Microsoft (R) Windows Debugger Version 10.0.19528.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Ross Cameron\Downloads\W7F_26-01-2020\012520-6875-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 18362 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff805`7dc00000 PsLoadedModuleList = 0xfffff805`7e048150
Debug session time: Sat Jan 25 22:04:26.840 2020 (UTC + 0:00)
System Uptime: 0 days 0:20:40.561
Loading Kernel Symbols
...............................................................
................................................................
.....................................................
Loading User Symbols
Loading unloaded module list
.......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`7ddc14e0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffe005`9910eea0=000000000000001e
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc000001d, The exception code that was not handled
Arg2: fffff8057ddc8ebe, The address that the exception occurred at
Arg3: ffff84052196b080, Parameter 0 of the exception
Arg4: ffffe0059910eb20, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-R3SQ3S0
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 5
Key : Analysis.Memory.CommitPeak.Mb
Value: 69
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc000001d
BUGCHECK_P2: fffff8057ddc8ebe
BUGCHECK_P3: ffff84052196b080
BUGCHECK_P4: ffffe0059910eb20
EXCEPTION_PARAMETER1: ffff84052196b080
EXCEPTION_PARAMETER2: ffffe0059910eb20
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: LEDKeeper.exe
FAILED_INSTRUCTION_ADDRESS:
nt!KiStartUserThread+4e
fffff805`7ddc8ebe 440f285980 movaps xmm11,xmmword ptr [rcx-80h]
STACK_TEXT:
ffffe005`9910ee98 fffff805`7de2fda7 : 00000000`0000001e ffffffff`c000001d fffff805`7ddc8ebe ffff8405`2196b080 : nt!KeBugCheckEx
ffffe005`9910eea0 fffff805`7ddd341d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x1689d7
ffffe005`9910f550 fffff805`7ddcd9ab : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x11d
ffffe005`9910f730 fffff805`7ddc8ebe : ffffd000`c91d6180 ffff8405`2196b080 ffffd000`c91e7440 00000000`00000000 : nt!KiInvalidOpcodeFault+0x32b
ffffe005`9910f8c0 fffff805`7ddc8e00 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartUserThread+0x4e
ffffe005`9910fa00 00007ffd`aebf17f0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartUserThreadReturn
00000000`00e5f5e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`aebf17f0
SYMBOL_NAME: nt!KiStartUserThread+4e
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.592
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 4e
FAILURE_BUCKET_ID: 0x1E_c000001d_BAD_IP_nt!KiStartUserThread
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {1c874fab-38ab-b8d4-3f72-89e0bab0a6d0}
Followup: MachineOwner