Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Opened \\.\com3
- Waiting to reconnect...
- BD: Boot Debugger Initialized
- Connected to Windows Boot Debugger 6001 x64 target at (Thu May 30 07:16:57.873 2024 (UTC + 2:00)), ptr64 TRUE
- Kernel Debugger connection established.
- Symbol search path is: C:\Windows\Symbols
- Executable search path is:
- *** ERROR: Module load completed but symbols could not be loaded for winload.efi
- Windows Boot Debugger Kernel Version 6001 UP Free x64
- Machine Name:
- Primary image base = 0x00000000`00350000 Loaded module list = 0x00000000`00466c40
- System Uptime: not available
- Shutdown occurred at (Thu May 30 07:17:03.045 2024 (UTC + 2:00))...unloading all symbol tables.
- Waiting to reconnect...
- Connected to Windows Server 2003 3790 x64 target at (Thu May 30 07:17:03.936 2024 (UTC + 2:00)), ptr64 TRUE
- Kernel Debugger connection established.
- Symbol search path is: C:\Windows\Symbols
- Executable search path is:
- Windows Server 2003 Kernel Version 3790 MP (1 procs) Free x64
- Built by: 3790.srv03_sp2_rtm.070216-1710
- Machine Name:
- Kernel base = 0xfffff800`01600000 PsLoadedModuleList = 0xfffff800`017d5100
- System Uptime: not available
- KDTARGET: Refreshing KD connection
- gLog = 723d3000 , index = FFFFFADE505D9400Break instruction exception - code 80000003 (first chance)
- *******************************************************************************
- * *
- * You are seeing this message because you pressed either *
- * CTRL+C (if you run kd.exe) or, *
- * CTRL+BREAK (if you run WinDBG), *
- * on your debugger machine's keyboard. *
- * *
- * THIS IS NOT A BUG OR A SYSTEM CRASH *
- * *
- * If you did not intend to break into the debugger, press the "g" key, then *
- * press the "Enter" key now. This message might immediately reappear. If it *
- * does, press "g" and "Enter" again. *
- * *
- *******************************************************************************
- nt!DbgBreakPointWithStatus:
- fffff800`01626db0 cc int 3
- *** WARNING: Unable to verify timestamp for ntdll.dll
- 3: kd> !analyze -v
- Connected to Windows Server 2003 3790 x64 target at (Thu May 30 07:18:47.987 2024 (UTC + 2:00)), ptr64 TRUE
- Loading Kernel Symbols
- ...............................................................
- ......................................
- Loading User Symbols
- Loading unloaded module list
- .......
- *** ERROR: Module load completed but symbols could not be loaded for intelppm.sys
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- Unknown bugcheck code (0)
- Unknown bugcheck description
- Arguments:
- Arg1: 0000000000000000
- Arg2: 0000000000000000
- Arg3: 0000000000000000
- Arg4: 0000000000000000
- Debugging Details:
- ------------------
- PROCESS_NAME: Idle
- FAULTING_IP:
- nt!DbgBreakPointWithStatus+0
- fffff800`01626db0 cc int 3
- EXCEPTION_RECORD: ffffffffffffffff -- (.exr 0xffffffffffffffff)
- ExceptionAddress: fffff80001626db0 (nt!DbgBreakPointWithStatus)
- ExceptionCode: 80000003 (Break instruction exception)
- ExceptionFlags: 00000000
- NumberParameters: 1
- Parameter[0]: 0000000000000000
- ERROR_CODE: (NTSTATUS) 0x80000003 - {EXCEPTION} Breakpoint A breakpoint has been reached.
- EXCEPTION_CODE: (HRESULT) 0x80000003 (2147483651) - One or more arguments are invalid
- EXCEPTION_PARAMETER1: 0000000000000000
- DEFAULT_BUCKET_ID: DRIVER_FAULT
- BUGCHECK_STR: 0x0
- CURRENT_IRQL: d
- STACK_TEXT:
- fffffade`5ea32b38 fffff800`016791ff : 00000000`00000062 00000000`00000000 00000000`00000000 00000000`00000000 : nt!DbgBreakPointWithStatus
- fffffade`5ea32b40 fffff800`016299fb : fffffade`00000004 fffff800`016680c9 fffffade`5e6cb180 fffffade`7318c0d0 : nt!KdCheckForDebugBreak+0xb5
- fffffade`5ea32b80 fffff800`01629794 : fffffade`5e6cd480 fffffade`5ea32c30 fffffade`5e6cd480 fffffade`7318c0d0 : nt!KeUpdateRunTime+0x19e
- fffffade`5ea32bb0 fffffade`5e309b42 : fffffade`5e309759 fffff800`017b5940 fffffade`73ce3bf0 fffffade`5ea32d70 : nt!KiSecondaryClockInterrupt+0xe4
- fffffade`5ea32d48 fffffade`5e309759 : fffff800`017b5940 fffffade`73ce3bf0 fffffade`5ea32d70 fffffade`7318c0d0 : intelppm+0x3b42
- fffffade`5ea32d50 fffff800`016319cc : fffffade`5e6cd600 fffff800`017b5901 fffffade`5e6cd450 00000000`00000000 : intelppm+0x3759
- fffffade`5ea32d80 fffff800`01667cde : fffffade`5e6cb180 fffffade`5e6cb180 fffffade`5e6d3680 fffffade`73ce3bf0 : nt!PopProcessorIdle+0x114
- fffffade`5ea32db0 fffff800`01a151d1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x1e
- fffffade`5ea32de0 00000000`fffffade : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemStartup+0x1bf
- fffffade`5e6cd640 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00680000`00000000 : 0xfffffade
- STACK_COMMAND: kb
- FOLLOWUP_IP:
- nt!DbgBreakPointWithStatus+0
- fffff800`01626db0 cc int 3
- SYMBOL_STACK_INDEX: 0
- SYMBOL_NAME: nt!DbgBreakPointWithStatus+0
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- DEBUG_FLR_IMAGE_TIMESTAMP: 45d69ab4
- BUCKET_ID: MANUAL_BREAKIN
- Followup: MachineOwner
- ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement