Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- SYSTEM_SERVICE_EXCEPTION (3b)
- An exception happened while executing a system service routine.
- Arguments:
- Arg1: 00000000c0000005, Exception code that caused the BugCheck
- Arg2: fffff8071df249d0, Address of the instruction which caused the BugCheck
- Arg3: fffffc8eade46b60, Address of the context record for the exception that caused the BugCheck
- Arg4: 0000000000000000, zero.
- Debugging Details:
- ------------------
- Page 365881 not present in the dump file. Type ".hh dbgerr004" for details
- KEY_VALUES_STRING: 1
- Key : Analysis.CPU.mSec
- Value: 1718
- Key : Analysis.DebugAnalysisManager
- Value: Create
- Key : Analysis.Elapsed.mSec
- Value: 1724
- Key : Analysis.Init.CPU.mSec
- Value: 952
- Key : Analysis.Init.Elapsed.mSec
- Value: 32130
- Key : Analysis.Memory.CommitPeak.Mb
- Value: 140
- Key : WER.OS.Branch
- Value: vb_release
- Key : WER.OS.Timestamp
- Value: 2019-12-06T14:06:00Z
- Key : WER.OS.Version
- Value: 10.0.19041.1
- FILE_IN_CAB: MEMORY.DMP
- BUGCHECK_CODE: 3b
- BUGCHECK_P1: c0000005
- BUGCHECK_P2: fffff8071df249d0
- BUGCHECK_P3: fffffc8eade46b60
- BUGCHECK_P4: 0
- CONTEXT: fffffc8eade46b60 -- (.cxr 0xfffffc8eade46b60)
- rax=ffff0c4c713afdfc rbx=0000000000000001 rcx=ffffad00957e7180
- rdx=0000000000000000 rsi=0000200000000000 rdi=0000000000000000
- rip=fffff8071df249d0 rsp=fffffc8eade47568 rbp=fffffc8eade475d9
- r8=0000000000000000 r9=0000000000000000 r10=fffff807192e2ac0
- r11=0000000000000000 r12=0000000000000001 r13=0000000000000002
- r14=ffffc28cb464d210 r15=0000000000000000
- iopl=0 nv up ei ng nz na po nc
- cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050286
- nt!PsGetCurrentThreadWin32Thread:
- fffff807`1df249d0 65488b042588010000 mov rax,qword ptr gs:[188h] gs:002b:00000000`00000188=ffffda899c8cc080
- Resetting default scope
- BLACKBOXBSD: 1 (!blackboxbsd)
- BLACKBOXNTFS: 1 (!blackboxntfs)
- BLACKBOXPNP: 1 (!blackboxpnp)
- BLACKBOXWINLOGON: 1
- PROCESS_NAME: csrss.exe
- STACK_TEXT:
- fffffc8e`ade47568 ffffc28c`b4444254 : ffffad00`957e7180 fffff807`1dec911b ffffffff`fffe7960 00000000`00000000 : nt!PsGetCurrentThreadWin32Thread
- fffffc8e`ade47570 ffffc28c`b4444701 : 00000000`00000001 00000000`00000000 ffffc28c`b464d210 ffffc2db`40754060 : win32kbase!EtwTraceReleaseUserCrit+0x30
- fffffc8e`ade47640 ffffc28c`b47a698d : 00000000`00000000 00000000`01115c87 00000000`00000001 00000000`00000004 : win32kbase!UserSessionSwitchLeaveCrit+0x61
- fffffc8e`ade476b0 ffffc28c`b4478f34 : ffffda89`9c8cc080 ffffda89`9c8cc080 00000000`00000000 00000000`00000005 : win32kfull!RawInputThread+0x7fd
- fffffc8e`ade47870 ffffc28c`b4772bd1 : ffffda89`9c8cc080 00000000`00000000 00000000`00000005 00000000`00000005 : win32kbase!xxxCreateSystemThreads+0xc4
- fffffc8e`ade479a0 ffffc28c`b4d1474e : ffffda89`9c8cc080 ffffda89`9c8cc080 00000000`00000000 00000000`00000000 : win32kfull!NtUserCallNoParam+0x71
- fffffc8e`ade479d0 fffff807`1e008cb5 : ffffda89`00000005 00000000`00000005 00000155`4ce051d0 00000000`000001c4 : win32k!NtUserCallNoParam+0x16
- fffffc8e`ade47a00 00007ffd`1c4610e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
- 00000040`7b1bfbe8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`1c4610e4
- SYMBOL_NAME: win32kbase!EtwTraceReleaseUserCrit+30
- MODULE_NAME: win32kbase
- IMAGE_NAME: win32kbase.sys
- STACK_COMMAND: .cxr 0xfffffc8eade46b60 ; kb
- BUCKET_ID_FUNC_OFFSET: 30
- FAILURE_BUCKET_ID: 0x3B_c0000005_win32kbase!EtwTraceReleaseUserCrit
- OS_VERSION: 10.0.19041.1
- BUILDLAB_STR: vb_release
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- FAILURE_ID_HASH: {e2399401-8e30-697c-aca4-7f4bd451d5b5}
- Followup: MachineOwner
- ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement