Advertisement
Guest User

Untitled

a guest
May 27th, 2016
63
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.44 KB | None | 0 0
  1. Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
  2. Online Crash Dump Analysis Service
  3. See http://www.osronline.com for more information
  4. Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
  5. Product: WinNt, suite: TerminalServer SingleUserTS
  6. Built by: 7601.23418.amd64fre.win7sp1_ldr.160408-2045
  7. Machine Name:
  8. Kernel base = 0xfffff800`0225e000 PsLoadedModuleList = 0xfffff800`024a0730
  9. Debug session time: Fri May 27 19:57:09.604 2016 (UTC - 4:00)
  10. System Uptime: 0 days 3:28:34.119
  11. *******************************************************************************
  12. * *
  13. * Bugcheck Analysis *
  14. * *
  15. *******************************************************************************
  16.  
  17. SYSTEM_SERVICE_EXCEPTION (3b)
  18. An exception happened while executing a system service routine.
  19. Arguments:
  20. Arg1: 00000000c0000005, Exception code that caused the bugcheck
  21. Arg2: fffff8000266cb45, Address of the instruction which caused the bugcheck
  22. Arg3: fffff88005b16f30, Address of the context record for the exception that caused the bugcheck
  23. Arg4: 0000000000000000, zero.
  24.  
  25. Debugging Details:
  26. ------------------
  27.  
  28. TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
  29.  
  30. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
  31.  
  32. FAULTING_IP:
  33. nt!CmpSnapshotTxOwnerArray+95
  34. fffff800`0266cb45 488b1428 mov rdx,qword ptr [rax+rbp]
  35.  
  36. CONTEXT: fffff88005b16f30 -- (.cxr 0xfffff88005b16f30)
  37. rax=0000000000000000 rbx=0000000000000000 rcx=fffff8a00530f000
  38. rdx=fffff88001edb000 rsi=fffff88005b179c0 rdi=fffff8a003efba48
  39. rip=fffff8000266cb45 rsp=fffff88005b17910 rbp=0000000000000000
  40. r8=000000000000ad98 r9=00000000000007ff r10=0000000000000457
  41. r11=fffff8a00530f000 r12=fffff88005b179e0 r13=fffff8a003efb978
  42. r14=0000000000000001 r15=0000000000000000
  43. iopl=0 nv up ei pl nz na po nc
  44. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206
  45. nt!CmpSnapshotTxOwnerArray+0x95:
  46. fffff800`0266cb45 488b1428 mov rdx,qword ptr [rax+rbp] ds:002b:00000000`00000000=????????????????
  47. Resetting default scope
  48.  
  49. CUSTOMER_CRASH_COUNT: 1
  50.  
  51. DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
  52.  
  53. BUGCHECK_STR: 0x3B
  54.  
  55. PROCESS_NAME: drvinst.exe
  56.  
  57. CURRENT_IRQL: 0
  58.  
  59. LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff8000266cb45
  60.  
  61. STACK_TEXT:
  62. fffff880`05b17910 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!CmpSnapshotTxOwnerArray+0x95
  63.  
  64.  
  65. FOLLOWUP_IP:
  66. nt!CmpSnapshotTxOwnerArray+95
  67. fffff800`0266cb45 488b1428 mov rdx,qword ptr [rax+rbp]
  68.  
  69. SYMBOL_STACK_INDEX: 0
  70.  
  71. SYMBOL_NAME: nt!CmpSnapshotTxOwnerArray+95
  72.  
  73. FOLLOWUP_NAME: MachineOwner
  74.  
  75. MODULE_NAME: nt
  76.  
  77. IMAGE_NAME: ntkrnlmp.exe
  78.  
  79. DEBUG_FLR_IMAGE_TIMESTAMP: 5708972e
  80.  
  81. STACK_COMMAND: .cxr 0xfffff88005b16f30 ; kb
  82.  
  83. FAILURE_BUCKET_ID: X64_0x3B_nt!CmpSnapshotTxOwnerArray+95
  84.  
  85. BUCKET_ID: X64_0x3B_nt!CmpSnapshotTxOwnerArray+95
  86.  
  87. Followup: MachineOwner
  88. ---------
  89.  
  90.  
  91. This free analysis is provided by OSR Open Systems Resources, Inc.
  92. Want a deeper understanding of crash dump analysis? Check out our Windows Kernel Debugging and Crash Dump Analysis Seminar (opens in new tab/window)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement