Имя пользователя:
Пароль:  
Помощь | Регистрация | Забыли пароль?  

Название темы: Windows DBG
Показать сообщение отдельно

Аватара для NickM

Ветеран


Contributor


Сообщения: 4624
Благодарности: 1109

Профиль | Отправить PM | Цитировать


crackback, у меня так:
Скрытый текст
Код: Выделить весь код
Loading Dump File [C:\10\111122-7968-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Symbol Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       SRV*%systemdrive%\symbols*http://msdl.microsoft.com/download/symbols
Deferred                                       symsrv*symsrv.dll*c:\symbols* http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*%systemdrive%\symbols*http://msdl.microsoft.com/download/symbols;symsrv*symsrv.dll*c:\symbols* http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff804`36600000 PsLoadedModuleList = 0xfffff804`3722a290
Debug session time: Fri Nov 11 22:46:26.280 2022 (UTC + 5:00)
System Uptime: 0 days 0:09:13.928
Loading Kernel Symbols
...............................................................
................................................................
................................................................
...............
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 139, {1d, fffff60971519b00, fffff60971519a58, 0}


Скрытый текст
Код: Выделить весь код
> k
 # Child-SP          RetAddr           Call Site
00 fffff609`715197d8 fffff804`36a0af69 nt!KeBugCheckEx
01 fffff609`715197e0 fffff804`36a0b390 nt!KiBugCheckDispatch+0x69
02 fffff609`71519920 fffff804`36a09723 nt!KiFastFailDispatch+0xd0
03 fffff609`71519b00 fffff804`36a24d2f nt!KiRaiseSecurityCheckFailure+0x323
04 fffff609`71519c98 fffff804`36825ff0 nt!RtlRbRemoveNode+0x1feaff
05 fffff609`71519cb0 fffff804`36825a38 nt!RtlpHpVsChunkCoalesce+0xb0
06 fffff609`71519d10 fffff804`368243c4 nt!RtlpHpVsContextFree+0x188
07 fffff609`71519db0 fffff804`36fb2019 nt!ExFreeHeapPool+0x4d4
08 fffff609`71519e90 fffff804`50e8220c nt!ExFreePool+0x9
09 fffff609`71519ec0 fffff804`50e82738 nsiproxy!NsippGetAllParameters+0x36c
0a fffff609`7151a0b0 fffff804`3682a6b5 nsiproxy!NsippDispatch+0xd8
0b fffff609`7151a100 fffff804`36c14848 nt!IofCallDriver+0x55
0c fffff609`7151a140 fffff804`36c14647 nt!IopSynchronousServiceTail+0x1a8
0d fffff609`7151a1e0 fffff804`36c139c6 nt!IopXxxControlFile+0xc67
0e fffff609`7151a320 fffff804`36a0a9b5 nt!NtDeviceIoControlFile+0x56
0f fffff609`7151a390 00007fff`2ec0d0e4 nt!KiSystemServiceCopyEnd+0x25
10 000000c2`1f9fe2f8 00000000`00000000 0x00007fff`2ec0d0e4


Скрытый текст
Код: Выделить весь код
MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

PRIMARY_PROBLEM_CLASS:  MEMORY_CORRUPTION_LARGE

Отправлено: 06:03, 28-11-2022 | #3

Название темы: Windows DBG