Advertisement
Guest User

heroesbsod101

a guest
May 10th, 2016
110
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.34 KB | None | 0 0
  1. Machine Name:
  2. Kernel base = 0xfffff800`e5010000 PsLoadedModuleList = 0xfffff800`e52eecd0
  3. Debug session time: Tue May 10 18:57:01.191 2016 (UTC - 4:00)
  4. System Uptime: 0 days 0:00:19.759
  5. *******************************************************************************
  6. * *
  7. * Bugcheck Analysis *
  8. * *
  9. *******************************************************************************
  10.  
  11. SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
  12. This is a very common bugcheck. Usually the exception address pinpoints
  13. the driver/function that caused the problem. Always note this address
  14. as well as the link date of the driver/image that contains this address.
  15. Some common problems are exception code 0x80000003. This means a hard
  16. coded breakpoint or assertion was hit, but this system was booted
  17. /NODEBUG. This is not supposed to happen as developers should never have
  18. hardcoded breakpoints in retail code, but ...
  19. If this happens, make sure a debugger gets connected, and the
  20. system is booted /DEBUG. This will let us see why this breakpoint is
  21. happening.
  22. Arguments:
  23. Arg1: ffffffffc0000096, The exception code that was not handled
  24. Arg2: fffff80165633ec7, The address that the exception occurred at
  25. Arg3: ffffd001e3aca888, Exception Record Address
  26. Arg4: ffffd001e3aca0a0, Context Record Address
  27.  
  28. Debugging Details:
  29. ------------------
  30.  
  31. TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
  32.  
  33. EXCEPTION_CODE: (NTSTATUS) 0xc0000096 - {EXCEPTION} Privileged instruction.
  34.  
  35. FAULTING_IP:
  36. atikmdag+213ec7
  37. fffff801`65633ec7 0f33 rdpmc
  38.  
  39. EXCEPTION_RECORD: ffffd001e3aca888 -- (.exr 0xffffd001e3aca888)
  40. ExceptionAddress: fffff80165633ec7 (atikmdag+0x0000000000213ec7)
  41. ExceptionCode: c0000096
  42. ExceptionFlags: 00000000
  43. NumberParameters: 0
  44.  
  45. CONTEXT: ffffd001e3aca0a0 -- (.cxr 0xffffd001e3aca0a0)
  46. rax=ffffffff05f9e652 rbx=ffffffff05f9e652 rcx=0000000000000000
  47. rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
  48. rip=fffff80165633ec7 rsp=ffffd001e3acaac8 rbp=ffffd001e3acabe0
  49. r8=000000007263694d r9=0000000000100000 r10=0000000000000000
  50. r11=ffffffff05f9e652 r12=0000000000000000 r13=0000000000000000
  51. r14=0000000000000000 r15=0000000000000001
  52. iopl=0 nv up ei ng nz na pe nc
  53. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282
  54. atikmdag+0x213ec7:
  55. fffff801`65633ec7 0f33 rdpmc
  56. Resetting default scope
  57.  
  58. CUSTOMER_CRASH_COUNT: 1
  59.  
  60. PROCESS_NAME: System
  61.  
  62. CURRENT_IRQL: 0
  63.  
  64. ERROR_CODE: (NTSTATUS) 0xc0000096 - {EXCEPTION} Privileged instruction.
  65.  
  66. BUGCHECK_STR: AV
  67.  
  68. DEFAULT_BUCKET_ID: STATUS_PRIVILEGED_INSTRUCTION
  69.  
  70. EXCEPTION_STR: 0x0
  71.  
  72. LAST_CONTROL_TRANSFER: from fffff8016562980d to fffff80165633ec7
  73.  
  74. STACK_TEXT:
  75. ffffd001`e3acaac8 fffff801`6562980d : fffff801`656629f0 ffffe000`16022000 ffffd001`e3b80000 00000000`0000c000 : atikmdag+0x213ec7
  76. ffffd001`e3acaad0 fffff801`656629f0 : ffffe000`16022000 ffffd001`e3b80000 00000000`0000c000 ffffd001`e3acabe0 : atikmdag+0x20980d
  77. ffffd001`e3acaad8 ffffe000`16022000 : ffffd001`e3b80000 00000000`0000c000 ffffd001`e3acabe0 fffff801`663bfe2c : atikmdag+0x2429f0
  78. ffffd001`e3acaae0 ffffd001`e3b80000 : 00000000`0000c000 ffffd001`e3acabe0 fffff801`663bfe2c 00000000`00000000 : 0xffffe000`16022000
  79. ffffd001`e3acaae8 00000000`0000c000 : ffffd001`e3acabe0 fffff801`663bfe2c 00000000`00000000 0000001f`16022010 : 0xffffd001`e3b80000
  80. ffffd001`e3acaaf0 ffffd001`e3acabe0 : fffff801`663bfe2c 00000000`00000000 0000001f`16022010 ffffd001`00000008 : 0xc000
  81. ffffd001`e3acaaf8 fffff801`663bfe2c : 00000000`00000000 0000001f`16022010 ffffd001`00000008 7263694d`40000005 : 0xffffd001`e3acabe0
  82. ffffd001`e3acab00 00000000`00000000 : 0000001f`16022010 ffffd001`00000008 7263694d`40000005 76482074`666f736f : atikmdag+0xf9fe2c
  83.  
  84.  
  85. FOLLOWUP_IP:
  86. atikmdag+213ec7
  87. fffff801`65633ec7 0f33 rdpmc
  88.  
  89. SYMBOL_STACK_INDEX: 0
  90.  
  91. SYMBOL_NAME: atikmdag+213ec7
  92.  
  93. FOLLOWUP_NAME: MachineOwner
  94.  
  95. MODULE_NAME: atikmdag
  96.  
  97. IMAGE_NAME: atikmdag.sys
  98.  
  99. DEBUG_FLR_IMAGE_TIMESTAMP: 56f002ff
  100.  
  101. STACK_COMMAND: .cxr 0xffffd001e3aca0a0 ; kb
  102.  
  103. FAILURE_BUCKET_ID: X64_AV_atikmdag+213ec7
  104.  
  105. BUCKET_ID: X64_AV_atikmdag+213ec7
  106.  
  107. Followup: MachineOwner
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement