Advertisement
Guest User

Untitled

a guest
Jun 18th, 2017
130
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.39 KB | None | 0 0
  1.  
  2. Microsoft (R) Windows Debugger Version 6.3.9600.17336 AMD64
  3. Copyright (c) Microsoft Corporation. All rights reserved.
  4.  
  5.  
  6. Loading Dump File [C:\Windows\Minidump\061817-7265-01.dmp]
  7. Mini Kernel Dump File: Only registers and stack trace are available
  8.  
  9.  
  10. ************* Symbol Path validation summary **************
  11. Response Time (ms) Location
  12. Deferred srv*C:\DbgSymbols*http://msdl.microsoft.com/download/symbols
  13. Symbol search path is: srv*C:\DbgSymbols*http://msdl.microsoft.com/download/symbols
  14. Executable search path is:
  15. Windows 8 Kernel Version 15063 MP (8 procs) Free x64
  16. Product: WinNt, suite: TerminalServer SingleUserTS
  17. Built by: 15063.0.amd64fre.rs2_release.170317-1834
  18. Machine Name:
  19. Kernel base = 0xfffff803`5c809000 PsLoadedModuleList = 0xfffff803`5cb555a0
  20. Debug session time: Sun Jun 18 13:29:17.600 2017 (UTC + 2:00)
  21. System Uptime: 0 days 0:41:30.336
  22. Loading Kernel Symbols
  23. ...............................................................
  24. ................................................................
  25. ..........................................
  26. Loading User Symbols
  27. Loading unloaded module list
  28. ..........
  29. *******************************************************************************
  30. * *
  31. * Bugcheck Analysis *
  32. * *
  33. *******************************************************************************
  34.  
  35. Use !analyze -v to get detailed debugging information.
  36.  
  37. BugCheck 3B, {c000001d, fffff8035c980322, ffff918080f76110, 0}
  38.  
  39. Probably caused by : memory_corruption
  40.  
  41. Followup: memory_corruption
  42. ---------
  43.  
  44. 2: kd> !analyze -v
  45. *******************************************************************************
  46. * *
  47. * Bugcheck Analysis *
  48. * *
  49. *******************************************************************************
  50.  
  51. SYSTEM_SERVICE_EXCEPTION (3b)
  52. An exception happened while executing a system service routine.
  53. Arguments:
  54. Arg1: 00000000c000001d, Exception code that caused the bugcheck
  55. Arg2: fffff8035c980322, Address of the instruction which caused the bugcheck
  56. Arg3: ffff918080f76110, Address of the context record for the exception that caused the bugcheck
  57. Arg4: 0000000000000000, zero.
  58.  
  59. Debugging Details:
  60. ------------------
  61.  
  62.  
  63. EXCEPTION_CODE: (NTSTATUS) 0xc000001d - {AUSNAHME} Ung ltige Anweisung Es wurde versucht, eine ung ltige Anweisung auszuf hren.
  64.  
  65. FAULTING_IP:
  66. nt!KiSystemServiceExit+7
  67. fffff803`5c980322 488bbdc8000000 mov rdi,qword ptr [rbp+0C8h]
  68.  
  69. CONTEXT: ffff918080f76110 -- (.cxr 0xffff918080f76110;r)
  70. rax=0000000000000000 rbx=0000000000000000 rcx=0dcdf36c07480000
  71. rdx=000000000000002d rsi=000000000000000a rdi=0000000000000000
  72. rip=fffff8035c980322 rsp=ffff918080f76b00 rbp=ffff918080f76b80
  73. r8=00000000ffffffff r9=0000000000000004 r10=0000000000000000
  74. r11=fffff8035c809000 r12=0000000000000000 r13=0000000000000000
  75. r14=0000002df485fbb0 r15=000001981413d7e0
  76. iopl=0 nv up ei pl nz ac po nc
  77. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010216
  78. nt!KiSystemServiceExit+0x7:
  79. fffff803`5c980322 488bbdc8000000 mov rdi,qword ptr [rbp+0C8h] ss:0018:ffff9180`80f76c48=0000000000000000
  80. Last set context:
  81. rax=0000000000000000 rbx=0000000000000000 rcx=0dcdf36c07480000
  82. rdx=000000000000002d rsi=000000000000000a rdi=0000000000000000
  83. rip=fffff8035c980322 rsp=ffff918080f76b00 rbp=ffff918080f76b80
  84. r8=00000000ffffffff r9=0000000000000004 r10=0000000000000000
  85. r11=fffff8035c809000 r12=0000000000000000 r13=0000000000000000
  86. r14=0000002df485fbb0 r15=000001981413d7e0
  87. iopl=0 nv up ei pl nz ac po nc
  88. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010216
  89. nt!KiSystemServiceExit+0x7:
  90. fffff803`5c980322 488bbdc8000000 mov rdi,qword ptr [rbp+0C8h] ss:0018:ffff9180`80f76c48=0000000000000000
  91. Resetting default scope
  92.  
  93. CUSTOMER_CRASH_COUNT: 1
  94.  
  95. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  96.  
  97. BUGCHECK_STR: 0x3B
  98.  
  99. PROCESS_NAME: ts3client_win6
  100.  
  101. CURRENT_IRQL: 0
  102.  
  103. ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre
  104.  
  105. LAST_CONTROL_TRANSFER: from 00007fffe71b5a34 to fffff8035c980322
  106.  
  107. STACK_TEXT:
  108. ffff9180`80f76b00 00007fff`e71b5a34 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x7
  109. 0000002d`f485fb88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`e71b5a34
  110.  
  111.  
  112. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  113. fffff8035ca89384-fffff8035ca89385 2 bytes - nt!ExFreePoolWithTag+364
  114. [ fb f6:f2 e4 ]
  115. 2 errors : !nt (fffff8035ca89384-fffff8035ca89385)
  116.  
  117. MODULE_NAME: memory_corruption
  118.  
  119. IMAGE_NAME: memory_corruption
  120.  
  121. FOLLOWUP_NAME: memory_corruption
  122.  
  123. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  124.  
  125. MEMORY_CORRUPTOR: LARGE
  126.  
  127. STACK_COMMAND: .cxr 0xffff918080f76110 ; kb
  128.  
  129. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  130.  
  131. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  132.  
  133. ANALYSIS_SOURCE: KM
  134.  
  135. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  136.  
  137. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  138.  
  139. Followup: memory_corruption
  140. ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement