Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
- Online Crash Dump Analysis Service
- See http://www.osronline.com for more information
- Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 7601.24024.amd64fre.win7sp1_ldr.180112-0600
- Machine Name:
- Kernel base = 0xfffff800`03009000 PsLoadedModuleList = 0xfffff800`03248a90
- Debug session time: Fri Apr 13 16:41:09.999 2018 (UTC - 4:00)
- System Uptime: 0 days 0:35:48.529
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- SYSTEM_SERVICE_EXCEPTION (3b)
- An exception happened while executing a system service routine.
- Arguments:
- Arg1: 00000000c0000005, Exception code that caused the bugcheck
- Arg2: fffff80003358ee4, Address of the instruction which caused the bugcheck
- Arg3: fffff8800bbe6d30, Address of the context record for the exception that caused the bugcheck
- Arg4: 0000000000000000, zero.
- Debugging Details:
- ------------------
- TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
- EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
- FAULTING_IP:
- nt!SeTokenType+0
- fffff800`03358ee4 8b81b8000000 mov eax,dword ptr [rcx+0B8h]
- CONTEXT: fffff8800bbe6d30 -- (.cxr 0xfffff8800bbe6d30)
- rax=0000000000001000 rbx=0000000000010000 rcx=00000001ffeeffee
- rdx=00000580164ef101 rsi=fffffa800578b160 rdi=fffffa8007f16500
- rip=fffff80003358ee4 rsp=fffff8800bbe7708 rbp=0000000000000000
- r8=fffff8800bbe78d0 r9=0000000000000000 r10=0000000000000000
- r11=fffffa80061b6bc0 r12=fffff8800bbe78d0 r13=fffffa80061b6b01
- r14=00000000000000d8 r15=fffff8800bbe78b0
- iopl=0 nv up ei ng nz na pe nc
- cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282
- nt!SeTokenType:
- fffff800`03358ee4 8b81b8000000 mov eax,dword ptr [rcx+0B8h] ds:002b:00000001`ffef00a6=????????
- Resetting default scope
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
- BUGCHECK_STR: 0x3B
- PROCESS_NAME: chrome.exe
- CURRENT_IRQL: 0
- LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80003358ee4
- STACK_TEXT:
- fffff880`0bbe6468 fffff800`030bf529 : 00000000`0000003b 00000000`c0000005 fffff800`03358ee4 fffff880`0bbe6d30 : nt!KeBugCheckEx
- fffff880`0bbe6470 fffff800`030bec7c : fffff880`0bbe74c8 fffff880`0bbe6d30 00000000`00000000 fffff800`0309e82c : nt!KiBugCheckDispatch+0x69
- fffff880`0bbe65b0 fffff800`030b6b5d : fffff800`03295840 00000000`00000000 fffff800`03009000 fffff880`0bbe74c8 : nt!KiSystemServiceHandler+0x7c
- fffff880`0bbe65f0 fffff800`0307c455 : fffff800`031b8a5c fffff880`0bbe6668 fffff880`0bbe74c8 fffff800`03009000 : nt!RtlpExecuteHandlerForException+0xd
- fffff880`0bbe6620 fffff800`0318cd7e : fffff880`0bbe74c8 fffff880`0bbe6d30 fffff880`00000000 fffff880`0bbe74c8 : nt!RtlDispatchException+0x415
- fffff880`0bbe6d00 fffff800`030bf60e : fffff880`0bbe74c8 00000000`10000004 fffff880`0bbe7570 fffffa80`0578b160 : nt!KiDispatchException+0x17e
- fffff880`0bbe7390 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xce
- STACK_COMMAND: kb
- FOLLOWUP_IP:
- nt!KiSystemServiceHandler+7c
- fffff800`030bec7c b801000000 mov eax,1
- SYMBOL_STACK_INDEX: 2
- SYMBOL_NAME: nt!KiSystemServiceHandler+7c
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- DEBUG_FLR_IMAGE_TIMESTAMP: 5a58dc54
- FAILURE_BUCKET_ID: X64_0x3B_nt!KiSystemServiceHandler+7c
- BUCKET_ID: X64_0x3B_nt!KiSystemServiceHandler+7c
- Followup: MachineOwner
- ---------
Add Comment
Please, Sign In to add comment