Sep 18 2022 01:52 AM
PROCESS NAME: System
STACK TEXT:
ffff8c80 3fadze18 fffff800 3a81f5fa
ffff8c80 3fadze20 fffff800 3a616953
ffff8c80° 3fadze80 fffff800' 3a61643a
ffff8c80 3fad2f30 fffff800" 3a6de195
ffff8c80 3fad2f60 fffff800 3a7f8d8a
ffff8c803fadafbo fffff800 3a7f92f7
fffffa85 b6a4f5fo fffff800 3a680c5d
fffffa85 b6a4f780 fffff800 3adaa539
fffffa85 b6a4f7bo fffff800 3adase15
fffffa85 b6a4f7e0 fffff800 3a69a38e
fffffa85 b6a4f820 fffff800 3a699674
fffffa85 b6a4f990 fffff800 3a7fae4e
fffffas5 b6a4f20 00000000: 00000000
00000000 00000133 00000000 00000000 00000000 00000501 00000000 00000500: nt!KeBugCheckEx
00000120 f6117882 ffff8c80 3fa80180 00000000 0000oo ffff8c80 3fa80180
: nt!KeAccumulateTick
ffffdo8a" b5ce5d40 fffff85"64670 77854600
: nt!KeClockInterrupt
ffffde8a" b5ce5d40 00000000 00000000 00000000 0000000o ffffa3da 599aeff3
: nt!HalpTimerClockIp
fffffa85 b6a4f670 ffffdc8a b5ce5d40 00000112-145ccc22 00000000 00000000 : nt!KiCallInterrupts
00000000:00000000 fffff85 b6a4f7e0 fffff800 3a7f9304 : nt!KiInterruptSubDi
: 00000000°00000010 00000000:00000286 fffffa85 b6a4f7a0 00000000 00000018 : nt!KiInterruptDispa
ffffdc8a" bfced318 ffff8c80 3fa80180 ffffdc8a bfced660 fffffa85 b6a4faf4
: nt!KeYieldProcessor
fffffa85° 43ff07d3 ffff8c80' 3fa80180 ffffdesacofzbedo 0000000 00000000
nt!IopLiveDumpProce
: ffff8c80 3fa83240 ffffdc8a b5fdcooo fffffa85 b6a4faeo ffff8c80 00000002 : nt!IopLiveDumpCorra
00000000^ 00000000 fffff800 3a6edc95 00000000 00140001 00000000 00000000 : nt!KiExecuteAlIDpcs
: ffffffff00000000 ffff8c80 3fa80180 ffff8c80 3fasb440 ffffdc8a cbaafoso:nt!KiRetireDpcList+
fffffa85" b6a50000 ffffa85 b6a49000 00000000 00000000 00000000:00000000
: nt!KildleLoop+0x9e
SYMBOL NAME: nt!KeAccumulateTicks+20644a
MODULE NAME: nt
IMAGE NAME: ntkrnlmp.exe
IMAGE VERSION: 10.0.19041.1466
STACK COMMAND: •cxr; •ecxr ; kb
BUCKET ID FUNC OFFSET: 20644a
FAILURE BUCKET ID: 0x133 PC nt!KeAccumulateTicks
OSPLATFORM TYPE: x64
OCNAME• window 10
Browse full module list
start
end
fffff800' 3a400000 fffff800 36446000
module name nt
(pdb symbols)
C: \ProgramData\Dbg\sym\ntkrnImp.pdb\733830ECAFA1A3073FFA9CC3A38FE93C1\ntkrnlmp.pdb
Mapped memory image file: C: \ProgramData\Dbg\sym\ntkrnlmp.exe\272315A81046000\ntkrnlmp.exe
Image path: ntkrnlmp. exe
Image name: ntkrnlmp. exe
Browse all global symbols functions data
Image was built with /Brepro flag.
Timestamp: 272315A8 (This is a reproducible build file hash, not a timestamp)
CheckSum: 00A6202E
ImageSize: 01046000
File version: 10.0.19041.1466
Product version: 10.0.19041.1466
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 1.0 App
File date: 00000000.00000000
Translations: 0409.0400
Information from resource tables:
CompanyName:
Microsoft Corporation
ProductName: Microsoft® windows® Operating System
InternalName: ntkrnlmp. exe
OriginalFilename: ntkrnlmp.exe
Productversion: 10.0.19041.1466
FileVersion: 10.0.19041.1466 (WinBuild.160101.0800)
FileDescription: NT Kernel & System
Legalcopyright: © Microsoft Corporation. All rights reserved.
Sep 18 2022 05:55 AM