Advertisement
Guest User

Untitled

a guest
Oct 25th, 2018
213
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.29 KB | None | 0 0
  1. Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
  2. Online Crash Dump Analysis Service
  3. See http://www.osronline.com for more information
  4. Windows 8 Kernel Version 17134 MP (6 procs) Free x64
  5. Product: WinNt, suite: TerminalServer SingleUserTS
  6. Built by: 17134.1.amd64fre.rs4_release.180410-1804
  7. Machine Name:
  8. Kernel base = 0xfffff801`e7092000 PsLoadedModuleList = 0xfffff801`e7440290
  9. Debug session time: Thu Oct 25 03:13:53.323 2018 (UTC - 4:00)
  10. System Uptime: 1 days 6:57:13.018
  11. *******************************************************************************
  12. * *
  13. * Bugcheck Analysis *
  14. * *
  15. *******************************************************************************
  16.  
  17. SYSTEM_SERVICE_EXCEPTION (3b)
  18. An exception happened while executing a system service routine.
  19. Arguments:
  20. Arg1: 00000000c0000005, Exception code that caused the bugcheck
  21. Arg2: fffff801e70b7e38, Address of the instruction which caused the bugcheck
  22. Arg3: ffffd60889164c60, Address of the context record for the exception that caused the bugcheck
  23. Arg4: 0000000000000000, zero.
  24.  
  25. Debugging Details:
  26. ------------------
  27.  
  28. TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
  29.  
  30. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
  31.  
  32. FAULTING_IP:
  33. nt!KiBeginThreadAccountingPeriod+128
  34. fffff801`e70b7e38 f6417002 test byte ptr [rcx+70h],2
  35.  
  36. CONTEXT: ffffd60889164c60 -- (.cxr 0xffffd60889164c60)
  37. rax=00000000000008c8 rbx=ffff80006a3e2090 rcx=0008000000032908
  38. rdx=ffffd88034885d01 rsi=ffff80006a3e2001 rdi=ffffd88034880180
  39. rip=fffff801e70b7e38 rsp=ffffd60889165650 rbp=0000000000000000
  40. r8=ffffd60888fb1c90 r9=0000000000000001 r10=0000000000000000
  41. r11=000000000000003e r12=0000000000000bcc r13=0000000000000002
  42. r14=ffff80006ae18518 r15=0000000000000000
  43. iopl=0 nv up ei pl nz na pe nc
  44. cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00010202
  45. nt!KiBeginThreadAccountingPeriod+0x128:
  46. fffff801`e70b7e38 f6417002 test byte ptr [rcx+70h],2 ds:002b:00080000`00032978=??
  47. Resetting default scope
  48.  
  49. CUSTOMER_CRASH_COUNT: 1
  50.  
  51. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  52.  
  53. BUGCHECK_STR: 0x3B
  54.  
  55. PROCESS_NAME: SearchUI.exe
  56.  
  57. CURRENT_IRQL: 2
  58.  
  59. LAST_CONTROL_TRANSFER: from fffff801e72427e4 to fffff801e70b7e38
  60.  
  61. STACK_TEXT:
  62. ffffd608`89165650 fffff801`e72427e4 : ffffd880`34880180 ffff8000`6a3e2090 00000000`00000000 fffff801`e71caafd : nt!KiBeginThreadAccountingPeriod+0x128
  63. ffffd608`89165680 fffff801`e7242136 : ffff8000`6a3e2080 fffff801`e70a40ec 00000000`00000002 ffffd608`891658c0 : nt!SwapContext+0x3e4
  64. ffffd608`891656c0 fffff801`e70cb5d6 : ffff8000`00000000 ffff8000`6a931080 ffff8000`6ad7f080 00000000`00000000 : nt!KiSwapContext+0x76
  65. ffffd608`89165800 fffff801`e70cadcb : ffffd608`89165a00 ffffa500`059c9ae0 ffffa552`8002ce58 ffffa552`a9400170 : nt!KiSwapThread+0x2c6
  66. ffffd608`891658d0 fffff801`e71c8bb1 : ffff8000`6a931080 ffff8000`00000000 ffffd608`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x13b
  67. ffffd608`89165970 fffff801`e7648e67 : ffffd608`89165a80 00000000`00000000 0000000b`3935ed60 00000000`00000000 : nt!KeWaitForAlertByThreadId+0xd1
  68. ffffd608`891659d0 fffff801`e724bb43 : 00000000`00000000 00000000`00000000 0000000b`3935f0c0 0000000b`3935f010 : nt!NtWaitForAlertByThreadId+0x57
  69. ffffd608`89165a00 00007ffb`e4e5d7e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
  70. 0000000b`3935ece9 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7ffb`e4e5d7e4
  71.  
  72.  
  73. FOLLOWUP_IP:
  74. nt!KiBeginThreadAccountingPeriod+128
  75. fffff801`e70b7e38 f6417002 test byte ptr [rcx+70h],2
  76.  
  77. SYMBOL_STACK_INDEX: 0
  78.  
  79. SYMBOL_NAME: nt!KiBeginThreadAccountingPeriod+128
  80.  
  81. FOLLOWUP_NAME: MachineOwner
  82.  
  83. MODULE_NAME: nt
  84.  
  85. IMAGE_NAME: ntkrnlmp.exe
  86.  
  87. DEBUG_FLR_IMAGE_TIMESTAMP: 5ba316ae
  88.  
  89. STACK_COMMAND: .cxr 0xffffd60889164c60 ; kb
  90.  
  91. FAILURE_BUCKET_ID: X64_0x3B_nt!KiBeginThreadAccountingPeriod+128
  92.  
  93. BUCKET_ID: X64_0x3B_nt!KiBeginThreadAccountingPeriod+128
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement