Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
- Online Crash Dump Analysis Service
- See http://www.osronline.com for more information
- Windows 7 Kernel Version 7600 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
- Machine Name:
- Kernel base = 0xfffff800`02c54000 PsLoadedModuleList = 0xfffff800`02e91e50
- Debug session time: Sun Feb 2 15:05:15.754 2014 (UTC - 5:00)
- System Uptime: 0 days 5:54:42.692
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- SYSTEM_SERVICE_EXCEPTION (3b)
- An exception happened while executing a system service routine.
- Arguments:
- Arg1: 00000000c0000005, Exception code that caused the bugcheck
- Arg2: fffff80002c9001e, Address of the instruction which caused the bugcheck
- Arg3: fffff880032b8de0, Address of the context record for the exception that caused the bugcheck
- Arg4: 0000000000000000, zero.
- Debugging Details:
- ------------------
- TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
- EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
- FAULTING_IP:
- nt!ExEnterCriticalRegionAndAcquireFastMutexUnsafe+26
- fffff800`02c9001e f00fba3100 lock btr dword ptr [rcx],0
- CONTEXT: fffff880032b8de0 -- (.cxr 0xfffff880032b8de0)
- rax=fffffa8007deb060 rbx=000000cb000000cc rcx=000000cb000000cc
- rdx=fffffa8007deb060 rsi=00000000ffffffff rdi=fffffa8007deb060
- rip=fffff80002c9001e rsp=fffff880032b97c0 rbp=0000000000000001
- r8=0000000000000000 r9=0000000000000000 r10=0000000000006fa8
- r11=fffff880032b9810 r12=0000000000000000 r13=0000000000000001
- r14=0000000000000000 r15=fffff900c27e1d30
- iopl=0 nv up ei ng nz na pe nc
- cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282
- nt!ExEnterCriticalRegionAndAcquireFastMutexUnsafe+0x26:
- fffff800`02c9001e f00fba3100 lock btr dword ptr [rcx],0 ds:002b:000000cb`000000cc=????????
- Resetting default scope
- DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
- BUGCHECK_STR: 0x3B
- PROCESS_NAME: csgo.exe
- CURRENT_IRQL: 0
- LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80002c9001e
- STACK_TEXT:
- fffff880`032b97c0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExEnterCriticalRegionAndAcquireFastMutexUnsafe+0x26
- FOLLOWUP_IP:
- nt!ExEnterCriticalRegionAndAcquireFastMutexUnsafe+26
- fffff800`02c9001e f00fba3100 lock btr dword ptr [rcx],0
- SYMBOL_STACK_INDEX: 0
- SYMBOL_NAME: nt!ExEnterCriticalRegionAndAcquireFastMutexUnsafe+26
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600
- STACK_COMMAND: .cxr 0xfffff880032b8de0 ; kb
- FAILURE_BUCKET_ID: X64_0x3B_nt!ExEnterCriticalRegionAndAcquireFastMutexUnsafe+26
- BUCKET_ID: X64_0x3B_nt!ExEnterCriticalRegionAndAcquireFastMutexUnsafe+26
- Followup: MachineOwner
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement