Home > OS >  Please analyse the great god, the office computer
Please analyse the great god, the office computer

Time:09-24

Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading the Dump File (C: \ Windows \ Minidump \ 062319-4640-01 DMP]
The Mini Kernel Dump File: Only registers and stack trace are available

Invalid directory table base value 0 x0
Symbol search path is: the SRV * C: \ Symbols * http://msdl.microsoft.com/download/symbols
The Executable search path is:
Unable to load image Unknown_Module_00000000 ` 00000000, Win32 error 0 n2
* * * WARNING: Unable to verify timestamp for Unknown_Module_00000000 ` 00000000
Unable to add the module at 00000000 ` 00000000
WARNING: reload failed, the module list may be incomplete
The Debugger can not determine the kernel base address
Windows 7 the Kernel Version 17763 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
The Machine Name:
The Kernel base=0 xfffff802 ` 748 a9000 PsLoadedModuleList=0 xfffff802 ` cc8a50 74
The Debug session time: Sun Jun 23 18:41:33. 783, 2019 (UTC + 8)
The System Uptime: 623
0 days 0:17:51.Unable to load image Unknown_Module_00000000 ` 00000000, Win32 error 0 n2
* * * WARNING: Unable to verify timestamp for Unknown_Module_00000000 ` 00000000
Unable to add the module at 00000000 ` 00000000
WARNING: reload failed, the module list may be incomplete
The Debugger can not determine the kernel base address
Loading the Kernel Symbols
. Unable to load image Unknown_Module_00000000 ` 00000000, Win32 error 0 n2
* * * WARNING: Unable to verify timestamp for Unknown_Module_00000000 ` 00000000
Unable to add the module at 00000000 ` 00000000

Loading User Symbols
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
* *
* Bugcheck Analysis *
* *
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *

The Use! Analyze the -v to get the detailed was debugging information.

BugCheck 1 e, {ffffffffc0000005 fffff801a6280956, 0, FFFFFFFFFFFFFFFF}

* * * * * the Debugger could not find the nt in the module list, the module list took be corrupt, error 0 x80070057.

Probably under caused by: Unknown_Image (ANALYSIS_INCONCLUSIVE)

Followup: MachineOwner
-- -- -- -- -- -- -- -- --

Zero: kd> ! Analyze the -v
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
* *
* Bugcheck Analysis *
* *
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *

KMODE_EXCEPTION_NOT_HANDLED (1 e)
This is a very common bugcheck. Usually the exception address pinpoints
The driver/function that under caused the problem. Always note this address
As well as the link date of the driver/image that contains this address.
The Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff801a6280956, The address that The exception occurred at
Arg3:0000000000000000, the Parameter 0 of the exception
Arg4: FFFFFFFFFFFFFFFF, Parameter 1 of the exception

Was Debugging Details:
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- --

* * * * * the Debugger could not find the nt in the module list, the module list took be corrupt, error 0 x80070057.


EXCEPTION_CODE: (xc0000005 NTSTATUS) 0-0 x % p

FAULTING_IP:
+ 3636303337633566
Fffff801 ` a6280956?? ?????

EXCEPTION_PARAMETER1:0000000000000000

EXCEPTION_PARAMETER2: FFFFFFFFFFFFFFFF

READ_ADDRESS: unable to get the nt! MmSpecialPoolStart
Unable to get the nt! MmSpecialPoolEnd
Unable to get the nt! MmPoolCodeStart
Unable to get the nt! MmPoolCodeEnd
FFFFFFFFFFFFFFFF

ERROR_CODE: (xc0000005 NTSTATUS) 0-0 x % p

BUGCHECK_STR: 0 x1e_c0000005

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

CURRENT_IRQL: 0

LAST_CONTROL_TRANSFER: from fffff80274b3796e to fffff80274a59f30

STACK_TEXT:
Fffff802 ` 770724 c8 fffff802 ` 74 b3796e: 00000000 ` 0000001 e FFFFFFFF ` c0000005 fffff801 ` a6280956 00000000 ` 00000000:0 xfffff802 ` a59f30 74
Fffff802 ` 770724 d0 00000000 ` 0000001 e: FFFFFFFF ` c0000005 fffff801 ` a6280956 00000000 ` 00000000 FFFFFFFF ` FFFFFFFF: 0 xfffff802 ` b3796e 74
770724 d8 fffff802 ` FFFFFFFF ` c0000005: fffff801 ` a6280956 00000000 ` 00000000 FFFFFFFF ` FFFFFFFF 0000022 a ` f73cb969:0 x1e
770724 e0 fffff802 ` fffff801 ` a6280956:00000000 ` 00000000 FFFFFFFF ` FFFFFFFF 0000022 a ` f73cb969 00000000 ` 00000000:0 XFFFFFFFF ` c0000005
nullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnull
  • Related