Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
- Online Crash Dump Analysis Service
- See http://www.osronline.com for more information
- Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 7601.23418.amd64fre.win7sp1_ldr.160408-2045
- Machine Name:
- Kernel base = 0xfffff800`0225e000 PsLoadedModuleList = 0xfffff800`024a0730
- Debug session time: Fri May 27 19:57:09.604 2016 (UTC - 4:00)
- System Uptime: 0 days 3:28:34.119
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- SYSTEM_SERVICE_EXCEPTION (3b)
- An exception happened while executing a system service routine.
- Arguments:
- Arg1: 00000000c0000005, Exception code that caused the bugcheck
- Arg2: fffff8000266cb45, Address of the instruction which caused the bugcheck
- Arg3: fffff88005b16f30, Address of the context record for the exception that caused the bugcheck
- Arg4: 0000000000000000, zero.
- Debugging Details:
- ------------------
- TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
- EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
- FAULTING_IP:
- nt!CmpSnapshotTxOwnerArray+95
- fffff800`0266cb45 488b1428 mov rdx,qword ptr [rax+rbp]
- CONTEXT: fffff88005b16f30 -- (.cxr 0xfffff88005b16f30)
- rax=0000000000000000 rbx=0000000000000000 rcx=fffff8a00530f000
- rdx=fffff88001edb000 rsi=fffff88005b179c0 rdi=fffff8a003efba48
- rip=fffff8000266cb45 rsp=fffff88005b17910 rbp=0000000000000000
- r8=000000000000ad98 r9=00000000000007ff r10=0000000000000457
- r11=fffff8a00530f000 r12=fffff88005b179e0 r13=fffff8a003efb978
- r14=0000000000000001 r15=0000000000000000
- iopl=0 nv up ei pl nz na po nc
- cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206
- nt!CmpSnapshotTxOwnerArray+0x95:
- fffff800`0266cb45 488b1428 mov rdx,qword ptr [rax+rbp] ds:002b:00000000`00000000=????????????????
- Resetting default scope
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
- BUGCHECK_STR: 0x3B
- PROCESS_NAME: drvinst.exe
- CURRENT_IRQL: 0
- LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff8000266cb45
- STACK_TEXT:
- fffff880`05b17910 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!CmpSnapshotTxOwnerArray+0x95
- FOLLOWUP_IP:
- nt!CmpSnapshotTxOwnerArray+95
- fffff800`0266cb45 488b1428 mov rdx,qword ptr [rax+rbp]
- SYMBOL_STACK_INDEX: 0
- SYMBOL_NAME: nt!CmpSnapshotTxOwnerArray+95
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- DEBUG_FLR_IMAGE_TIMESTAMP: 5708972e
- STACK_COMMAND: .cxr 0xfffff88005b16f30 ; kb
- FAILURE_BUCKET_ID: X64_0x3B_nt!CmpSnapshotTxOwnerArray+95
- BUCKET_ID: X64_0x3B_nt!CmpSnapshotTxOwnerArray+95
- Followup: MachineOwner
- ---------
- This free analysis is provided by OSR Open Systems Resources, Inc.
- Want a deeper understanding of crash dump analysis? Check out our Windows Kernel Debugging and Crash Dump Analysis Seminar (opens in new tab/window)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement