Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 10.0.10240.9 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Windows\Minidump\112715-5359-01.dmp]
- Mini Kernel Dump File: Only registers and stack trace are available
- ************* Symbol Path validation summary **************
- Response Time (ms) Location
- Deferred SRV*C:\symbols*http://msdl.microsoft.com/download/symbols
- Symbol search path is: SRV*C:\symbols*http://msdl.microsoft.com/download/symbols
- Executable search path is:
- No .natvis files found at C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\Visualizers.
- Windows 10 Kernel Version 10586 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 10586.11.amd64fre.th2_release.151112-1900
- Machine Name:
- Kernel base = 0xfffff802`69c1f000 PsLoadedModuleList = 0xfffff802`69efdc70
- Debug session time: Fri Nov 27 14:46:47.479 2015 (UTC - 5:00)
- System Uptime: 0 days 2:12:29.118
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- ...............................
- Loading User Symbols
- Loading unloaded module list
- ..................
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- Use !analyze -v to get detailed debugging information.
- BugCheck 1E, {ffffffffc0000096, fffff80269d619ac, 0, 0}
- Probably caused by : ntkrnlmp.exe ( nt!KiSaveDebugRegisterState+5c )
- Followup: MachineOwner
- ---------
- 0: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- KMODE_EXCEPTION_NOT_HANDLED (1e)
- This is a very common bugcheck. Usually the exception address pinpoints
- the driver/function that caused the problem. Always note this address
- as well as the link date of the driver/image that contains this address.
- Arguments:
- Arg1: ffffffffc0000096, The exception code that was not handled
- Arg2: fffff80269d619ac, The address that the exception occurred at
- Arg3: 0000000000000000, Parameter 0 of the exception
- Arg4: 0000000000000000, Parameter 1 of the exception
- Debugging Details:
- ------------------
- BUGCHECK_P1: ffffffffc0000096
- BUGCHECK_P2: fffff80269d619ac
- BUGCHECK_P3: 0
- BUGCHECK_P4: 0
- EXCEPTION_CODE: (NTSTATUS) 0xc0000096 - {EXCEPTION} Privileged instruction.
- FAULTING_IP:
- nt!KiSaveDebugRegisterState+5c
- fffff802`69d619ac 0f32 rdmsr
- BUGCHECK_STR: 0x1E_c0000096
- CPU_COUNT: 4
- CPU_MHZ: e12
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 3c
- CPU_STEPPING: 3
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- PROCESS_NAME: HeroesOfTheSto
- CURRENT_IRQL: 0
- ANALYSIS_VERSION: 10.0.10240.9 amd64fre
- LAST_CONTROL_TRANSFER: from fffff80269d923b0 to fffff80269d61460
- STACK_TEXT:
- ffffd000`22eee098 fffff802`69d923b0 : 00000000`0000001e ffffffff`c0000096 fffff802`69d619ac 00000000`00000000 : nt!KeBugCheckEx
- ffffd000`22eee0a0 fffff802`69d6c0c2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x225b0
- ffffd000`22eee780 fffff802`69d6a57d : ffffe001`e333b080 00000000`00000000 ffffd000`22eeeb00 ffffe001`e333b580 : nt!KiExceptionDispatch+0xc2
- ffffd000`22eee960 fffff802`69d619ac : fffff802`69d648bf ffffe001`e4391000 00000000`00000000 ffffe001`e4391080 : nt!KiGeneralProtectionFault+0xfd
- ffffd000`22eeeaf8 fffff802`69d648bf : ffffe001`e4391000 00000000`00000000 ffffe001`e4391080 ffffd000`22eeeb80 : nt!KiSaveDebugRegisterState+0x5c
- ffffd000`22eeeb00 00007ffd`1dc65c2e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDpcInterrupt+0x5f
- 00000000`03f59330 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`1dc65c2e
- STACK_COMMAND: kb
- FOLLOWUP_IP:
- nt!KiSaveDebugRegisterState+5c
- fffff802`69d619ac 0f32 rdmsr
- SYMBOL_STACK_INDEX: 4
- SYMBOL_NAME: nt!KiSaveDebugRegisterState+5c
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- DEBUG_FLR_IMAGE_TIMESTAMP: 56457780
- IMAGE_VERSION: 10.0.10586.11
- BUCKET_ID_FUNC_OFFSET: 5c
- FAILURE_BUCKET_ID: 0x1E_c0000096_nt!KiSaveDebugRegisterState
- BUCKET_ID: 0x1E_c0000096_nt!KiSaveDebugRegisterState
- PRIMARY_PROBLEM_CLASS: 0x1E_c0000096_nt!KiSaveDebugRegisterState
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:0x1e_c0000096_nt!kisavedebugregisterstate
- FAILURE_ID_HASH: {0bd99c55-d8f8-3ac2-60cb-53208fc267f8}
- Followup: MachineOwner
- ---------
- 0: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- KMODE_EXCEPTION_NOT_HANDLED (1e)
- This is a very common bugcheck. Usually the exception address pinpoints
- the driver/function that caused the problem. Always note this address
- as well as the link date of the driver/image that contains this address.
- Arguments:
- Arg1: ffffffffc0000096, The exception code that was not handled
- Arg2: fffff80269d619ac, The address that the exception occurred at
- Arg3: 0000000000000000, Parameter 0 of the exception
- Arg4: 0000000000000000, Parameter 1 of the exception
- Debugging Details:
- ------------------
- BUGCHECK_P1: ffffffffc0000096
- BUGCHECK_P2: fffff80269d619ac
- BUGCHECK_P3: 0
- BUGCHECK_P4: 0
- EXCEPTION_CODE: (NTSTATUS) 0xc0000096 - {EXCEPTION} Privileged instruction.
- FAULTING_IP:
- nt!KiSaveDebugRegisterState+5c
- fffff802`69d619ac 0f32 rdmsr
- BUGCHECK_STR: 0x1E_c0000096
- CPU_COUNT: 4
- CPU_MHZ: e12
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 3c
- CPU_STEPPING: 3
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- PROCESS_NAME: HeroesOfTheSto
- CURRENT_IRQL: 0
- ANALYSIS_VERSION: 10.0.10240.9 amd64fre
- LAST_CONTROL_TRANSFER: from fffff80269d923b0 to fffff80269d61460
- STACK_TEXT:
- ffffd000`22eee098 fffff802`69d923b0 : 00000000`0000001e ffffffff`c0000096 fffff802`69d619ac 00000000`00000000 : nt!KeBugCheckEx
- ffffd000`22eee0a0 fffff802`69d6c0c2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x225b0
- ffffd000`22eee780 fffff802`69d6a57d : ffffe001`e333b080 00000000`00000000 ffffd000`22eeeb00 ffffe001`e333b580 : nt!KiExceptionDispatch+0xc2
- ffffd000`22eee960 fffff802`69d619ac : fffff802`69d648bf ffffe001`e4391000 00000000`00000000 ffffe001`e4391080 : nt!KiGeneralProtectionFault+0xfd
- ffffd000`22eeeaf8 fffff802`69d648bf : ffffe001`e4391000 00000000`00000000 ffffe001`e4391080 ffffd000`22eeeb80 : nt!KiSaveDebugRegisterState+0x5c
- ffffd000`22eeeb00 00007ffd`1dc65c2e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDpcInterrupt+0x5f
- 00000000`03f59330 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`1dc65c2e
- STACK_COMMAND: kb
- FOLLOWUP_IP:
- nt!KiSaveDebugRegisterState+5c
- fffff802`69d619ac 0f32 rdmsr
- SYMBOL_STACK_INDEX: 4
- SYMBOL_NAME: nt!KiSaveDebugRegisterState+5c
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- DEBUG_FLR_IMAGE_TIMESTAMP: 56457780
- IMAGE_VERSION: 10.0.10586.11
- BUCKET_ID_FUNC_OFFSET: 5c
- FAILURE_BUCKET_ID: 0x1E_c0000096_nt!KiSaveDebugRegisterState
- BUCKET_ID: 0x1E_c0000096_nt!KiSaveDebugRegisterState
- PRIMARY_PROBLEM_CLASS: 0x1E_c0000096_nt!KiSaveDebugRegisterState
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:0x1e_c0000096_nt!kisavedebugregisterstate
- FAILURE_ID_HASH: {0bd99c55-d8f8-3ac2-60cb-53208fc267f8}
- Followup: MachineOwner
- ---------
- 0: kd> !analyze -v
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement