Announcements

Help Wizard

Step 1

NEXT STEP

[Desktop] Crashed Windows, Memory Dump included

[Desktop] Crashed Windows, Memory Dump included

Plan

Premium

Country

United States

Device

Windows PC

Operating System

Windows 10

My Question or Issue

Microsoft (R) Windows Debugger Version 10.0.22549.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\WINDOWS\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.

Symbol search path is: srv*
Executable search path is: 
Windows 10 Kernel Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff807`74000000 PsLoadedModuleList = 0xfffff807`74c2a2d0
Debug session time: Tue Apr 12 16:25:14.649 2022 (UTC - 4:00)
System Uptime: 21 days 0:28:31.567
Loading Kernel Symbols
...............................................................
.....Page 30527f not present in the dump file. Type ".hh dbgerr004" for details
........Page 9e343 not present in the dump file. Type ".hh dbgerr004" for details
...................................................
............Page 60cefc not present in the dump file. Type ".hh dbgerr004" for details
.Page 24676e not present in the dump file. Type ".hh dbgerr004" for details
...................................................
............................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000000`003c3018).  Type ".hh dbgerr001" for details
Loading unloaded module list
..................................................
For analysis of this file, run !analyze -vnt!KeBugCheckEx:
fffff807`743f7620 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffffb300`ed878020=000000000000003b
4: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff80777109703, Address of the instruction which caused the BugCheck
Arg3: ffffb300ed878920, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

Page 6af27b not present in the dump file. Type ".hh dbgerr004" for details
Page 6af27b not present in the dump file. Type ".hh dbgerr004" for details
Page 6af27b not present in the dump file. Type ".hh dbgerr004" for details
Page 6af27b not present in the dump file. Type ".hh dbgerr004" for details
Page 6af27b not present in the dump file. Type ".hh dbgerr004" for details
Page 6af27b not present in the dump file. Type ".hh dbgerr004" for details
Page 6af27b not present in the dump file. Type ".hh dbgerr004" for details
Page 6af27b not present in the dump file. Type ".hh dbgerr004" for details
Page 6af27b not present in the dump file. Type ".hh dbgerr004" for details
Page 6af27b not present in the dump file. Type ".hh dbgerr004" for details
Page 6af27b not present in the dump file. Type ".hh dbgerr004" for details
Lots of entries redacted because it was lengthy and seemed unhelpful...
KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 5796 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 7123 Key : Analysis.Init.CPU.mSec Value: 1374 Key : Analysis.Init.Elapsed.mSec Value: 50071 Key : Analysis.Memory.CommitPeak.Mb Value: 108 Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 FILE_IN_CAB: MEMORY.DMP BUGCHECK_CODE: 3b BUGCHECK_P1: c0000005 BUGCHECK_P2: fffff80777109703 BUGCHECK_P3: ffffb300ed878920 BUGCHECK_P4: 0 CONTEXT: ffffb300ed878920 --
(.cxr 0xffffb300ed878920)rax=007600650064005c rbx=ffffc308c8733cc0 rcx=ffffc308a6a70a20 rdx=abffffffffd20f50 rsi=ffffc308a6791918 rdi=0000000000000000 rip=fffff80777109703 rsp=ffff880e4159b698 rbp=0000000000000000 r8=000000000000008c r9=0000000000000004 r10=ffffc308a5140540 r11=ffff880e4159b948 r12=ffff880e4159b948 r13=0000000000000000 r14=ffff880e4159bf90 r15=ffffc308cec36920 iopl=0 nv up ei pl nz ac pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050212 NETIO!memcmp+0x53: fffff807`77109703 483b0411 cmp rax,qword ptr [rcx+rdx] ds:002b:abffc308`a6791970=???????????????? Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 PROCESS_NAME: Spotify.exe STACK_TEXT: ffff880e`4159b698 fffff807`770ebdbd : 00000000`00000000 00000000`48706657 00000000`00000030 00000000`00000099 : NETIO!memcmp+0x53 ffff880e`4159b6a0 fffff807`770eb219 : ffffc308`c8733cc0 ffffc308`a6791918 00000000`00000000 00000000`00000000 : NETIO!MatchValues+0x2bd ffff880e`4159b6f0 fffff807`770e80bd : ffffc308`a5140540 ffff880e`4159bc28 00000000`00000000 ffff880e`4159b930 : NETIO!IndexListClassify+0xd9 ffff880e`4159b790 fffff807`7722afc5 : ffffc308`97707780 ffffc308`97707600 00000000`00000000 00000000`00000000 : NETIO!KfdClassify+0x2ad ffff880e`4159bb80 fffff807`7722a7f7 : 00000000`00000000 ffff880e`4159c220 00000000`00000000 ffff880e`00000000 : tcpip!WfpAlepAuthorizeOrClassifyPort+0x6c9 ffff880e`4159c100 fffff807`7722a467 : 00000000`00000000 ffffc308`b0dc4e10 00000000`00000119 00000000`00000000 : tcpip!WfpAlepAuthorizePortByFamily+0x1db ffff880e`4159c260 fffff807`772294cd : ffffc308`b0dc4f50 ffffc308`00000000 00000000`00000000 ffff880e`4159c400 : tcpip!UdpBindEndpointRequestInspectComplete+0x3b7 ffff880e`4159c390 fffff807`7722807d : fffffb80`01f57950 fffff807`7424e244 ffffc308`b0dc4e10 fffff807`7424e527 : tcpip!UdpIoControlEndpoint+0x3e9 ffff880e`4159c4f0 fffff807`78555fb7 : 00000000`00000000 ffffc308`c6c44050 00000000`00000001 00000000`00000001 : tcpip!UdpTlProviderIoControlEndpoint+0x5d ffff880e`4159c550 fffff807`7854d8ed : ffffc308`c6c44050 ffff880e`4159c6c0 00000000`00000000 00000000`00000000 : afd!AfdTLIoControl+0x5b ffff880e`4159c5d0 fffff807`7854db8d : ffffc308`c6c44050 00000000`00000001 ffffc308`bfb0b270 fffff807`7421bbc2 : afd!AfdTLBind+0x89 ffff880e`4159c650 fffff807`78532eeb : ffffc308`c6892280 00000000`00000000 ffffc308`c6c44050 ffffc308`bdb53c30 : afd!AfdTLBindSecurity+0x59 ffff880e`4159c6d0 fffff807`785591fc : ffffc308`bdb53c30 ffffc308`bdb53dd8 ffffc308`00000002 00000000`00000000 : afd!AfdBind+0x3eb ffff880e`4159c7d0 fffff807`7428f835 : ffffc308`bdb53c30 00000000`00000000 ffff880e`4159cb80 00000000`00000020 : afd!AfdDispatchDeviceControl+0x7c ffff880e`4159c800 fffff807`74677208 : ffffc308`bdb53c30 00000000`00000000 00000000`00000000 00000000`00000020 : nt!IofCallDriver+0x55 ffff880e`4159c840 fffff807`74677007 : 00000000`00000000 ffff880e`4159cb80 00000000`00000000 ffff880e`4159cb80 : nt!IopSynchronousServiceTail+0x1a8 ffff880e`4159c8e0 fffff807`74676386 : 00000000`00000000 00000000`0000055c 00000000`00000001 00000000`00000000 : nt!IopXxxControlFile+0xc67 ffff880e`4159ca20 fffff807`74408fb8 : ffffc308`a8bea080 00000000`0517e9f8 ffff880e`4159caa8 00000000`00000000 : nt!NtDeviceIoControlFile+0x56 ffff880e`4159ca90 00000000`77a81cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000000`0517f308 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77a81cfc SYMBOL_NAME: NETIO!memcmp+53 MODULE_NAME: NETIO IMAGE_NAME: NETIO.SYS STACK_COMMAND: .cxr 0xffffb300ed878920 ; kb BUCKET_ID_FUNC_OFFSET: 53 FAILURE_BUCKET_ID: AV_NETIO!memcmp OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {722f9bab-052a-b859-e4b0-ec698542f096} Followup: MachineOwner

 There was no behavior change in the application, it just crashed my whole computer without warning. At the time I was listening to Conan O'Brien's podcast and playing Elden Ring. I really really hope Spotify didn't just cost me 59k runes, 😉

Reply
0 Replies

Suggested posts