Advertisement
Guest User

Untitled

a guest
Oct 24th, 2018
139
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.33 KB | None | 0 0
  1. Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
  2. Online Crash Dump Analysis Service
  3. See http://www.osronline.com for more information
  4. Windows 8 Kernel Version 17134 MP (8 procs) Free x64
  5. Product: WinNt, suite: TerminalServer SingleUserTS
  6. Built by: 17134.1.amd64fre.rs4_release.180410-1804
  7. Machine Name:
  8. Kernel base = 0xfffff800`af097000 PsLoadedModuleList = 0xfffff800`af445290
  9. Debug session time: Wed Oct 24 14:19:43.782 2018 (UTC - 4:00)
  10. System Uptime: 1 days 9:09:35.491
  11. *******************************************************************************
  12. * *
  13. * Bugcheck Analysis *
  14. * *
  15. *******************************************************************************
  16.  
  17. SYSTEM_SERVICE_EXCEPTION (3b)
  18. An exception happened while executing a system service routine.
  19. Arguments:
  20. Arg1: 00000000c0000005, Exception code that caused the bugcheck
  21. Arg2: ffff819fbac482ae, Address of the instruction which caused the bugcheck
  22. Arg3: ffffed8ef3355de0, Address of the context record for the exception that caused the bugcheck
  23. Arg4: 0000000000000000, zero.
  24.  
  25. Debugging Details:
  26. ------------------
  27.  
  28. TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
  29.  
  30. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
  31.  
  32. FAULTING_IP:
  33. win32kbase!HmgInsertObjectInternal+35e
  34. ffff819f`bac482ae 488b5610 mov rdx,qword ptr [rsi+10h]
  35.  
  36. CONTEXT: ffffed8ef3355de0 -- (.cxr 0xffffed8ef3355de0)
  37. rax=00000000ef040000 rbx=0000000000ef0a2c rcx=0000000048242c09
  38. rdx=0000000000000001 rsi=00000000bad8d878 rdi=ffffffffef040a2c
  39. rip=ffff819fbac482ae rsp=ffffed8ef33567d0 rbp=0000000000000000
  40. r8=0000000000010000 r9=ffff81c6000000a0 r10=0000000000000a2c
  41. r11=ffff81c6000000a0 r12=0000000000000001 r13=0000000000000004
  42. r14=00000000000000ef r15=ffff81c605897f20
  43. iopl=0 nv up ei pl nz na pe cy
  44. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010203
  45. win32kbase!HmgInsertObjectInternal+0x35e:
  46. ffff819f`bac482ae 488b5610 mov rdx,qword ptr [rsi+10h] ds:002b:00000000`bad8d888=????????????????
  47. Resetting default scope
  48.  
  49. CUSTOMER_CRASH_COUNT: 1
  50.  
  51. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  52.  
  53. BUGCHECK_STR: 0x3B
  54.  
  55. PROCESS_NAME: dwm.exe
  56.  
  57. CURRENT_IRQL: 0
  58.  
  59. LAST_CONTROL_TRANSFER: from ffff819fbac43c6d to ffff819fbac482ae
  60.  
  61. STACK_TEXT:
  62. ffffed8e`f33567d0 ffff819f`bac43c6d : ffff81c6`05897f20 00000000`0000ef04 ffff81c6`05897f20 ffff819f`00000000 : win32kbase!HmgInsertObjectInternal+0x35e
  63. ffffed8e`f3356850 ffff819f`bac5dbf5 : 00000000`00000000 ffff8f8d`462a1e20 00000000`00000000 ffff8f8d`462a1e20 : win32kbase!RGNOBJ::hrgnAssociate+0x19
  64. ffffed8e`f3356880 fffff805`a471dc9c : ffff81c6`05897f20 ffffda05`e026c5b0 00000000`00000000 ffffda05`e09a7240 : win32kbase!CRegion::GetRegionHandleAndReset+0x45
  65. ffffed8e`f33568b0 fffff805`a471ce9d : ffffda05`d88ab8e0 ffffda05`e01844b0 00000000`00000000 ffffda05`e09a7210 : dxgkrnl!CCompositionSurface::GetSurfaceUpdate+0xf4
  66. ffffed8e`f3356900 ffff819f`bac1c72f : ffff8f8d`4b3cf080 ffff8f8d`4b3cf080 00000000`00000000 fffff800`af250b43 : dxgkrnl!CCompositionFrame::GetSurfaceUpdates+0x12d
  67. ffffed8e`f3356970 fffff800`af250b43 : 00000000`00000000 00000025`557ff1a4 00000025`557ff1a8 00000025`00000000 : win32kbase!NtDCompositionGetFrameSurfaceUpdates+0x15f
  68. ffffed8e`f3356a00 00007fff`f5e136c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
  69. 00000025`557ff0d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fff`f5e136c4
  70.  
  71.  
  72. FOLLOWUP_IP:
  73. win32kbase!HmgInsertObjectInternal+35e
  74. ffff819f`bac482ae 488b5610 mov rdx,qword ptr [rsi+10h]
  75.  
  76. SYMBOL_STACK_INDEX: 0
  77.  
  78. SYMBOL_NAME: win32kbase!HmgInsertObjectInternal+35e
  79.  
  80. FOLLOWUP_NAME: MachineOwner
  81.  
  82. MODULE_NAME: win32kbase
  83.  
  84. IMAGE_NAME: win32kbase.sys
  85.  
  86. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  87.  
  88. STACK_COMMAND: .cxr 0xffffed8ef3355de0 ; kb
  89.  
  90. FAILURE_BUCKET_ID: X64_0x3B_win32kbase!HmgInsertObjectInternal+35e
  91.  
  92. BUCKET_ID: X64_0x3B_win32kbase!HmgInsertObjectInternal+35e
  93.  
  94. Followup: MachineOwner
  95. ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement