Guest User

Minidump 1

a guest
Sep 9th, 2016
88
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 13.14 KB | None | 0 0
  1. Microsoft (R) Windows Debugger Version 10.0.14321.1024 AMD64
  2. Copyright (c) Microsoft Corporation. All rights reserved.
  3.  
  4.  
  5. Loading Dump File [C:\Users\chris\Documents\090916-19250-01.dmp]
  6. Mini Kernel Dump File: Only registers and stack trace are available
  7.  
  8. Symbol search path is: srv*
  9. Executable search path is:
  10. Windows 10 Kernel Version 14393 MP (6 procs) Free x64
  11. Product: WinNt, suite: TerminalServer SingleUserTS
  12. Built by: 14393.103.amd64fre.rs1_release_inmarket.160819-1924
  13. Machine Name:
  14. Kernel base = 0xfffff802`0b07e000 PsLoadedModuleList = 0xfffff802`0b3830a0
  15. Debug session time: Fri Sep 9 15:44:55.075 2016 (UTC - 5:00)
  16. System Uptime: 0 days 0:33:20.800
  17. Loading Kernel Symbols
  18. .
  19.  
  20. Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
  21. Run !sym noisy before .reload to track down problems loading symbols.
  22.  
  23. ..............................................................
  24. ................................................................
  25. .................................................
  26. Loading User Symbols
  27. Loading unloaded module list
  28. ................
  29. *******************************************************************************
  30. * *
  31. * Bugcheck Analysis *
  32. * *
  33. *******************************************************************************
  34.  
  35. Use !analyze -v to get detailed debugging information.
  36.  
  37. BugCheck D1, {1e246000, 2, 8, 1e246000}
  38.  
  39. Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+247 )
  40.  
  41. Followup: MachineOwner
  42. ---------
  43.  
  44. 3: kd> !analyze -v
  45. *******************************************************************************
  46. * *
  47. * Bugcheck Analysis *
  48. * *
  49. *******************************************************************************
  50.  
  51. DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
  52. An attempt was made to access a pageable (or completely invalid) address at an
  53. interrupt request level (IRQL) that is too high. This is usually
  54. caused by drivers using improper addresses.
  55. If kernel debugger is available get stack backtrace.
  56. Arguments:
  57. Arg1: 000000001e246000, memory referenced
  58. Arg2: 0000000000000002, IRQL
  59. Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
  60. Arg4: 000000001e246000, address which referenced memory
  61.  
  62. Debugging Details:
  63. ------------------
  64.  
  65.  
  66. DUMP_CLASS: 1
  67.  
  68. DUMP_QUALIFIER: 400
  69.  
  70. BUILD_VERSION_STRING: 10.0.14393.103 (rs1_release_inmarket.160819-1924)
  71.  
  72. SYSTEM_MANUFACTURER: To be filled by O.E.M.
  73.  
  74. SYSTEM_PRODUCT_NAME: To be filled by O.E.M.
  75.  
  76. SYSTEM_SKU: SKU
  77.  
  78. SYSTEM_VERSION: To be filled by O.E.M.
  79.  
  80. BIOS_VENDOR: American Megatrends Inc.
  81.  
  82. BIOS_VERSION: 2103
  83.  
  84. BIOS_DATE: 11/06/2013
  85.  
  86. BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
  87.  
  88. BASEBOARD_PRODUCT: M5A97 LE R2.0
  89.  
  90. BASEBOARD_VERSION: Rev 1.xx
  91.  
  92. DUMP_TYPE: 2
  93.  
  94. BUGCHECK_P1: 1e246000
  95.  
  96. BUGCHECK_P2: 2
  97.  
  98. BUGCHECK_P3: 8
  99.  
  100. BUGCHECK_P4: 1e246000
  101.  
  102. READ_ADDRESS: fffff8020b425338: Unable to get MiVisibleState
  103. 000000001e246000
  104.  
  105. CURRENT_IRQL: 2
  106.  
  107. FAULTING_IP:
  108. +0
  109. 00000000`1e246000 ?? ???
  110.  
  111. PROCESS_NAME: System
  112.  
  113. CPU_COUNT: 6
  114.  
  115. CPU_MHZ: 1082
  116.  
  117. CPU_VENDOR: AuthenticAMD
  118.  
  119. CPU_FAMILY: 15
  120.  
  121. CPU_MODEL: 2
  122.  
  123. CPU_STEPPING: 0
  124.  
  125. CUSTOMER_CRASH_COUNT: 1
  126.  
  127. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  128.  
  129. BUGCHECK_STR: AV
  130.  
  131. ANALYSIS_SESSION_HOST: DESKTOP-304TGLE
  132.  
  133. ANALYSIS_SESSION_TIME: 09-09-2016 16:06:41.0565
  134.  
  135. ANALYSIS_VERSION: 10.0.14321.1024 amd64fre
  136.  
  137. TRAP_FRAME: ffffc000290e3ad0 -- (.trap 0xffffc000290e3ad0)
  138. NOTE: The trap frame does not contain all registers.
  139. Some register values may be zeroed or incorrect.
  140. rax=0000000000000000 rbx=0000000000000000 rcx=ffffc000290e3cc0
  141. rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
  142. rip=000000001e246000 rsp=ffffc000290e3c60 rbp=0000000000000001
  143. r8=0000000000000000 r9=fffff8020b07e000 r10=0000000000000000
  144. r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
  145. r14=0000000000000000 r15=0000000000000000
  146. iopl=0 nv up ei ng nz na po nc
  147. 00000000`1e246000 ?? ???
  148. Resetting default scope
  149.  
  150. LAST_CONTROL_TRANSFER: from fffff8020b1d3229 to fffff8020b1c80d0
  151.  
  152. FAILED_INSTRUCTION_ADDRESS:
  153. +0
  154. 00000000`1e246000 ?? ???
  155.  
  156. STACK_TEXT:
  157. ffffc000`290e3988 fffff802`0b1d3229 : 00000000`0000000a 00000000`1e246000 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
  158. ffffc000`290e3990 fffff802`0b1d1807 : 00000000`00000001 ffffffff`ffffd8f0 431bde82`d7b634db 00000000`1e7df4e8 : nt!KiBugCheckDispatch+0x69
  159. ffffc000`290e3ad0 00000000`1e246000 : ffffffff`00000000 00007ffd`28884ed4 00000000`00000033 00000000`00000246 : nt!KiPageFault+0x247
  160. ffffc000`290e3c60 ffffffff`00000000 : 00007ffd`28884ed4 00000000`00000033 00000000`00000246 00000000`1e7df4b8 : 0x1e246000
  161. ffffc000`290e3c68 00007ffd`28884ed4 : 00000000`00000033 00000000`00000246 00000000`1e7df4b8 00000000`0000002b : 0xffffffff`00000000
  162. ffffc000`290e3c70 00000000`00000033 : 00000000`00000246 00000000`1e7df4b8 00000000`0000002b ffffc000`290e4000 : 0x00007ffd`28884ed4
  163. ffffc000`290e3c78 00000000`00000246 : 00000000`1e7df4b8 00000000`0000002b ffffc000`290e4000 ffffc000`290de000 : 0x33
  164. ffffc000`290e3c80 00000000`1e7df4b8 : 00000000`0000002b ffffc000`290e4000 ffffc000`290de000 00000000`00000000 : 0x246
  165. ffffc000`290e3c88 00000000`0000002b : ffffc000`290e4000 ffffc000`290de000 00000000`00000000 00000000`00000000 : 0x1e7df4b8
  166. ffffc000`290e3c90 ffffc000`290e4000 : ffffc000`290de000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x2b
  167. ffffc000`290e3c98 ffffc000`290de000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffc000`290e4000
  168. ffffc000`290e3ca0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffc000`290de000
  169.  
  170.  
  171. STACK_COMMAND: kb
  172.  
  173. THREAD_SHA1_HASH_MOD_FUNC: bf99962f16aee8a6a536cfcc5454c0cd4db15ac9
  174.  
  175. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 3fc3928ee7b2857c7b0acb22199e00ab7dceb90c
  176.  
  177. THREAD_SHA1_HASH_MOD: 2a7ca9d3ab5386d53fea7498e1d81b9c4a4c036b
  178.  
  179. FOLLOWUP_IP:
  180. nt!KiPageFault+247
  181. fffff802`0b1d1807 33c0 xor eax,eax
  182.  
  183. FAULT_INSTR_CODE: ffb0c033
  184.  
  185. SYMBOL_STACK_INDEX: 2
  186.  
  187. SYMBOL_NAME: nt!KiPageFault+247
  188.  
  189. FOLLOWUP_NAME: MachineOwner
  190.  
  191. MODULE_NAME: nt
  192.  
  193. IMAGE_NAME: ntkrnlmp.exe
  194.  
  195. DEBUG_FLR_IMAGE_TIMESTAMP: 57b7e3c6
  196.  
  197. IMAGE_VERSION: 10.0.14393.103
  198.  
  199. BUCKET_ID_FUNC_OFFSET: 247
  200.  
  201. FAILURE_BUCKET_ID: AV_CODE_AV_BAD_IP_nt!KiPageFault
  202.  
  203. BUCKET_ID: AV_CODE_AV_BAD_IP_nt!KiPageFault
  204.  
  205. PRIMARY_PROBLEM_CLASS: AV_CODE_AV_BAD_IP_nt!KiPageFault
  206.  
  207. TARGET_TIME: 2016-09-09T20:44:55.000Z
  208.  
  209. OSBUILD: 14393
  210.  
  211. OSSERVICEPACK: 103
  212.  
  213. SERVICEPACK_NUMBER: 0
  214.  
  215. OS_REVISION: 0
  216.  
  217. SUITE_MASK: 272
  218.  
  219. PRODUCT_TYPE: 1
  220.  
  221. OSPLATFORM_TYPE: x64
  222.  
  223. OSNAME: Windows 10
  224.  
  225. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
  226.  
  227. OS_LOCALE:
  228.  
  229. USER_LCID: 0
  230.  
  231. OSBUILD_TIMESTAMP: 2016-08-19 23:59:50
  232.  
  233. BUILDDATESTAMP_STR: 160819-1924
  234.  
  235. BUILDLAB_STR: rs1_release_inmarket
  236.  
  237. BUILDOSVER_STR: 10.0.14393.103
  238.  
  239. ANALYSIS_SESSION_ELAPSED_TIME: 52d
  240.  
  241. ANALYSIS_SOURCE: KM
  242.  
  243. FAILURE_ID_HASH_STRING: km:av_code_av_bad_ip_nt!kipagefault
  244.  
  245. FAILURE_ID_HASH: {73cd60cc-83fa-6b76-df08-1961c31d7403}
  246.  
  247. Followup: MachineOwner
  248. ---------
  249.  
  250. 3: kd> !analyze -v
  251. *******************************************************************************
  252. * *
  253. * Bugcheck Analysis *
  254. * *
  255. *******************************************************************************
  256.  
  257. DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
  258. An attempt was made to access a pageable (or completely invalid) address at an
  259. interrupt request level (IRQL) that is too high. This is usually
  260. caused by drivers using improper addresses.
  261. If kernel debugger is available get stack backtrace.
  262. Arguments:
  263. Arg1: 000000001e246000, memory referenced
  264. Arg2: 0000000000000002, IRQL
  265. Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
  266. Arg4: 000000001e246000, address which referenced memory
  267.  
  268. Debugging Details:
  269. ------------------
  270.  
  271.  
  272. DUMP_CLASS: 1
  273.  
  274. DUMP_QUALIFIER: 400
  275.  
  276. BUILD_VERSION_STRING: 10.0.14393.103 (rs1_release_inmarket.160819-1924)
  277.  
  278. SYSTEM_MANUFACTURER: To be filled by O.E.M.
  279.  
  280. SYSTEM_PRODUCT_NAME: To be filled by O.E.M.
  281.  
  282. SYSTEM_SKU: SKU
  283.  
  284. SYSTEM_VERSION: To be filled by O.E.M.
  285.  
  286. BIOS_VENDOR: American Megatrends Inc.
  287.  
  288. BIOS_VERSION: 2103
  289.  
  290. BIOS_DATE: 11/06/2013
  291.  
  292. BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
  293.  
  294. BASEBOARD_PRODUCT: M5A97 LE R2.0
  295.  
  296. BASEBOARD_VERSION: Rev 1.xx
  297.  
  298. DUMP_TYPE: 2
  299.  
  300. BUGCHECK_P1: 1e246000
  301.  
  302. BUGCHECK_P2: 2
  303.  
  304. BUGCHECK_P3: 8
  305.  
  306. BUGCHECK_P4: 1e246000
  307.  
  308. READ_ADDRESS: 000000001e246000
  309.  
  310. CURRENT_IRQL: 2
  311.  
  312. FAULTING_IP:
  313. +0
  314. 00000000`1e246000 ?? ???
  315.  
  316. PROCESS_NAME: System
  317.  
  318. CPU_COUNT: 6
  319.  
  320. CPU_MHZ: 1082
  321.  
  322. CPU_VENDOR: AuthenticAMD
  323.  
  324. CPU_FAMILY: 15
  325.  
  326. CPU_MODEL: 2
  327.  
  328. CPU_STEPPING: 0
  329.  
  330. CUSTOMER_CRASH_COUNT: 1
  331.  
  332. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  333.  
  334. BUGCHECK_STR: AV
  335.  
  336. ANALYSIS_SESSION_HOST: DESKTOP-304TGLE
  337.  
  338. ANALYSIS_SESSION_TIME: 09-09-2016 16:06:43.0618
  339.  
  340. ANALYSIS_VERSION: 10.0.14321.1024 amd64fre
  341.  
  342. TRAP_FRAME: ffffc000290e3ad0 -- (.trap 0xffffc000290e3ad0)
  343. NOTE: The trap frame does not contain all registers.
  344. Some register values may be zeroed or incorrect.
  345. rax=0000000000000000 rbx=0000000000000000 rcx=ffffc000290e3cc0
  346. rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
  347. rip=000000001e246000 rsp=ffffc000290e3c60 rbp=0000000000000001
  348. r8=0000000000000000 r9=fffff8020b07e000 r10=0000000000000000
  349. r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
  350. r14=0000000000000000 r15=0000000000000000
  351. iopl=0 nv up ei ng nz na po nc
  352. 00000000`1e246000 ?? ???
  353. Resetting default scope
  354.  
  355. LAST_CONTROL_TRANSFER: from fffff8020b1d3229 to fffff8020b1c80d0
  356.  
  357. FAILED_INSTRUCTION_ADDRESS:
  358. +0
  359. 00000000`1e246000 ?? ???
  360.  
  361. STACK_TEXT:
  362. ffffc000`290e3988 fffff802`0b1d3229 : 00000000`0000000a 00000000`1e246000 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
  363. ffffc000`290e3990 fffff802`0b1d1807 : 00000000`00000001 ffffffff`ffffd8f0 431bde82`d7b634db 00000000`1e7df4e8 : nt!KiBugCheckDispatch+0x69
  364. ffffc000`290e3ad0 00000000`1e246000 : ffffffff`00000000 00007ffd`28884ed4 00000000`00000033 00000000`00000246 : nt!KiPageFault+0x247
  365. ffffc000`290e3c60 ffffffff`00000000 : 00007ffd`28884ed4 00000000`00000033 00000000`00000246 00000000`1e7df4b8 : 0x1e246000
  366. ffffc000`290e3c68 00007ffd`28884ed4 : 00000000`00000033 00000000`00000246 00000000`1e7df4b8 00000000`0000002b : 0xffffffff`00000000
  367. ffffc000`290e3c70 00000000`00000033 : 00000000`00000246 00000000`1e7df4b8 00000000`0000002b ffffc000`290e4000 : 0x00007ffd`28884ed4
  368. ffffc000`290e3c78 00000000`00000246 : 00000000`1e7df4b8 00000000`0000002b ffffc000`290e4000 ffffc000`290de000 : 0x33
  369. ffffc000`290e3c80 00000000`1e7df4b8 : 00000000`0000002b ffffc000`290e4000 ffffc000`290de000 00000000`00000000 : 0x246
  370. ffffc000`290e3c88 00000000`0000002b : ffffc000`290e4000 ffffc000`290de000 00000000`00000000 00000000`00000000 : 0x1e7df4b8
  371. ffffc000`290e3c90 ffffc000`290e4000 : ffffc000`290de000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x2b
  372. ffffc000`290e3c98 ffffc000`290de000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffc000`290e4000
  373. ffffc000`290e3ca0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffc000`290de000
  374.  
  375.  
  376. STACK_COMMAND: kb
  377.  
  378. THREAD_SHA1_HASH_MOD_FUNC: bf99962f16aee8a6a536cfcc5454c0cd4db15ac9
  379.  
  380. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 3fc3928ee7b2857c7b0acb22199e00ab7dceb90c
  381.  
  382. THREAD_SHA1_HASH_MOD: 2a7ca9d3ab5386d53fea7498e1d81b9c4a4c036b
  383.  
  384. FOLLOWUP_IP:
  385. nt!KiPageFault+247
  386. fffff802`0b1d1807 33c0 xor eax,eax
  387.  
  388. FAULT_INSTR_CODE: ffb0c033
  389.  
  390. SYMBOL_STACK_INDEX: 2
  391.  
  392. SYMBOL_NAME: nt!KiPageFault+247
  393.  
  394. FOLLOWUP_NAME: MachineOwner
  395.  
  396. MODULE_NAME: nt
  397.  
  398. IMAGE_NAME: ntkrnlmp.exe
  399.  
  400. DEBUG_FLR_IMAGE_TIMESTAMP: 57b7e3c6
  401.  
  402. IMAGE_VERSION: 10.0.14393.103
  403.  
  404. BUCKET_ID_FUNC_OFFSET: 247
  405.  
  406. FAILURE_BUCKET_ID: AV_CODE_AV_BAD_IP_nt!KiPageFault
  407.  
  408. BUCKET_ID: AV_CODE_AV_BAD_IP_nt!KiPageFault
  409.  
  410. PRIMARY_PROBLEM_CLASS: AV_CODE_AV_BAD_IP_nt!KiPageFault
  411.  
  412. TARGET_TIME: 2016-09-09T20:44:55.000Z
  413.  
  414. OSBUILD: 14393
  415.  
  416. OSSERVICEPACK: 103
  417.  
  418. SERVICEPACK_NUMBER: 0
  419.  
  420. OS_REVISION: 0
  421.  
  422. SUITE_MASK: 272
  423.  
  424. PRODUCT_TYPE: 1
  425.  
  426. OSPLATFORM_TYPE: x64
  427.  
  428. OSNAME: Windows 10
  429.  
  430. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
  431.  
  432. OS_LOCALE:
  433.  
  434. USER_LCID: 0
  435.  
  436. OSBUILD_TIMESTAMP: 2016-08-19 23:59:50
  437.  
  438. BUILDDATESTAMP_STR: 160819-1924
  439.  
  440. BUILDLAB_STR: rs1_release_inmarket
  441.  
  442. BUILDOSVER_STR: 10.0.14393.103
  443.  
  444. ANALYSIS_SESSION_ELAPSED_TIME: 548
  445.  
  446. ANALYSIS_SOURCE: KM
  447.  
  448. FAILURE_ID_HASH_STRING: km:av_code_av_bad_ip_nt!kipagefault
  449.  
  450. FAILURE_ID_HASH: {73cd60cc-83fa-6b76-df08-1961c31d7403}
  451.  
  452. Followup: MachineOwner
  453. ---------
Add Comment
Please, Sign In to add comment