Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
- Online Crash Dump Analysis Service
- See http://www.osronline.com for more information
- Windows 8 Kernel Version 17134 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 17134.1.amd64fre.rs4_release.180410-1804
- Machine Name:
- Kernel base = 0xfffff800`af097000 PsLoadedModuleList = 0xfffff800`af445290
- Debug session time: Wed Oct 24 14:19:43.782 2018 (UTC - 4:00)
- System Uptime: 1 days 9:09:35.491
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- SYSTEM_SERVICE_EXCEPTION (3b)
- An exception happened while executing a system service routine.
- Arguments:
- Arg1: 00000000c0000005, Exception code that caused the bugcheck
- Arg2: ffff819fbac482ae, Address of the instruction which caused the bugcheck
- Arg3: ffffed8ef3355de0, Address of the context record for the exception that caused the bugcheck
- Arg4: 0000000000000000, zero.
- Debugging Details:
- ------------------
- TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
- EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
- FAULTING_IP:
- win32kbase!HmgInsertObjectInternal+35e
- ffff819f`bac482ae 488b5610 mov rdx,qword ptr [rsi+10h]
- CONTEXT: ffffed8ef3355de0 -- (.cxr 0xffffed8ef3355de0)
- rax=00000000ef040000 rbx=0000000000ef0a2c rcx=0000000048242c09
- rdx=0000000000000001 rsi=00000000bad8d878 rdi=ffffffffef040a2c
- rip=ffff819fbac482ae rsp=ffffed8ef33567d0 rbp=0000000000000000
- r8=0000000000010000 r9=ffff81c6000000a0 r10=0000000000000a2c
- r11=ffff81c6000000a0 r12=0000000000000001 r13=0000000000000004
- r14=00000000000000ef r15=ffff81c605897f20
- iopl=0 nv up ei pl nz na pe cy
- cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010203
- win32kbase!HmgInsertObjectInternal+0x35e:
- ffff819f`bac482ae 488b5610 mov rdx,qword ptr [rsi+10h] ds:002b:00000000`bad8d888=????????????????
- Resetting default scope
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- BUGCHECK_STR: 0x3B
- PROCESS_NAME: dwm.exe
- CURRENT_IRQL: 0
- LAST_CONTROL_TRANSFER: from ffff819fbac43c6d to ffff819fbac482ae
- STACK_TEXT:
- ffffed8e`f33567d0 ffff819f`bac43c6d : ffff81c6`05897f20 00000000`0000ef04 ffff81c6`05897f20 ffff819f`00000000 : win32kbase!HmgInsertObjectInternal+0x35e
- ffffed8e`f3356850 ffff819f`bac5dbf5 : 00000000`00000000 ffff8f8d`462a1e20 00000000`00000000 ffff8f8d`462a1e20 : win32kbase!RGNOBJ::hrgnAssociate+0x19
- ffffed8e`f3356880 fffff805`a471dc9c : ffff81c6`05897f20 ffffda05`e026c5b0 00000000`00000000 ffffda05`e09a7240 : win32kbase!CRegion::GetRegionHandleAndReset+0x45
- ffffed8e`f33568b0 fffff805`a471ce9d : ffffda05`d88ab8e0 ffffda05`e01844b0 00000000`00000000 ffffda05`e09a7210 : dxgkrnl!CCompositionSurface::GetSurfaceUpdate+0xf4
- ffffed8e`f3356900 ffff819f`bac1c72f : ffff8f8d`4b3cf080 ffff8f8d`4b3cf080 00000000`00000000 fffff800`af250b43 : dxgkrnl!CCompositionFrame::GetSurfaceUpdates+0x12d
- ffffed8e`f3356970 fffff800`af250b43 : 00000000`00000000 00000025`557ff1a4 00000025`557ff1a8 00000025`00000000 : win32kbase!NtDCompositionGetFrameSurfaceUpdates+0x15f
- ffffed8e`f3356a00 00007fff`f5e136c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
- 00000025`557ff0d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fff`f5e136c4
- FOLLOWUP_IP:
- win32kbase!HmgInsertObjectInternal+35e
- ffff819f`bac482ae 488b5610 mov rdx,qword ptr [rsi+10h]
- SYMBOL_STACK_INDEX: 0
- SYMBOL_NAME: win32kbase!HmgInsertObjectInternal+35e
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: win32kbase
- IMAGE_NAME: win32kbase.sys
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- STACK_COMMAND: .cxr 0xffffed8ef3355de0 ; kb
- FAILURE_BUCKET_ID: X64_0x3B_win32kbase!HmgInsertObjectInternal+35e
- BUCKET_ID: X64_0x3B_win32kbase!HmgInsertObjectInternal+35e
- Followup: MachineOwner
- ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement