Advertisement
Guest User

Untitled

a guest
Jan 6th, 2019
154
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.11 KB | None | 0 0
  1. Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
  2. Online Crash Dump Analysis Service
  3. See http://www.osronline.com for more information
  4. Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
  5. Product: WinNt, suite: TerminalServer SingleUserTS
  6. Built by: 7601.24308.amd64fre.win7sp1_ldr.181111-0600
  7. Machine Name:
  8. Kernel base = 0xfffff800`03665000 PsLoadedModuleList = 0xfffff800`0389ec90
  9. Debug session time: Thu Jan 3 18:33:05.497 2019 (UTC - 5:00)
  10. System Uptime: 0 days 0:42:59.574
  11. *******************************************************************************
  12. * *
  13. * Bugcheck Analysis *
  14. * *
  15. *******************************************************************************
  16.  
  17. SYSTEM_SERVICE_EXCEPTION (3b)
  18. An exception happened while executing a system service routine.
  19. Arguments:
  20. Arg1: 00000000c0000005, Exception code that caused the bugcheck
  21. Arg2: fffff8800818e601, Address of the instruction which caused the bugcheck
  22. Arg3: fffff8800ab86260, Address of the context record for the exception that caused the bugcheck
  23. Arg4: 0000000000000000, zero.
  24.  
  25. Debugging Details:
  26. ------------------
  27.  
  28. TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
  29.  
  30. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
  31.  
  32. FAULTING_IP:
  33. RTKVHD64+13b601
  34. fffff880`0818e601 8a820e010000 mov al,byte ptr [rdx+10Eh]
  35.  
  36. CONTEXT: fffff8800ab86260 -- (.cxr 0xfffff8800ab86260)
  37. rax=ffff000002b6bd92 rbx=fffffa800a162310 rcx=fffffa800a743770
  38. rdx=0000000000000000 rsi=fffffa800a5e73d0 rdi=fffffa800a1516b0
  39. rip=fffff8800818e601 rsp=fffff8800ab86c30 rbp=fffffa800a1516b0
  40. r8=fffff8800ab86be0 r9=0000000000000000 r10=0000000000000001
  41. r11=fffffa800a14e660 r12=fffffa800a15e620 r13=fffffa800a14e320
  42. r14=00000000000000f0 r15=0000000000000000
  43. iopl=0 nv up ei ng nz na pe nc
  44. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282
  45. RTKVHD64+0x13b601:
  46. fffff880`0818e601 8a820e010000 mov al,byte ptr [rdx+10Eh] ds:002b:00000000`0000010e=??
  47. Resetting default scope
  48.  
  49. CUSTOMER_CRASH_COUNT: 1
  50.  
  51. DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
  52.  
  53. BUGCHECK_STR: 0x3B
  54.  
  55. PROCESS_NAME: RAVCpl64.exe
  56.  
  57. CURRENT_IRQL: 0
  58.  
  59. LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff8800818e601
  60.  
  61. STACK_TEXT:
  62. fffff880`0ab86c30 00000000`00000000 : 00000000`00000000 fffffa80`0a743770 fffffa80`0a72de60 00570074`0075004f : RTKVHD64+0x13b601
  63.  
  64.  
  65. FOLLOWUP_IP:
  66. RTKVHD64+13b601
  67. fffff880`0818e601 8a820e010000 mov al,byte ptr [rdx+10Eh]
  68.  
  69. SYMBOL_STACK_INDEX: 0
  70.  
  71. SYMBOL_NAME: RTKVHD64+13b601
  72.  
  73. FOLLOWUP_NAME: MachineOwner
  74.  
  75. MODULE_NAME: RTKVHD64
  76.  
  77. IMAGE_NAME: RTKVHD64.sys
  78.  
  79. DEBUG_FLR_IMAGE_TIMESTAMP: 49633b08
  80.  
  81. STACK_COMMAND: .cxr 0xfffff8800ab86260 ; kb
  82.  
  83. FAILURE_BUCKET_ID: X64_0x3B_RTKVHD64+13b601
  84.  
  85. BUCKET_ID: X64_0x3B_RTKVHD64+13b601
  86.  
  87. Followup: MachineOwner
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement