MS-User
Threadstarter
- Dabei seit
- 20.09.2016
- Beiträge
- 94.184
Ich hatte vor kurzen einen System Service Exeption Bluescreen, dabei habe ich die Crash File versucht auszulesen, aber selbst komme ich nicht weiter. Hier ist der Report:
Habe auch das Ding Analysiert durch WinDbg, dank Vorraus!
Microsoft (R) Windows Debugger Version 10.0.19528.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\-----\Documents\Crashes\060420-29000-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 18362 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff807`2b400000 PsLoadedModuleList = 0xfffff807`2b848170
Debug session time: Thu Jun 4 11:56:33.530 2020 (UTC + 2:00)
System Uptime: 1 days 21:28:19.286
Loading Kernel Symbols
...............................................................
................................................................
................................................................
............
Loading User Symbols
Loading unloaded module list
.......................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff807`2b5c2390 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffdb89`21345ac0=000000000000003b
5: kd> !analyze -v
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000006, Exception code that caused the bugcheck
Arg2: fffff8072b9d81b2, Address of the instruction which caused the bugcheck
Arg3: ffffdb89213463f0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on JULIUS
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 6
Key : Analysis.Memory.CommitPeak.Mb
Value: 69
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000006
BUGCHECK_P2: fffff8072b9d81b2
BUGCHECK_P3: ffffdb89213463f0
BUGCHECK_P4: 0
CONTEXT: ffffdb89213463f0 -- (.cxr 0xffffdb89213463f0)
rax=0000000000000000 rbx=ffffdb8921346e40 rcx=0000000000000007
rdx=000000000196c980 rsi=0000000000000366 rdi=ffffdf85fdb90000
rip=fffff8072b9d81b2 rsp=ffffdb8921346de8 rbp=ffffdf85fdb90000
r8=000000000000001c r9=ffffb48be6c240c0 r10=000002455757d980
r11=0000000000000980 r12=00000000ce4cf905 r13=ffffdb89213470a0
r14=0000000000000366 r15=0000024557498024
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
nt!HvpGetCellPaged+0xa2:
fffff807`2b9d81b2 418b02 mov eax,dword ptr [r10] ds:002b:00000245`5757d980=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Registry
STACK_TEXT:
ffffdb89`21346de8 fffff807`2bacb56f : 00000000`7f147a21 ffffdb89`21347170 00000000`00000000 ffffdf86`65234a10 : nt!HvpGetCellPaged+0xa2
ffffdb89`21346df0 fffff807`2bac9e69 : 00000001`ffffffff 00000000`ce4cf905 ffffdb89`213478e8 ffffdf86`00000000 : nt!CmpDoCompareKeyName+0x2f
ffffdb89`21346e40 fffff807`2babbd9a : ffffdf86`65234a10 00000000`00000006 ffffdb89`21347038 ffffdb89`213470c0 : nt!CmpWalkOneLevel+0x709
ffffdb89`21346f50 fffff807`2bab8e04 : ffffdb89`0000001c ffffdb89`213472a0 ffffdb89`21347268 00000000`00000000 : nt!CmpDoParseKey+0x9fa
ffffdb89`213471f0 fffff807`2bab6cef : ffffb48b`f196f010 ffffdf86`0a40c801 00000000`00000000 00000000`00000001 : nt!CmpParseKey+0x274
ffffdb89`21347410 fffff807`2bab5151 : ffffb48b`f196f000 ffffdb89`21347658 00000000`00000040 ffffb48b`df6f7ae0 : nt!ObpLookupObjectName+0x78f
ffffdb89`213475d0 fffff807`2babe66c : 00000000`00000001 00000000`00000000 00000000`00000000 ffffb48b`df6f7ae0 : nt!ObOpenObjectByNameEx+0x201
ffffdb89`21347710 fffff807`2babe4ed : 000000f2`cee7ec70 ffffdb89`21347a80 00000000`00000001 00000000`00000000 : nt!ObOpenObjectByName+0x5c
ffffdb89`21347760 fffff807`2bac050f : 00000000`00010f34 000000f2`00501802 000000f2`cee7ec00 00000000`00020019 : nt!CmOpenKey+0x29d
ffffdb89`213479c0 fffff807`2b5d414e : ffffb48b`e6c240c0 ffffdb89`21347a80 00000256`92ef5000 00000256`9419ea00 : nt!NtOpenKeyEx+0xf
ffffdb89`21347a00 00007ffb`155be3c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2b9
000000f2`cee7eb98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`155be3c4
SYMBOL_NAME: nt!HvpGetCellPaged+a2
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.836
STACK_COMMAND: .cxr 0xffffdb89213463f0 ; kb
BUCKET_ID_FUNC_OFFSET: a2
FAILURE_BUCKET_ID: 0x3B_c0000006_nt!HvpGetCellPaged
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {68f3db38-ae8e-4bae-c37a-85819946495f}
Followup: MachineOwner
---------
Habe auch das Ding Analysiert durch WinDbg, dank Vorraus!
Microsoft (R) Windows Debugger Version 10.0.19528.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\-----\Documents\Crashes\060420-29000-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 18362 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff807`2b400000 PsLoadedModuleList = 0xfffff807`2b848170
Debug session time: Thu Jun 4 11:56:33.530 2020 (UTC + 2:00)
System Uptime: 1 days 21:28:19.286
Loading Kernel Symbols
...............................................................
................................................................
................................................................
............
Loading User Symbols
Loading unloaded module list
.......................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff807`2b5c2390 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffdb89`21345ac0=000000000000003b
5: kd> !analyze -v
*******************************************************************************
- *
- Bugcheck Analysis *
- *
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000006, Exception code that caused the bugcheck
Arg2: fffff8072b9d81b2, Address of the instruction which caused the bugcheck
Arg3: ffffdb89213463f0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on JULIUS
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 6
Key : Analysis.Memory.CommitPeak.Mb
Value: 69
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000006
BUGCHECK_P2: fffff8072b9d81b2
BUGCHECK_P3: ffffdb89213463f0
BUGCHECK_P4: 0
CONTEXT: ffffdb89213463f0 -- (.cxr 0xffffdb89213463f0)
rax=0000000000000000 rbx=ffffdb8921346e40 rcx=0000000000000007
rdx=000000000196c980 rsi=0000000000000366 rdi=ffffdf85fdb90000
rip=fffff8072b9d81b2 rsp=ffffdb8921346de8 rbp=ffffdf85fdb90000
r8=000000000000001c r9=ffffb48be6c240c0 r10=000002455757d980
r11=0000000000000980 r12=00000000ce4cf905 r13=ffffdb89213470a0
r14=0000000000000366 r15=0000024557498024
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
nt!HvpGetCellPaged+0xa2:
fffff807`2b9d81b2 418b02 mov eax,dword ptr [r10] ds:002b:00000245`5757d980=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Registry
STACK_TEXT:
ffffdb89`21346de8 fffff807`2bacb56f : 00000000`7f147a21 ffffdb89`21347170 00000000`00000000 ffffdf86`65234a10 : nt!HvpGetCellPaged+0xa2
ffffdb89`21346df0 fffff807`2bac9e69 : 00000001`ffffffff 00000000`ce4cf905 ffffdb89`213478e8 ffffdf86`00000000 : nt!CmpDoCompareKeyName+0x2f
ffffdb89`21346e40 fffff807`2babbd9a : ffffdf86`65234a10 00000000`00000006 ffffdb89`21347038 ffffdb89`213470c0 : nt!CmpWalkOneLevel+0x709
ffffdb89`21346f50 fffff807`2bab8e04 : ffffdb89`0000001c ffffdb89`213472a0 ffffdb89`21347268 00000000`00000000 : nt!CmpDoParseKey+0x9fa
ffffdb89`213471f0 fffff807`2bab6cef : ffffb48b`f196f010 ffffdf86`0a40c801 00000000`00000000 00000000`00000001 : nt!CmpParseKey+0x274
ffffdb89`21347410 fffff807`2bab5151 : ffffb48b`f196f000 ffffdb89`21347658 00000000`00000040 ffffb48b`df6f7ae0 : nt!ObpLookupObjectName+0x78f
ffffdb89`213475d0 fffff807`2babe66c : 00000000`00000001 00000000`00000000 00000000`00000000 ffffb48b`df6f7ae0 : nt!ObOpenObjectByNameEx+0x201
ffffdb89`21347710 fffff807`2babe4ed : 000000f2`cee7ec70 ffffdb89`21347a80 00000000`00000001 00000000`00000000 : nt!ObOpenObjectByName+0x5c
ffffdb89`21347760 fffff807`2bac050f : 00000000`00010f34 000000f2`00501802 000000f2`cee7ec00 00000000`00020019 : nt!CmOpenKey+0x29d
ffffdb89`213479c0 fffff807`2b5d414e : ffffb48b`e6c240c0 ffffdb89`21347a80 00000256`92ef5000 00000256`9419ea00 : nt!NtOpenKeyEx+0xf
ffffdb89`21347a00 00007ffb`155be3c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2b9
000000f2`cee7eb98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`155be3c4
SYMBOL_NAME: nt!HvpGetCellPaged+a2
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.836
STACK_COMMAND: .cxr 0xffffdb89213463f0 ; kb
BUCKET_ID_FUNC_OFFSET: a2
FAILURE_BUCKET_ID: 0x3B_c0000006_nt!HvpGetCellPaged
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {68f3db38-ae8e-4bae-c37a-85819946495f}
Followup: MachineOwner
---------