NATAN_Gameron

MiniDump: 041318-29172-01.dmp

Apr 14th, 2018
42
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.97 KB | None | 0 0
  1. Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
  2. Online Crash Dump Analysis Service
  3. See http://www.osronline.com for more information
  4. Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
  5. Product: WinNt, suite: TerminalServer SingleUserTS
  6. Built by: 7601.24024.amd64fre.win7sp1_ldr.180112-0600
  7. Machine Name:
  8. Kernel base = 0xfffff800`03009000 PsLoadedModuleList = 0xfffff800`03248a90
  9. Debug session time: Fri Apr 13 16:41:09.999 2018 (UTC - 4:00)
  10. System Uptime: 0 days 0:35:48.529
  11. *******************************************************************************
  12. * *
  13. * Bugcheck Analysis *
  14. * *
  15. *******************************************************************************
  16.  
  17. SYSTEM_SERVICE_EXCEPTION (3b)
  18. An exception happened while executing a system service routine.
  19. Arguments:
  20. Arg1: 00000000c0000005, Exception code that caused the bugcheck
  21. Arg2: fffff80003358ee4, Address of the instruction which caused the bugcheck
  22. Arg3: fffff8800bbe6d30, Address of the context record for the exception that caused the bugcheck
  23. Arg4: 0000000000000000, zero.
  24.  
  25. Debugging Details:
  26. ------------------
  27.  
  28. TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
  29.  
  30. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
  31.  
  32. FAULTING_IP:
  33. nt!SeTokenType+0
  34. fffff800`03358ee4 8b81b8000000 mov eax,dword ptr [rcx+0B8h]
  35.  
  36. CONTEXT: fffff8800bbe6d30 -- (.cxr 0xfffff8800bbe6d30)
  37. rax=0000000000001000 rbx=0000000000010000 rcx=00000001ffeeffee
  38. rdx=00000580164ef101 rsi=fffffa800578b160 rdi=fffffa8007f16500
  39. rip=fffff80003358ee4 rsp=fffff8800bbe7708 rbp=0000000000000000
  40. r8=fffff8800bbe78d0 r9=0000000000000000 r10=0000000000000000
  41. r11=fffffa80061b6bc0 r12=fffff8800bbe78d0 r13=fffffa80061b6b01
  42. r14=00000000000000d8 r15=fffff8800bbe78b0
  43. iopl=0 nv up ei ng nz na pe nc
  44. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282
  45. nt!SeTokenType:
  46. fffff800`03358ee4 8b81b8000000 mov eax,dword ptr [rcx+0B8h] ds:002b:00000001`ffef00a6=????????
  47. Resetting default scope
  48.  
  49. CUSTOMER_CRASH_COUNT: 1
  50.  
  51. DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
  52.  
  53. BUGCHECK_STR: 0x3B
  54.  
  55. PROCESS_NAME: chrome.exe
  56.  
  57. CURRENT_IRQL: 0
  58.  
  59. LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80003358ee4
  60.  
  61. STACK_TEXT:
  62. fffff880`0bbe6468 fffff800`030bf529 : 00000000`0000003b 00000000`c0000005 fffff800`03358ee4 fffff880`0bbe6d30 : nt!KeBugCheckEx
  63. fffff880`0bbe6470 fffff800`030bec7c : fffff880`0bbe74c8 fffff880`0bbe6d30 00000000`00000000 fffff800`0309e82c : nt!KiBugCheckDispatch+0x69
  64. fffff880`0bbe65b0 fffff800`030b6b5d : fffff800`03295840 00000000`00000000 fffff800`03009000 fffff880`0bbe74c8 : nt!KiSystemServiceHandler+0x7c
  65. fffff880`0bbe65f0 fffff800`0307c455 : fffff800`031b8a5c fffff880`0bbe6668 fffff880`0bbe74c8 fffff800`03009000 : nt!RtlpExecuteHandlerForException+0xd
  66. fffff880`0bbe6620 fffff800`0318cd7e : fffff880`0bbe74c8 fffff880`0bbe6d30 fffff880`00000000 fffff880`0bbe74c8 : nt!RtlDispatchException+0x415
  67. fffff880`0bbe6d00 fffff800`030bf60e : fffff880`0bbe74c8 00000000`10000004 fffff880`0bbe7570 fffffa80`0578b160 : nt!KiDispatchException+0x17e
  68. fffff880`0bbe7390 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xce
  69.  
  70.  
  71. STACK_COMMAND: kb
  72.  
  73. FOLLOWUP_IP:
  74. nt!KiSystemServiceHandler+7c
  75. fffff800`030bec7c b801000000 mov eax,1
  76.  
  77. SYMBOL_STACK_INDEX: 2
  78.  
  79. SYMBOL_NAME: nt!KiSystemServiceHandler+7c
  80.  
  81. FOLLOWUP_NAME: MachineOwner
  82.  
  83. MODULE_NAME: nt
  84.  
  85. IMAGE_NAME: ntkrnlmp.exe
  86.  
  87. DEBUG_FLR_IMAGE_TIMESTAMP: 5a58dc54
  88.  
  89. FAILURE_BUCKET_ID: X64_0x3B_nt!KiSystemServiceHandler+7c
  90.  
  91. BUCKET_ID: X64_0x3B_nt!KiSystemServiceHandler+7c
  92.  
  93. Followup: MachineOwner
  94. ---------
Add Comment
Please, Sign In to add comment