Advertisement
Guest User

Untitled

a guest
May 29th, 2017
115
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.93 KB | None | 0 0
  1. GardenMan: 3b means "The SYSTEM_SERVICE_EXCEPTION bug check has a value of 0x0000003B. This indicates that an exception happened while executing a routine that transitions from non-privileged code to privileged code."
  2.  
  3. GardenMan: "This error has been linked to excessive paged pool usage and may occur due to user-mode graphics drivers crossing over and passing bad data to the kernel code."
  4.  
  5. -----------------------------------------------------------
  6.  
  7. Microsoft (R) Windows Debugger Version 10.0.14321.1024 AMD64
  8. Copyright (c) Microsoft Corporation. All rights reserved.
  9.  
  10. Loading Dump File [C:\Users\UserName\Desktop\052917-5812-01.dmp]
  11. Mini Kernel Dump File: Only registers and stack trace are available
  12. Symbol search path is: srv*
  13. Executable search path is:
  14. Windows 10 Kernel Version 15063 MP (4 procs) Free x64
  15. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  16. Built by: 15063.0.amd64fre.rs2_release.170317-1834
  17. Machine Name:
  18. Kernel base = 0xfffff801`62e07000 PsLoadedModuleList = 0xfffff801`631535a0
  19. Debug session time: Tue May 30 00:32:31.795 2017 (UTC - 4:00)
  20. System Uptime: 0 days 5:17:35.422
  21. Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
  22. Run !sym noisy before .reload to track down problems loading symbols.
  23.  
  24. BugCheck 3B, {c0000005, fffff8016328a373, ffffbe01faf15d80, 0}
  25. Probably caused by : memory_corruption
  26. Followup: memory_corruption
  27. SYSTEM_SERVICE_EXCEPTION (3b)
  28. An exception happened while executing a system service routine.
  29.  
  30. Arguments:
  31. Arg1: 00000000c0000005, Exception code that caused the bugcheck
  32. Arg2: fffff8016328a373, Address of the instruction which caused the bugcheck
  33. Arg3: ffffbe01faf15d80, Address of the context record for the exception that caused the bugcheck
  34. Arg4: 0000000000000000, zero.
  35.  
  36. Debugging Details:
  37. DUMP_CLASS: 1
  38. DUMP_QUALIFIER: 400
  39. BUILD_VERSION_STRING: 10.0.15063.296 (WinBuild.160101.0800)
  40. SYSTEM_MANUFACTURER: MSI
  41. SYSTEM_PRODUCT_NAME: MS-7850
  42. SYSTEM_SKU: To be filled by O.E.M.
  43. SYSTEM_VERSION: 1.0
  44. BIOS_VENDOR: American Megatrends Inc.
  45. BIOS_VERSION: V4.11
  46. BIOS_DATE: 02/16/2016
  47. BASEBOARD_MANUFACTURER: MSI
  48. BASEBOARD_PRODUCT: Z97 PC Mate(MS-7850)
  49. BASEBOARD_VERSION: 1.0
  50. DUMP_TYPE: 2
  51. BUGCHECK_P1: c0000005
  52. BUGCHECK_P2: fffff8016328a373
  53. BUGCHECK_P3: ffffbe01faf15d80
  54. BUGCHECK_P4: 0
  55. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  56. FAULTING_IP:
  57. nt!PsLookupProcessByProcessId+83
  58. fffff801`6328a373 488b7c2438 mov rdi,qword ptr [rsp+38h]
  59. CONTEXT: ffffbe01faf15d80 -- (.cxr 0xffffbe01faf15d80)
  60. rax=ffffe70d9cbb7858 rbx=ffffe70da5bd8080 rcx=ffffe70da5bd8080
  61. rdx=0000000000000000 rsi=ffffbe01faf16850 rdi=ffffe70d9cbb77c0
  62. rip=fffff8016328a373 rsp=ffffbe01faf16780 rbp=ffffbe01faf16b80
  63. r8=ffff858fb1a25001 r9=ffff858fbdd97060 r10=0000000000000000
  64. r11=ffffbe01faf16720 r12=0000000007d3e6c8 r13=0000000000101000
  65. r14=0000000000101000 r15=0000000000000001
  66. iopl=0 nv up ei pl zr na po nc
  67. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
  68. nt!PsLookupProcessByProcessId+0x83:
  69. fffff801`6328a373 488b7c2438 mov rdi,qword ptr [rsp+38h] ss:0018:ffffbe01`faf167b8=0000000000000000
  70. Resetting default scope
  71. CPU_COUNT: 4
  72. CPU_MHZ: dac
  73. CPU_VENDOR: GenuineIntel
  74. CPU_FAMILY: 6
  75. CPU_MODEL: 3c
  76. CPU_STEPPING: 3
  77. CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
  78. CUSTOMER_CRASH_COUNT: 1
  79. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  80. BUGCHECK_STR: 0x3B
  81. PROCESS_NAME: Battle.net.exe
  82. CURRENT_IRQL: 0
  83. ANALYSIS_SESSION_HOST: USERNAME-PC
  84. ANALYSIS_SESSION_TIME: 05-30-2017 00:40:28.0453
  85. ANALYSIS_VERSION: 10.0.14321.1024 amd64fre
  86. LAST_CONTROL_TRANSFER: from fffff80163278b3b to fffff8016328a373
  87. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  88. fffff80162e90176-fffff80162e90177 2 bytes - nt!MiDeletePagablePteRange+56
  89. [ 80 f6:00 bc ]
  90. 2 errors : !nt (fffff80162e90176-fffff80162e90177)
  91. MODULE_NAME: memory_corruption
  92. IMAGE_NAME: memory_corruption
  93. FOLLOWUP_NAME: memory_corruption
  94. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  95. MEMORY_CORRUPTOR: LARGE
  96. STACK_COMMAND: .cxr 0xffffbe01faf15d80 ; kb
  97. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  98. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  99. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  100. TARGET_TIME: 2017-05-30T04:32:31.000Z
  101. OSBUILD: 15063
  102. OSSERVICEPACK: 296
  103. SERVICEPACK_NUMBER: 0
  104. OS_REVISION: 0
  105. SUITE_MASK: 784
  106. PRODUCT_TYPE: 1
  107. OSPLATFORM_TYPE: x64
  108. OSNAME: Windows 10
  109. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  110. OS_LOCALE:
  111. USER_LCID: 0
  112. OSBUILD_TIMESTAMP: 2017-04-27 19:52:30
  113. BUILDDATESTAMP_STR: 160101.0800
  114. BUILDLAB_STR: WinBuild
  115. BUILDOSVER_STR: 10.0.15063.296
  116. ANALYSIS_SESSION_ELAPSED_TIME: 1934
  117. ANALYSIS_SOURCE: KM
  118. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  119. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  120. Followup: memory_corruption
  121.  
  122. Gardenman: !errrec fffff8016328a373 returned several pages of:
  123. ===============================================================================
  124. Section 35140 : {f98b4c04-8348-ffcd-33ff-418bce4d8be1}
  125. -------------------------------------------------------------------------------
  126. Descriptor @ fffff801634f3f13
  127. Section @ fffff801a47ce4ca
  128. Offset : 1096040791
  129. Length : 1096171861
  130. Flags : 0x718b4420 LatentError
  131. Severity : Invalid
  132. FRU Id : {4c1fe183-ea8b-d348-e58b-df488bf54923}
  133. FRU Text : $PH?ÛuE?ÎAÁéE?É?À
  134. *** Unknown section format ***
  135. ===============================================================================
  136. Section 35141 : {44b60f25-5124-0348-c80f-b6442452486b}
  137. -------------------------------------------------------------------------------
  138. Descriptor @ fffff801634f3f5b
  139. Section @ fffff801a328a373
  140. Offset : 1073741824
  141. Length : 1220982287
  142. Flags : 0xc86b4800
  143. Severity : Invalid
  144. FRU Id : {034825d1-0fd0-44b6-2453-486bca254803}
  145. *** Unknown section format ***
  146. ===============================================================================
  147. Section 35142 : {44b60fd0-5724-6b4c-c225-4903c08bc048}
  148. -------------------------------------------------------------------------------
  149. Descriptor @ fffff801634f3fa3
  150. Section @ fffff801a7deb33b
  151. Offset : 1152782280
  152. Length : 1799902756
  153. Flags : 0x0348ff49 Primary ThresholdExceeded
  154. Severity : Invalid
  155. FRU Id : {8b49c823-0847-8d48-1cc8-488b1bf6c301}
  156. *** Unknown section format ***
  157. ===============================================================================
  158. Section 35143 : {ff48840f-ffff-0d0f-4b10-488b4310488d}
  159. -------------------------------------------------------------------------------
  160. Descriptor @ fffff801634f3feb
  161. Section @ fffff801aced2ec0
  162. Offset : 1237617485
  163. Length : 2336806283
  164. Flags : 0xc0840000
  165. Severity : Invalid
  166. FRU Id : {83480148-01f9-2b76-f048-0fb14b1075ee}
  167. FRU Text : ?\$XH?ÇH?l$`H?t$hH?Ä
  168. *** Unknown section format ***
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement