Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 6.3.9600.17336 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Windows\Minidump\061817-7265-01.dmp]
- Mini Kernel Dump File: Only registers and stack trace are available
- ************* Symbol Path validation summary **************
- Response Time (ms) Location
- Deferred srv*C:\DbgSymbols*http://msdl.microsoft.com/download/symbols
- Symbol search path is: srv*C:\DbgSymbols*http://msdl.microsoft.com/download/symbols
- Executable search path is:
- Windows 8 Kernel Version 15063 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Machine Name:
- Kernel base = 0xfffff803`5c809000 PsLoadedModuleList = 0xfffff803`5cb555a0
- Debug session time: Sun Jun 18 13:29:17.600 2017 (UTC + 2:00)
- System Uptime: 0 days 0:41:30.336
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- ..........................................
- Loading User Symbols
- Loading unloaded module list
- ..........
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- Use !analyze -v to get detailed debugging information.
- BugCheck 3B, {c000001d, fffff8035c980322, ffff918080f76110, 0}
- Probably caused by : memory_corruption
- Followup: memory_corruption
- ---------
- 2: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- SYSTEM_SERVICE_EXCEPTION (3b)
- An exception happened while executing a system service routine.
- Arguments:
- Arg1: 00000000c000001d, Exception code that caused the bugcheck
- Arg2: fffff8035c980322, Address of the instruction which caused the bugcheck
- Arg3: ffff918080f76110, Address of the context record for the exception that caused the bugcheck
- Arg4: 0000000000000000, zero.
- Debugging Details:
- ------------------
- EXCEPTION_CODE: (NTSTATUS) 0xc000001d - {AUSNAHME} Ung ltige Anweisung Es wurde versucht, eine ung ltige Anweisung auszuf hren.
- FAULTING_IP:
- nt!KiSystemServiceExit+7
- fffff803`5c980322 488bbdc8000000 mov rdi,qword ptr [rbp+0C8h]
- CONTEXT: ffff918080f76110 -- (.cxr 0xffff918080f76110;r)
- rax=0000000000000000 rbx=0000000000000000 rcx=0dcdf36c07480000
- rdx=000000000000002d rsi=000000000000000a rdi=0000000000000000
- rip=fffff8035c980322 rsp=ffff918080f76b00 rbp=ffff918080f76b80
- r8=00000000ffffffff r9=0000000000000004 r10=0000000000000000
- r11=fffff8035c809000 r12=0000000000000000 r13=0000000000000000
- r14=0000002df485fbb0 r15=000001981413d7e0
- iopl=0 nv up ei pl nz ac po nc
- cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010216
- nt!KiSystemServiceExit+0x7:
- fffff803`5c980322 488bbdc8000000 mov rdi,qword ptr [rbp+0C8h] ss:0018:ffff9180`80f76c48=0000000000000000
- Last set context:
- rax=0000000000000000 rbx=0000000000000000 rcx=0dcdf36c07480000
- rdx=000000000000002d rsi=000000000000000a rdi=0000000000000000
- rip=fffff8035c980322 rsp=ffff918080f76b00 rbp=ffff918080f76b80
- r8=00000000ffffffff r9=0000000000000004 r10=0000000000000000
- r11=fffff8035c809000 r12=0000000000000000 r13=0000000000000000
- r14=0000002df485fbb0 r15=000001981413d7e0
- iopl=0 nv up ei pl nz ac po nc
- cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010216
- nt!KiSystemServiceExit+0x7:
- fffff803`5c980322 488bbdc8000000 mov rdi,qword ptr [rbp+0C8h] ss:0018:ffff9180`80f76c48=0000000000000000
- Resetting default scope
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- BUGCHECK_STR: 0x3B
- PROCESS_NAME: ts3client_win6
- CURRENT_IRQL: 0
- ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre
- LAST_CONTROL_TRANSFER: from 00007fffe71b5a34 to fffff8035c980322
- STACK_TEXT:
- ffff9180`80f76b00 00007fff`e71b5a34 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x7
- 0000002d`f485fb88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`e71b5a34
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff8035ca89384-fffff8035ca89385 2 bytes - nt!ExFreePoolWithTag+364
- [ fb f6:f2 e4 ]
- 2 errors : !nt (fffff8035ca89384-fffff8035ca89385)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- STACK_COMMAND: .cxr 0xffff918080f76110 ; kb
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement