Advertisement
Guest User

Untitled

a guest
Aug 19th, 2015
303
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.14 KB | None | 0 0
  1. ************* Symbol Path validation summary **************
  2. Response Time (ms) Location
  3. Deferred SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
  4. Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
  5. Executable search path is:
  6. No .natvis files found at C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\Visualizers.
  7. Windows 10 Kernel Version 10240 MP (4 procs) Free x64
  8. Product: WinNt, suite: TerminalServer SingleUserTS
  9. Built by: 10240.16430.amd64fre.th1.150807-2049
  10. Machine Name:
  11. Kernel base = 0xfffff803`f8813000 PsLoadedModuleList = 0xfffff803`f8b38030
  12. Debug session time: Wed Aug 19 19:00:20.449 2015 (UTC - 7:00)
  13. System Uptime: 2 days 3:31:59.081
  14. Loading Kernel Symbols
  15. ...............................................................
  16. ................................................................
  17. ...........................................
  18. Loading User Symbols
  19. *******************************************************************************
  20. * *
  21. * Bugcheck Analysis *
  22. * *
  23. *******************************************************************************
  24.  
  25. Use !analyze -v to get detailed debugging information.
  26.  
  27. BugCheck 3B, {c0000005, 0, ffffd0010f124de0, 0}
  28.  
  29. *** WARNING: Unable to verify timestamp for win32kfull.sys
  30. *** ERROR: Module load completed but symbols could not be loaded for win32kfull.sys
  31. Probably caused by : win32kfull.sys ( win32kfull+62566 )
  32.  
  33. Followup: MachineOwner
  34. ---------
  35. 3: kd> !analyze -v
  36. *******************************************************************************
  37. * *
  38. * Bugcheck Analysis *
  39. * *
  40. *******************************************************************************
  41.  
  42. SYSTEM_SERVICE_EXCEPTION (3b)
  43. An exception happened while executing a system service routine.
  44. Arguments:
  45. Arg1: 00000000c0000005, Exception code that caused the bugcheck
  46. Arg2: 0000000000000000, Address of the instruction which caused the bugcheck
  47. Arg3: ffffd0010f124de0, Address of the context record for the exception that caused the bugcheck
  48. Arg4: 0000000000000000, zero.
  49.  
  50. Debugging Details:
  51. ------------------
  52.  
  53.  
  54. SYSTEM_SKU: To be filled by O.E.M.
  55.  
  56. SYSTEM_VERSION: 1.0
  57.  
  58. BIOS_DATE: 08/01/2012
  59.  
  60. BASEBOARD_PRODUCT: P67A-C43 (MS-7673)
  61.  
  62. BASEBOARD_VERSION: 1.0
  63.  
  64. BUGCHECK_P1: c0000005
  65.  
  66. BUGCHECK_P2: 0
  67.  
  68. BUGCHECK_P3: ffffd0010f124de0
  69.  
  70. BUGCHECK_P4: 0
  71.  
  72. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  73.  
  74. FAULTING_IP:
  75. +0
  76. 00000000`00000000 ?? ???
  77.  
  78. CONTEXT: ffffd0010f124de0 -- (.cxr 0xffffd0010f124de0)
  79. rax=0000000000000000 rbx=0000000000000000 rcx=fffff90140925b98
  80. rdx=0000000000000000 rsi=fffff90144a4bb20 rdi=fffff901440b2010
  81. rip=0000000000000000 rsp=ffffd0010f125808 rbp=ffffd0010f125890
  82. r8=0000000000000001 r9=000000000000c038 r10=0000000000000000
  83. r11=ffffd0010f125848 r12=00000000ffffffff r13=0000000000000001
  84. r14=0000000000000000 r15=0000000000000000
  85. iopl=0 nv up ei ng nz ac po nc
  86. cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00010296
  87. 00000000`00000000 ?? ???
  88. Resetting default scope
  89.  
  90. CPU_COUNT: 4
  91.  
  92. CPU_MHZ: cdd
  93.  
  94. CPU_VENDOR: GenuineIntel
  95.  
  96. CPU_FAMILY: 6
  97.  
  98. CPU_MODEL: 2a
  99.  
  100. CPU_STEPPING: 7
  101.  
  102. CUSTOMER_CRASH_COUNT: 1
  103.  
  104. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  105.  
  106. BUGCHECK_STR: 0x3B
  107.  
  108. PROCESS_NAME: dwm.exe
  109.  
  110. CURRENT_IRQL: 0
  111.  
  112. ANALYSIS_VERSION: 10.0.10240.9 amd64fre
  113.  
  114. LAST_CONTROL_TRANSFER: from fffff96060862566 to 0000000000000000
  115.  
  116. IP_IN_FREE_BLOCK: 0
  117.  
  118. STACK_TEXT:
  119. ffffd001`0f125808 fffff960`60862566 : fffff901`408ff840 ffffd001`0f125890 00000000`00000000 ffffd001`0f125890 : 0x0
  120. ffffd001`0f125810 fffff901`408ff840 : ffffd001`0f125890 00000000`00000000 ffffd001`0f125890 fffff901`408ff840 : win32kfull+0x62566
  121. ffffd001`0f125818 ffffd001`0f125890 : 00000000`00000000 ffffd001`0f125890 fffff901`408ff840 fffff960`60851d52 : 0xfffff901`408ff840
  122. ffffd001`0f125820 00000000`00000000 : ffffd001`0f125890 fffff901`408ff840 fffff960`60851d52 fffff901`408ff840 : 0xffffd001`0f125890
  123.  
  124.  
  125. FOLLOWUP_IP:
  126. win32kfull+62566
  127. fffff960`60862566 ?? ???
  128.  
  129. SYMBOL_STACK_INDEX: 1
  130.  
  131. SYMBOL_NAME: win32kfull+62566
  132.  
  133. FOLLOWUP_NAME: MachineOwner
  134.  
  135. MODULE_NAME: win32kfull
  136.  
  137. IMAGE_NAME: win32kfull.sys
  138.  
  139. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  140.  
  141. STACK_COMMAND: .cxr 0xffffd0010f124de0 ; kb
  142.  
  143. BUCKET_ID_FUNC_OFFSET: 62566
  144.  
  145. FAILURE_BUCKET_ID: 0x3B_win32kfull!Unknown_Function
  146.  
  147. BUCKET_ID: 0x3B_win32kfull!Unknown_Function
  148.  
  149. PRIMARY_PROBLEM_CLASS: 0x3B_win32kfull!Unknown_Function
  150.  
  151. ANALYSIS_SOURCE: KM
  152.  
  153. FAILURE_ID_HASH_STRING: km:0x3b_win32kfull!unknown_function
  154.  
  155. FAILURE_ID_HASH: {553b7009-0f62-111b-87b6-11c078ff09d8}
  156.  
  157. Followup: MachineOwner
  158. ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement