*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c000001d, fffff96000162ff4, fffff8800b157b60, 0}
Page 11a665 not present in the dump file. Type ".hh dbgerr004" for details
Probably caused by : hardware ( win32k!xxxDCEWindowHitTest+78 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c000001d, Exception code that caused the bugcheck
Arg2: fffff96000162ff4, Address of the instruction which caused the bugcheck
Arg3: fffff8800b157b60, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc000001d - {AUSNAHME} Ung ltige Anweisung Es wurde versucht, eine ung ltige Anweisung auszuf hren.
FAULTING_IP:
win32k!xxxDCEWindowHitTest+78
fffff960`00162ff4 37 ???
CONTEXT: fffff8800b157b60 -- (.cxr 0xfffff8800b157b60)
rax=fffff900c0827790 rbx=fffff900c08196d0 rcx=fffff900c0827790
rdx=0000000000000200 rsi=0000000000000001 rdi=0000000000000000
rip=fffff96000162ff4 rsp=fffff8800b158548 rbp=fffff8800b1587a0
r8=0000000000000000 r9=00000000012600b2 r10=00000126000000b2
r11=fffff8800b158548 r12=00000000012600b2 r13=0000000000000000
r14=0000000000000200 r15=00000000012600b2
iopl=0 nv up ei pl nz ac po cy
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00010217
win32k!xxxDCEWindowHitTest+0x78:
fffff960`00162ff4 37 ???
Resetting default scope
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: WinRAR.exe
CURRENT_IRQL: 0
MISALIGNED_IP:
win32k!xxxDCEWindowHitTest+78
fffff960`00162ff4 37 ???
LAST_CONTROL_TRANSFER: from fffff8800b1587a0 to fffff96000162ff4
STACK_TEXT:
fffff880`0b158548 fffff880`0b1587a0 : fffff960`00163395 fffff900`c0800b90 00000000`fffffffe 00000000`00000001 : win32k!xxxDCEWindowHitTest+0x78
fffff880`0b1585c8 fffff960`00163395 : fffff900`c0800b90 00000000`fffffffe 00000000`00000001 00000000`00000001 : 0xfffff880`0b1587a0
fffff880`0b1585d0 fffff960`00163053 : 00000000`00000000 fffff900`c1eb9250 00000000`00000000 00000000`00000001 : win32k!xxxDCEWindowHitTest2+0x2f9
fffff880`0b1586b0 fffff960`000bfbd8 : 00000000`00000001 fffff880`0b158ca0 00000000`000000b2 00000000`00000000 : win32k!xxxDCEWindowHitTest+0xd7
fffff880`0b158730 fffff960`000f978b : fffff900`c1eb9250 fffff880`0b158bd8 00000000`00000000 00000000`00000000 : win32k!xxxScanSysQueue+0x115c
fffff880`0b158a70 fffff960`000f9c19 : 00000000`00000000 fffff800`000025ff 00000001`00000000 fffffa80`ffffffff : win32k!xxxRealInternalGetMessage+0x453
fffff880`0b158b50 fffff960`000fb615 : 00000000`00000000 00000000`000604c6 00000000`002f0044 00000000`00000000 : win32k!xxxInternalGetMessage+0x35
fffff880`0b158b90 fffff800`01872153 : fffffa80`03ea2b60 00000000`00000000 00000000`00000020 00000000`00000020 : win32k!NtUserGetMessage+0x75
fffff880`0b158c20 00000000`76b9c92a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`002bedd8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76b9c92a
FOLLOWUP_IP:
win32k!xxxDCEWindowHitTest+78
fffff960`00162ff4 37 ???
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: win32k!xxxDCEWindowHitTest+78
FOLLOWUP_NAME: MachineOwner
IMAGE_NAME: hardware
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .cxr 0xfffff8800b157b60 ; kb
MODULE_NAME: hardware
FAILURE_BUCKET_ID: X64_IP_MISALIGNED
BUCKET_ID: X64_IP_MISALIGNED
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c000001d, Exception code that caused the bugcheck
Arg2: fffff96000162ff4, Address of the instruction which caused the bugcheck
Arg3: fffff8800b157b60, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc000001d - {AUSNAHME} Ung ltige Anweisung Es wurde versucht, eine ung ltige Anweisung auszuf hren.
FAULTING_IP:
win32k!xxxDCEWindowHitTest+78
fffff960`00162ff4 37 ???
CONTEXT: fffff8800b157b60 -- (.cxr 0xfffff8800b157b60)
rax=fffff900c0827790 rbx=fffff900c08196d0 rcx=fffff900c0827790
rdx=0000000000000200 rsi=0000000000000001 rdi=0000000000000000
rip=fffff96000162ff4 rsp=fffff8800b158548 rbp=fffff8800b1587a0
r8=0000000000000000 r9=00000000012600b2 r10=00000126000000b2
r11=fffff8800b158548 r12=00000000012600b2 r13=0000000000000000
r14=0000000000000200 r15=00000000012600b2
iopl=0 nv up ei pl nz ac po cy
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00010217
win32k!xxxDCEWindowHitTest+0x78:
fffff960`00162ff4 37 ???
Resetting default scope
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: WinRAR.exe
CURRENT_IRQL: 0
MISALIGNED_IP:
win32k!xxxDCEWindowHitTest+78
fffff960`00162ff4 37 ???
LAST_CONTROL_TRANSFER: from fffff8800b1587a0 to fffff96000162ff4
STACK_TEXT:
fffff880`0b158548 fffff880`0b1587a0 : fffff960`00163395 fffff900`c0800b90 00000000`fffffffe 00000000`00000001 : win32k!xxxDCEWindowHitTest+0x78
fffff880`0b1585c8 fffff960`00163395 : fffff900`c0800b90 00000000`fffffffe 00000000`00000001 00000000`00000001 : 0xfffff880`0b1587a0
fffff880`0b1585d0 fffff960`00163053 : 00000000`00000000 fffff900`c1eb9250 00000000`00000000 00000000`00000001 : win32k!xxxDCEWindowHitTest2+0x2f9
fffff880`0b1586b0 fffff960`000bfbd8 : 00000000`00000001 fffff880`0b158ca0 00000000`000000b2 00000000`00000000 : win32k!xxxDCEWindowHitTest+0xd7
fffff880`0b158730 fffff960`000f978b : fffff900`c1eb9250 fffff880`0b158bd8 00000000`00000000 00000000`00000000 : win32k!xxxScanSysQueue+0x115c
fffff880`0b158a70 fffff960`000f9c19 : 00000000`00000000 fffff800`000025ff 00000001`00000000 fffffa80`ffffffff : win32k!xxxRealInternalGetMessage+0x453
fffff880`0b158b50 fffff960`000fb615 : 00000000`00000000 00000000`000604c6 00000000`002f0044 00000000`00000000 : win32k!xxxInternalGetMessage+0x35
fffff880`0b158b90 fffff800`01872153 : fffffa80`03ea2b60 00000000`00000000 00000000`00000020 00000000`00000020 : win32k!NtUserGetMessage+0x75
fffff880`0b158c20 00000000`76b9c92a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`002bedd8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76b9c92a
FOLLOWUP_IP:
win32k!xxxDCEWindowHitTest+78
fffff960`00162ff4 37 ???
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: win32k!xxxDCEWindowHitTest+78
FOLLOWUP_NAME: MachineOwner
IMAGE_NAME: hardware
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .cxr 0xfffff8800b157b60 ; kb
MODULE_NAME: hardware
FAILURE_BUCKET_ID: X64_IP_MISALIGNED
BUCKET_ID: X64_IP_MISALIGNED
Followup: MachineOwner
---------