Advertisement
Guest User

bsod#3

a guest
Sep 5th, 2013
72
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.55 KB | None | 0 0
  1. *******************************************************************************
  2. * *
  3. * Bugcheck Analysis *
  4. * *
  5. *******************************************************************************
  6.  
  7. SYSTEM_SERVICE_EXCEPTION (3b)
  8. An exception happened while executing a system service routine.
  9. Arguments:
  10. Arg1: 00000000c0000005, Exception code that caused the bugcheck
  11. Arg2: fffff80003e5ac70, Address of the instruction which caused the bugcheck
  12. Arg3: fffff88003fa4790, Address of the context record for the exception that caused the bugcheck
  13. Arg4: 0000000000000000, zero.
  14.  
  15. Debugging Details:
  16. ------------------
  17.  
  18.  
  19. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
  20.  
  21. FAULTING_IP:
  22. nt!PfpRpRehashIfNeeded+e0
  23. fffff800`03e5ac70 498b03 mov rax,qword ptr [r11]
  24.  
  25. CONTEXT: fffff88003fa4790 -- (.cxr 0xfffff88003fa4790)
  26. rax=fffff80003c708b1 rbx=0000000000002000 rcx=0000000000000074
  27. rdx=0f50677f67695f75 rsi=fffff80003c708b0 rdi=00000000000003a0
  28. rip=fffff80003e5ac70 rsp=fffff88003fa5170 rbp=0000000000000000
  29. r8=fffff8a00efe3000 r9=0000000000000074 r10=ffffffffffffffff
  30. r11=fffef8a003a8b580 r12=fffff88003fa51d8 r13=fffff8a0000ce000
  31. r14=fffff80003c708e0 r15=0000000000002000
  32. iopl=0 nv up ei pl zr na po nc
  33. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
  34. nt!PfpRpRehashIfNeeded+0xe0:
  35. fffff800`03e5ac70 498b03 mov rax,qword ptr [r11] ds:002b:fffef8a0`03a8b580=????????????????
  36. Resetting default scope
  37.  
  38. CUSTOMER_CRASH_COUNT: 1
  39.  
  40. DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
  41.  
  42. BUGCHECK_STR: 0x3B
  43.  
  44. PROCESS_NAME: svchost.exe
  45.  
  46. CURRENT_IRQL: 0
  47.  
  48. LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80003e5ac70
  49.  
  50. STACK_TEXT:
  51. fffff880`03fa5170 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PfpRpRehashIfNeeded+0xe0
  52.  
  53.  
  54. FOLLOWUP_IP:
  55. nt!PfpRpRehashIfNeeded+e0
  56. fffff800`03e5ac70 498b03 mov rax,qword ptr [r11]
  57.  
  58. SYMBOL_STACK_INDEX: 0
  59.  
  60. SYMBOL_NAME: nt!PfpRpRehashIfNeeded+e0
  61.  
  62. FOLLOWUP_NAME: MachineOwner
  63.  
  64. MODULE_NAME: nt
  65.  
  66. IMAGE_NAME: ntkrnlmp.exe
  67.  
  68. DEBUG_FLR_IMAGE_TIMESTAMP: 4d9fdd5b
  69.  
  70. STACK_COMMAND: .cxr 0xfffff88003fa4790 ; kb
  71.  
  72. FAILURE_BUCKET_ID: X64_0x3B_nt!PfpRpRehashIfNeeded+e0
  73.  
  74. BUCKET_ID: X64_0x3B_nt!PfpRpRehashIfNeeded+e0
  75.  
  76. Followup: MachineOwner
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement