Advertisement
Guest User

Bluescreen

a guest
Feb 2nd, 2014
103
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.30 KB | None | 0 0
  1. Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
  2. Online Crash Dump Analysis Service
  3. See http://www.osronline.com for more information
  4. Windows 7 Kernel Version 7600 MP (4 procs) Free x64
  5. Product: WinNt, suite: TerminalServer SingleUserTS
  6. Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
  7. Machine Name:
  8. Kernel base = 0xfffff800`02c54000 PsLoadedModuleList = 0xfffff800`02e91e50
  9. Debug session time: Sun Feb 2 15:05:15.754 2014 (UTC - 5:00)
  10. System Uptime: 0 days 5:54:42.692
  11. *******************************************************************************
  12. * *
  13. * Bugcheck Analysis *
  14. * *
  15. *******************************************************************************
  16.  
  17. SYSTEM_SERVICE_EXCEPTION (3b)
  18. An exception happened while executing a system service routine.
  19. Arguments:
  20. Arg1: 00000000c0000005, Exception code that caused the bugcheck
  21. Arg2: fffff80002c9001e, Address of the instruction which caused the bugcheck
  22. Arg3: fffff880032b8de0, Address of the context record for the exception that caused the bugcheck
  23. Arg4: 0000000000000000, zero.
  24.  
  25. Debugging Details:
  26. ------------------
  27.  
  28. TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
  29.  
  30. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
  31.  
  32. FAULTING_IP:
  33. nt!ExEnterCriticalRegionAndAcquireFastMutexUnsafe+26
  34. fffff800`02c9001e f00fba3100 lock btr dword ptr [rcx],0
  35.  
  36. CONTEXT: fffff880032b8de0 -- (.cxr 0xfffff880032b8de0)
  37. rax=fffffa8007deb060 rbx=000000cb000000cc rcx=000000cb000000cc
  38. rdx=fffffa8007deb060 rsi=00000000ffffffff rdi=fffffa8007deb060
  39. rip=fffff80002c9001e rsp=fffff880032b97c0 rbp=0000000000000001
  40. r8=0000000000000000 r9=0000000000000000 r10=0000000000006fa8
  41. r11=fffff880032b9810 r12=0000000000000000 r13=0000000000000001
  42. r14=0000000000000000 r15=fffff900c27e1d30
  43. iopl=0 nv up ei ng nz na pe nc
  44. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282
  45. nt!ExEnterCriticalRegionAndAcquireFastMutexUnsafe+0x26:
  46. fffff800`02c9001e f00fba3100 lock btr dword ptr [rcx],0 ds:002b:000000cb`000000cc=????????
  47. Resetting default scope
  48.  
  49. DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
  50.  
  51. BUGCHECK_STR: 0x3B
  52.  
  53. PROCESS_NAME: csgo.exe
  54.  
  55. CURRENT_IRQL: 0
  56.  
  57. LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80002c9001e
  58.  
  59. STACK_TEXT:
  60. fffff880`032b97c0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExEnterCriticalRegionAndAcquireFastMutexUnsafe+0x26
  61.  
  62.  
  63. FOLLOWUP_IP:
  64. nt!ExEnterCriticalRegionAndAcquireFastMutexUnsafe+26
  65. fffff800`02c9001e f00fba3100 lock btr dword ptr [rcx],0
  66.  
  67. SYMBOL_STACK_INDEX: 0
  68.  
  69. SYMBOL_NAME: nt!ExEnterCriticalRegionAndAcquireFastMutexUnsafe+26
  70.  
  71. FOLLOWUP_NAME: MachineOwner
  72.  
  73. MODULE_NAME: nt
  74.  
  75. IMAGE_NAME: ntkrnlmp.exe
  76.  
  77. DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600
  78.  
  79. STACK_COMMAND: .cxr 0xfffff880032b8de0 ; kb
  80.  
  81. FAILURE_BUCKET_ID: X64_0x3B_nt!ExEnterCriticalRegionAndAcquireFastMutexUnsafe+26
  82.  
  83. BUCKET_ID: X64_0x3B_nt!ExEnterCriticalRegionAndAcquireFastMutexUnsafe+26
  84.  
  85. Followup: MachineOwner
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement