Advertisement
Guest User

heroesbsod102

a guest
May 10th, 2016
144
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.96 KB | None | 0 0
  1. Kernel base = 0xfffff801`6628a000 PsLoadedModuleList = 0xfffff801`66568cd0
  2. Debug session time: Tue May 10 20:06:46.872 2016 (UTC - 4:00)
  3. System Uptime: 0 days 0:01:11.504
  4. *******************************************************************************
  5. * *
  6. * Bugcheck Analysis *
  7. * *
  8. *******************************************************************************
  9.  
  10. SYSTEM_SERVICE_EXCEPTION (3b)
  11. An exception happened while executing a system service routine.
  12. Arguments:
  13. Arg1: 00000000c0000096, Exception code that caused the bugcheck
  14. Arg2: fffff801663ccccc, Address of the instruction which caused the bugcheck
  15. Arg3: ffffd000f1ca70d0, Address of the context record for the exception that caused the bugcheck
  16. Arg4: 0000000000000000, zero.
  17.  
  18. Debugging Details:
  19. ------------------
  20.  
  21. TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
  22.  
  23. EXCEPTION_CODE: (NTSTATUS) 0xc0000096 - {EXCEPTION} Privileged instruction.
  24.  
  25. FAULTING_IP:
  26. nt!KiSaveDebugRegisterState+5c
  27. fffff801`663ccccc 0f32 rdmsr
  28.  
  29. CONTEXT: ffffd000f1ca70d0 -- (.cxr 0xffffd000f1ca70d0)
  30. rax=0000000000000000 rbx=ffffe00099d92500 rcx=00000000000001c9
  31. rdx=0000000000000555 rsi=0000000006b6e148 rdi=0000000006e76160
  32. rip=fffff801663ccccc rsp=ffffd000f1ca7af8 rbp=ffffd000f1ca7b80
  33. r8=00000000000001c9 r9=ffffd000f01e8000 r10=0000000003f58d38
  34. r11=0000000000000246 r12=0000000000000020 r13=0000000000000002
  35. r14=0000000003f58d38 r15=0000000000000000
  36. iopl=0 nv up di pl nz na po nc
  37. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010006
  38. nt!KiSaveDebugRegisterState+0x5c:
  39. fffff801`663ccccc 0f32 rdmsr
  40. Resetting default scope
  41.  
  42. CUSTOMER_CRASH_COUNT: 1
  43.  
  44. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  45.  
  46. BUGCHECK_STR: 0x3B
  47.  
  48. PROCESS_NAME: HeroesOfTheSto
  49.  
  50. CURRENT_IRQL: 0
  51.  
  52. LAST_CONTROL_TRANSFER: from fffff801663d6da3 to fffff801663ccccc
  53.  
  54. STACK_TEXT:
  55. ffffd000`f1ca7af8 fffff801`663d6da3 : ffffe000`99d92500 00000000`00000000 ffffe000`99d92500 ffffe000`992dc1d0 : nt!KiSaveDebugRegisterState+0x5c
  56. ffffd000`f1ca7b00 00007ffb`971357c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceUser+0x53
  57. 00000000`03f58c48 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7ffb`971357c4
  58.  
  59.  
  60. FOLLOWUP_IP:
  61. nt!KiSaveDebugRegisterState+5c
  62. fffff801`663ccccc 0f32 rdmsr
  63.  
  64. SYMBOL_STACK_INDEX: 0
  65.  
  66. SYMBOL_NAME: nt!KiSaveDebugRegisterState+5c
  67.  
  68. FOLLOWUP_NAME: MachineOwner
  69.  
  70. MODULE_NAME: nt
  71.  
  72. IMAGE_NAME: ntkrnlmp.exe
  73.  
  74. DEBUG_FLR_IMAGE_TIMESTAMP: 571af445
  75.  
  76. STACK_COMMAND: .cxr 0xffffd000f1ca70d0 ; kb
  77.  
  78. FAILURE_BUCKET_ID: X64_0x3B_nt!KiSaveDebugRegisterState+5c
  79.  
  80. BUCKET_ID: X64_0x3B_nt!KiSaveDebugRegisterState+5c
  81.  
  82. Followup: MachineOwner
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement