*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8000317167c, Address of the exception record for the exception that caused the bugcheck
Arg3: fffff880084acd10, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!ObDereferenceSecurityDescriptor+20
fffff800`0317167c 8b4610 mov eax,dword ptr [rsi+10h]
CONTEXT: fffff880084acd10 -- (.cxr 0xfffff880084acd10)
rax=fffff880084ad718 rbx=0000000000000000 rcx=0400000000000000
rdx=0000000000000001 rsi=03ffffffffffffe0 rdi=0000000000000000
rip=fffff8000317167c rsp=fffff880084ad6f0 rbp=fffffa8006561fe0
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=fffff880084ad7c8 r12=0000000000000001 r13=fffffa8007a34060
r14=fffffa8007a34100 r15=fffff8a003da9f90
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
nt!ObDereferenceSecurityDescriptor+0x20:
fffff800`0317167c 8b4610 mov eax,dword ptr [rsi+10h] ds:002b:03ffffff`fffffff0=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: nba2k12.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff8000313cbf8 to fffff8000317167c
STACK_TEXT:
fffff880`084ad6f0 fffff800`0313cbf8 : 00000000`00000000 fffffa80`06561fe0 fffffa80`03cd3570 00000000`00000000 : nt!ObDereferenceSecurityDescriptor+0x20
fffff880`084ad720 fffff800`02e7d0ee : 00000000`00000000 fffff8a0`03da9f90 fffffa80`03cd3570 fffffa80`03cd3570 : nt!SeDefaultObjectMethod+0xa8
fffff880`084ad770 fffff800`0318b194 : fffff8a0`03da9f90 00000000`00000000 fffffa80`049df060 00000000`00000000 : nt!ObfDereferenceObject+0x10e
fffff880`084ad7d0 fffff800`03134870 : 00000000`00000e50 fffff8a0`03da9f90 fffff8a0`11b5c940 00000000`00000e50 : nt!ObpCloseHandleTableEntry+0xc4
fffff880`084ad860 fffff800`031347e4 : 00000000`00000c04 00000000`00000000 fffffa80`07a34060 fffff800`0311df21 : nt!ObpCloseHandleProcedure+0x30
fffff880`084ad8a0 fffff800`031336ae : fffff8a0`0e66ba01 fffff880`084adbe0 fffffa80`07a34060 fffffa80`07a34101 : nt!ExSweepHandleTable+0x74
fffff880`084ad8e0 fffff800`0315a724 : fffff8a0`0e66ba90 00000000`00000000 00000000`00000000 fffffa80`055ea8a0 : nt!ObKillProcess+0x62
fffff880`084ad920 fffff800`03134b3d : 00000000`00000000 00000000`00000001 00000000`fff74000 fffffa80`0401ab60 : nt!PspExitThread+0x3f4
fffff880`084ad9f0 fffff800`02e54a43 : 00000000`00000100 fffffa80`049df120 00000000`00000001 fffff800`02e7f25d : nt!PsExitSpecialApc+0x1d
fffff880`084ada20 fffff800`02e54e80 : 00000000`02139d50 fffff880`084adaa0 fffff800`03135710 00000000`00000001 : nt!KiDeliverApc+0x2eb
fffff880`084adaa0 fffff800`02e771f7 : fffffa80`049df060 00000000`7fffffff fffff880`084adbb8 fffffa80`047bf060 : nt!KiInitiateUserApc+0x70
fffff880`084adbe0 00000000`75172dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c
00000000`252bf0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x75172dd9
FOLLOWUP_IP:
nt!ObDereferenceSecurityDescriptor+20
fffff800`0317167c 8b4610 mov eax,dword ptr [rsi+10h]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!ObDereferenceSecurityDescriptor+20
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600
STACK_COMMAND: .cxr 0xfffff880084acd10 ; kb
FAILURE_BUCKET_ID: X64_0x3B_nt!ObDereferenceSecurityDescriptor+20
BUCKET_ID: X64_0x3B_nt!ObDereferenceSecurityDescriptor+20
Followup: MachineOwner