Advertisement
Guest User

Crash

a guest
Dec 12th, 2017
272
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.96 KB | None | 0 0
  1. Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
  2. Online Crash Dump Analysis Service
  3. See http://www.osronline.com for more information
  4. Windows 8 Kernel Version 15063 MP (4 procs) Free x64
  5. Product: WinNt, suite: TerminalServer SingleUserTS
  6. Built by: 15063.0.amd64fre.rs2_release.170317-1834
  7. Machine Name:
  8. Kernel base = 0xfffff800`03812000 PsLoadedModuleList = 0xfffff800`03b5e660
  9. Debug session time: Tue Dec 12 05:10:01.284 2017 (UTC - 5:00)
  10. System Uptime: 0 days 0:02:23.207
  11. *******************************************************************************
  12. * *
  13. * Bugcheck Analysis *
  14. * *
  15. *******************************************************************************
  16.  
  17. SYSTEM_SERVICE_EXCEPTION (3b)
  18. An exception happened while executing a system service routine.
  19. Arguments:
  20. Arg1: 00000000c0000096, Exception code that caused the bugcheck
  21. Arg2: ffff9a809d04b8b3, Address of the instruction which caused the bugcheck
  22. Arg3: ffff9a8099001c40, Address of the context record for the exception that caused the bugcheck
  23. Arg4: 0000000000000000, zero.
  24.  
  25. Debugging Details:
  26. ------------------
  27.  
  28. TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
  29.  
  30. EXCEPTION_CODE: (NTSTATUS) 0xc0000096 - {EXCEPTION} Privileged instruction.
  31.  
  32. FAULTING_IP:
  33. +25c6e
  34. ffff9a80`9d04b8b3 0f22e0 mov cr4,rax
  35.  
  36. CONTEXT: ffff9a8099001c40 -- (.cxr 0xffff9a8099001c40)
  37. rax=0000000000000274 rbx=ffffe708ab975340 rcx=0000000000000000
  38. rdx=ffffe708ab975340 rsi=0000000000000000 rdi=0000000000000000
  39. rip=ffff9a809d04b8b3 rsp=ffff9a8099002638 rbp=0000000000000206
  40. r8=0000000000024cc0 r9=ffffe708ab975000 r10=fffff80002aa7050
  41. r11=ffffe708ab851310 r12=0000000000000000 r13=0000000000000180
  42. r14=ffffe708ab94fa80 r15=0000000000000030
  43. iopl=0 nv up di pl nz na po nc
  44. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00000006
  45. ffff9a80`9d04b8b3 0f22e0 mov cr4,rax
  46. Resetting default scope
  47.  
  48. CUSTOMER_CRASH_COUNT: 1
  49.  
  50. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  51.  
  52. BUGCHECK_STR: 0x3B
  53.  
  54. PROCESS_NAME: VBoxHeadless.e
  55.  
  56. CURRENT_IRQL: 0
  57.  
  58. LAST_CONTROL_TRANSFER: from ffff9a809d04b732 to ffff9a809d04b8b3
  59.  
  60. STACK_TEXT:
  61. ffff9a80`99002638 ffff9a80`9d04b732 : 00000000`00000010 fffff800`02aa5c6e 00007ffd`713a10d8 ffffd505`c0620108 : 0xffff9a80`9d04b8b3
  62. ffff9a80`99002640 00000000`00000010 : fffff800`02aa5c6e 00007ffd`713a10d8 ffffd505`c0620108 ffffe708`a5a66400 : 0xffff9a80`9d04b732
  63. ffff9a80`99002648 fffff800`02aa5c6e : 00007ffd`713a10d8 ffffd505`c0620108 ffffe708`a5a66400 ffffe708`ab8aeb40 : 0x10
  64. ffff9a80`99002650 00007ffd`713a10d8 : ffffd505`c0620108 ffffe708`a5a66400 ffffe708`ab8aeb40 ffff9a80`99002a80 : VMMR0+0x25c6e
  65. ffff9a80`99002658 ffffd505`c0620108 : ffffe708`a5a66400 ffffe708`ab8aeb40 ffff9a80`99002a80 00000000`00000000 : 0x7ffd`713a10d8
  66. ffff9a80`99002660 ffffe708`a5a66400 : ffffe708`ab8aeb40 ffff9a80`99002a80 00000000`00000000 00000000`00000000 : 0xffffd505`c0620108
  67. ffff9a80`99002668 ffffe708`ab8aeb40 : ffff9a80`99002a80 00000000`00000000 00000000`00000000 ffffe708`a5a72101 : 0xffffe708`a5a66400
  68. ffff9a80`99002670 ffff9a80`99002a80 : 00000000`00000000 00000000`00000000 ffffe708`a5a72101 ffff9a80`00000000 : 0xffffe708`ab8aeb40
  69. ffff9a80`99002678 00000000`00000000 : 00000000`00000000 ffffe708`a5a72101 ffff9a80`00000000 fffff800`02b1b760 : 0xffff9a80`99002a80
  70.  
  71.  
  72. FOLLOWUP_IP:
  73. VMMR0+25c6e
  74. fffff800`02aa5c6e 0fb6942480000000 movzx edx,byte ptr [rsp+80h]
  75.  
  76. SYMBOL_STACK_INDEX: 3
  77.  
  78. SYMBOL_NAME: VMMR0+25c6e
  79.  
  80. FOLLOWUP_NAME: MachineOwner
  81.  
  82. MODULE_NAME: VMMR0
  83.  
  84. IMAGE_NAME: VMMR0.r0
  85.  
  86. DEBUG_FLR_IMAGE_TIMESTAMP: 5a15a475
  87.  
  88. STACK_COMMAND: .cxr 0xffff9a8099001c40 ; kb
  89.  
  90. FAILURE_BUCKET_ID: X64_0x3B_VMMR0+25c6e
  91.  
  92. BUCKET_ID: X64_0x3B_VMMR0+25c6e
  93.  
  94. Followup: MachineOwner
  95. ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement