KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff800034fcb38, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000040870f20, Parameter 1 of the exception
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: ExceptionRecord ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: ContextRecord ***
*** ***
*************************************************************************
fffff800033ef0e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff800034aa300
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5312
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 7250
Key : Analysis.Memory.CommitPeak.Mb
Value: 62
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: win7sp1_ldr_escrow
Key : WER.OS.Timestamp
Value: 2020-01-02T17:07:00Z
Key : WER.OS.Version
Value: 7.1.7601.24545
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff800034fcb38
BUGCHECK_P3: 0
BUGCHECK_P4: 40870f20
READ_ADDRESS: fffff800033ef0e8: Unable to get Flags value from nt!KdVersionBlock
fffff800033ef0e8: Unable to get Flags value from nt!KdVersionBlock
fffff800033ef0e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800034aa2f0
GetUlongPtrFromAddress: unable to read from fffff800034aa4a8
0000000000000000
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
TRAP_FRAME: fffff8800d426880 -- (.trap 0xfffff8800d426880)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000011 rbx=0000000000000000 rcx=0000000000000010
rdx=fffff8a00006f650 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800034fcb38 rsp=fffff8800d426a10 rbp=fffff8a0000221bb
r8=fffff8a000024010 r9=000000000000fffe r10=0000000000000000
r11=fffff8800d426bc0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!CmpKcbCacheLookup+0x4f8:
fffff800`034fcb38 4883b9100f874005 cmp qword ptr [rcx+40870F10h],5 ds:00000000`40870f20=????????????????
Resetting default scope
STACK_TEXT:
fffff880`0d426008 fffff800`03387f38 : 00000000`0000001e ffffffff`c0000005 fffff800`034fcb38 00000000`00000000 : nt!KeBugCheckEx
fffff880`0d426010 fffff800`032af3c2 : fffff880`0d4267d8 00000000`00000000 fffff880`0d426880 fffffa80`07560060 : nt!KiDispatchException+0x1c8
fffff880`0d4266a0 fffff800`032ad0a8 : 00000000`00000000 00000000`40870f20 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`0d426880 fffff800`034fcb38 : fffff8a0`0000dce0 00000000`659a7ef2 fffff880`0d426f8c fffff800`034fb24d : nt!KiPageFault+0x428
fffff880`0d426a10 fffff800`034fdae5 : fffff880`0d426bc0 fffff880`00000003 fffff880`0d426fb8 fffff880`0d426fb0 : nt!CmpKcbCacheLookup+0x4f8
fffff880`0d426b00 fffff800`036bbd47 : fffff8a0`0000fca0 fffff880`0d426fb0 fffff880`0d427038 fffff880`0d426fe0 : nt!CmpBuildHashStackAndLookupCache+0x335
fffff880`0d426ee0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!CmpParseKey+0x5a7
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff800034fcb3a - nt!CmpKcbCacheLookup+4fa
[ f9:b9 ]
1 error : !nt (fffff800034fcb3a)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
MEMORY_CORRUPTOR: ONE_BIT
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OS_VERSION: 7.1.7601.24545
BUILDLAB_STR: win7sp1_ldr_escrow
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: memory_corruption
---------