Skip to content

Instantly share code, notes, and snippets.

Embed
What would you like to do?
ugh why
Microsoft (R) Windows Debugger Version 10.0.18317.1001 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\021619-10734-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Mini Kernel Dump does not have process information
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Unable to load image Unknown_Module_00000000`00000000, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Unknown_Module_00000000`00000000
*** ERROR: Module load completed but symbols could not be loaded for Unknown_Module_00000000`00000000
Unable to add module at 00000000`00000000
WARNING: .reload failed, module list may be incomplete
Debugger can not determine kernel base address
Windows 10 Kernel Version 17763 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Machine Name:
Kernel base = 0xfffff801`3a808000 PsLoadedModuleList = 0xfffff801`3ac23ad0
Debug session time: Sat Feb 16 01:58:44.394 2019 (UTC - 5:00)
System Uptime: 3 days 6:24:31.094
Unable to load image Unknown_Module_00000000`00000000, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Unknown_Module_00000000`00000000
*** ERROR: Module load completed but symbols could not be loaded for Unknown_Module_00000000`00000000
Unable to add module at 00000000`00000000
WARNING: .reload failed, module list may be incomplete
Debugger can not determine kernel base address
Loading Kernel Symbols
.Unable to load image Unknown_Module_00000000`00000000, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Unknown_Module_00000000`00000000
*** ERROR: Module load completed but symbols could not be loaded for Unknown_Module_00000000`00000000
Unable to add module at 00000000`00000000
Loading User Symbols
For analysis of this file, run !analyze -v
fffff801`3a9bb440 ?? ???
10: kd> .sympath
Symbol search path is: srv*
Expanded Symbol search path is: cache*;SRV*https://msdl.microsoft.com/download/symbols
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
10: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_MODE_HEAP_CORRUPTION (13a)
The kernel mode heap manager has detected corruption in a heap.
Arguments:
Arg1: 0000000000000012, Type of corruption detected
Arg2: fffffa29c0200100, Address of the heap that reported the corruption
Arg3: fffffa29c457b000, Address at which the corruption was detected
Arg4: 0000000000000000
Debugging Details:
------------------
***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
DUMP_TYPE: 2
BUGCHECK_P1: 12
BUGCHECK_P2: fffffa29c0200100
BUGCHECK_P3: fffffa29c457b000
BUGCHECK_P4: 0
BUGCHECK_STR: 0x13a_12
CPU_COUNT: c
CPU_MHZ: c7a
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 1
CPU_STEPPING: 1
CUSTOMER_CRASH_COUNT: 1
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-BOBBIAS
ANALYSIS_SESSION_TIME: 02-16-2019 04:18:57.0743
ANALYSIS_VERSION: 10.0.18317.1001 amd64fre
LAST_CONTROL_TRANSFER: from fffff8013ab022c9 to fffff8013a9bb440
STACK_TEXT:
ffffc98c`bdbb0ec8 fffff801`3ab022c9 : 00000000`0000013a 00000000`00000012 fffffa29`c0200100 fffffa29`c457b000 : 0xfffff801`3a9bb440
ffffc98c`bdbb0ed0 00000000`0000013a : 00000000`00000012 fffffa29`c0200100 fffffa29`c457b000 00000000`00000000 : 0xfffff801`3ab022c9
ffffc98c`bdbb0ed8 00000000`00000012 : fffffa29`c0200100 fffffa29`c457b000 00000000`00000000 00000000`00000020 : 0x13a
ffffc98c`bdbb0ee0 fffffa29`c0200100 : fffffa29`c457b000 00000000`00000000 00000000`00000020 fffffa29`c457b000 : 0x12
ffffc98c`bdbb0ee8 fffffa29`c457b000 : 00000000`00000000 00000000`00000020 fffffa29`c457b000 fffff801`3ab02328 : 0xfffffa29`c0200100
ffffc98c`bdbb0ef0 00000000`00000000 : 00000000`00000020 fffffa29`c457b000 fffff801`3ab02328 00000000`00000012 : 0xfffffa29`c457b000
SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID: CORRUPT_MODULELIST_0x13a_12
DEFAULT_BUCKET_ID: CORRUPT_MODULELIST_0x13a_12
PRIMARY_PROBLEM_CLASS: CORRUPT_MODULELIST_0x13a_12
FAILURE_BUCKET_ID: CORRUPT_MODULELIST_0x13a_12
TARGET_TIME: 2019-02-16T06:58:44.000Z
OSBUILD: 17763
OSSERVICEPACK: 0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
ANALYSIS_SESSION_ELAPSED_TIME: 31
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:corrupt_modulelist_0x13a_12
FAILURE_ID_HASH: {8b739a57-3217-fb31-bd7d-b7191b9a3e5f}
Followup: MachineOwner
---------
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
You can’t perform that action at this time.