1e08]
Frame: [0] : tmmon64
BUGCHECK_STR: APPLICATION_FAULT_INVALID_POINTER_READ_AFTER_CALL
DEFAULT_BUCKET_ID: INVALID_POINTER_READ_AFTER_CALL
PRIMARY_PROBLEM_CLASS: APPLICATION_FAULT
LAST_CONTROL_TRANSFER: from 0000000000000000 to 000000006e626771
STACK_TEXT:
000000d6
cbdff130 00000000
00000000 : 000001f9
ed6906f0 00000000
00000000 000000d6
cbdff200 000000d6
00000000 : tmmon64+0x26771
THREAD_SHA1_HASH_MOD_FUNC: 9b3a8dbd3abf2a80f9b371d83472b99b41407461
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: fb7a0027bb2a7ea9b9192df88c7e3a8c1e18a37c
THREAD_SHA1_HASH_MOD: 9b3a8dbd3abf2a80f9b371d83472b99b41407461
FAULT_INSTR_CODE: e0658b4c
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: tmmon64+26771
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: tmmon64
IMAGE_NAME: tmmon64.dll
DEBUG_FLR_IMAGE_TIMESTAMP: 5ec2030e
STACK_COMMAND: dt ntdll!LdrpLastDllInitializer BaseDllName ; dt ntdll!LdrpFailureData ; .ecxr ; kb
FAILURE_BUCKET_ID: INVALID_POINTER_READ_AFTER_CALL_c0000005_tmmon64.dll!Unknown
BUCKET_ID: APPLICATION_FAULT_INVALID_POINTER_READ_AFTER_CALL_tmmon64+26771
FAILURE_EXCEPTION_CODE: c0000005
FAILURE_IMAGE_NAME: tmmon64.dll
BUCKET_ID_IMAGE_STR: tmmon64.dll
FAILURE_MODULE_NAME: tmmon64
BUCKET_ID_MODULE_STR: tmmon64
FAILURE_FUNCTION_NAME: Unknown
BUCKET_ID_FUNCTION_STR: Unknown
BUCKET_ID_OFFSET: 26771
BUCKET_ID_MODTIMEDATESTAMP: 5ec2030e
BUCKET_ID_MODCHECKSUM: 0
BUCKET_ID_MODVER_STR: 2.6.0.2038
BUCKET_ID_PREFIX_STR: APPLICATION_FAULT_INVALID_POINTER_READ_AFTER_CALL_
FAILURE_PROBLEM_CLASS: APPLICATION_FAULT
FAILURE_SYMBOL_NAME: tmmon64.dll!Unknown
WATSON_STAGEONE_URL:
http://watson.microsoft.com/StageOn...038/5ec2030e/c0000005/00026771.htm?Retriage=1
TARGET_TIME: 2020-12-06T04:09:25.000Z
OSBUILD: 19041
OSSERVICEPACK: 662
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 0
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt (662)
USER_LCID: 0
OSBUILD_TIMESTAMP: 2009-12-29 09:37:03
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.19041.662
ANALYSIS_SESSION_ELAPSED_TIME: 5410
ANALYSIS_SOURCE: UM
FAILURE_ID_HASH_STRING: um:invalid_pointer_read_after_call_c0000005_tmmon64.dll!unknown
FAILURE_ID_HASH: {84646361-5e98-dde3-31af-6bfddafeccbc}
Followup: MachineOwner