Advertisement
Guest User

Untitled

a guest
Aug 20th, 2015
245
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 13.05 KB | None | 0 0
  1.  
  2. Microsoft (R) Windows Debugger Version 6.3.9600.17237 AMD64
  3. Copyright (c) Microsoft Corporation. All rights reserved.
  4.  
  5.  
  6. Loading Dump File [C:\Windows\Minidump\082015-15802-01.dmp]
  7. Mini Kernel Dump File: Only registers and stack trace are available
  8.  
  9.  
  10. ************* Symbol Path validation summary **************
  11. Response Time (ms) Location
  12. Deferred SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
  13. Symbol search path is: SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
  14. Executable search path is:
  15. Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
  16. Product: WinNt, suite: TerminalServer SingleUserTS
  17. Built by: 7601.18869.amd64fre.win7sp1_gdr.150525-0603
  18. Machine Name:
  19. Kernel base = 0xfffff800`03059000 PsLoadedModuleList = 0xfffff800`032a0730
  20. Debug session time: Thu Aug 20 17:33:22.345 2015 (UTC - 5:00)
  21. System Uptime: 1 days 22:12:11.173
  22. Loading Kernel Symbols
  23. ...............................................................
  24. ................................................................
  25. ..............................................................
  26. Loading User Symbols
  27. Loading unloaded module list
  28. ..................................................
  29. *******************************************************************************
  30. * *
  31. * Bugcheck Analysis *
  32. * *
  33. *******************************************************************************
  34.  
  35. Use !analyze -v to get detailed debugging information.
  36.  
  37. BugCheck 50, {ffffffff8298e1d0, 0, fffff800030c4360, 5}
  38.  
  39. *** WARNING: Unable to verify timestamp for driver.sys
  40. *** ERROR: Module load completed but symbols could not be loaded for driver.sys
  41.  
  42. Could not read faulting driver name
  43. Probably caused by : driver.sys ( driver+1698 )
  44.  
  45. Followup: MachineOwner
  46. ---------
  47.  
  48. 7: kd> !analyze -v
  49. *******************************************************************************
  50. * *
  51. * Bugcheck Analysis *
  52. * *
  53. *******************************************************************************
  54.  
  55. PAGE_FAULT_IN_NONPAGED_AREA (50)
  56. Invalid system memory was referenced. This cannot be protected by try-except,
  57. it must be protected by a Probe. Typically the address is just plain bad or it
  58. is pointing at freed memory.
  59. Arguments:
  60. Arg1: ffffffff8298e1d0, memory referenced.
  61. Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
  62. Arg3: fffff800030c4360, If non-zero, the instruction address which referenced the bad memory
  63. address.
  64. Arg4: 0000000000000005, (reserved)
  65.  
  66. Debugging Details:
  67. ------------------
  68.  
  69.  
  70. Could not read faulting driver name
  71.  
  72. READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8000330a100
  73. GetUlongFromAddress: unable to read from fffff8000330a1c0
  74. ffffffff8298e1d0
  75.  
  76. FAULTING_IP:
  77. nt!memcpy+80
  78. fffff800`030c4360 8a040a mov al,byte ptr [rdx+rcx]
  79.  
  80. MM_INTERNAL_CODE: 5
  81.  
  82. CUSTOMER_CRASH_COUNT: 1
  83.  
  84. DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
  85.  
  86. BUGCHECK_STR: 0x50
  87.  
  88. PROCESS_NAME: DayZ.exe
  89.  
  90. CURRENT_IRQL: 0
  91.  
  92. ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) amd64fre
  93.  
  94. TRAP_FRAME: fffff88013010020 -- (.trap 0xfffff88013010020)
  95. NOTE: The trap frame does not contain all registers.
  96. Some register values may be zeroed or incorrect.
  97. rax=fffffa801659eb50 rbx=0000000000000000 rcx=fffff88013010330
  98. rdx=0000077f6f97dea0 rsi=0000000000000000 rdi=0000000000000000
  99. rip=fffff800030c4360 rsp=fffff880130101b8 rbp=fffff880130106b0
  100. r8=0000000000000004 r9=ffffffff8298e1d0 r10=0000000000000000
  101. r11=fffff88013010330 r12=0000000000000000 r13=0000000000000000
  102. r14=0000000000000000 r15=0000000000000000
  103. iopl=0 nv up ei pl nz na pe nc
  104. nt!memcpy+0x80:
  105. fffff800`030c4360 8a040a mov al,byte ptr [rdx+rcx] ds:ffffffff`8298e1d0=??
  106. Resetting default scope
  107.  
  108. LAST_CONTROL_TRANSFER: from fffff800031477aa to fffff800030cd8c0
  109.  
  110. STACK_TEXT:
  111. fffff880`1300feb8 fffff800`031477aa : 00000000`00000050 ffffffff`8298e1d0 00000000`00000000 fffff880`13010020 : nt!KeBugCheckEx
  112. fffff880`1300fec0 fffff800`030cb9ee : 00000000`00000000 ffffffff`8298e1d0 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x3fda1
  113. fffff880`13010020 fffff800`030c4360 : fffff800`03371bc7 fffff880`130106b0 00000000`0000004d 00000000`00000000 : nt!KiPageFault+0x16e
  114. fffff880`130101b8 fffff800`03371bc7 : fffff880`130106b0 00000000`0000004d 00000000`00000000 00000000`00000000 : nt!memcpy+0x80
  115. fffff880`130101c0 fffff880`09545698 : fffffa80`183c1280 ffffffff`8298e1d0 fffffa80`16651150 00000000`02b1fe48 : nt!MmCopyVirtualMemory+0x17b
  116. fffff880`13010570 fffffa80`183c1280 : ffffffff`8298e1d0 fffffa80`16651150 00000000`02b1fe48 00000000`00000004 : driver+0x1698
  117. fffff880`13010578 ffffffff`8298e1d0 : fffffa80`16651150 00000000`02b1fe48 00000000`00000004 0000057f`eaebb300 : 0xfffffa80`183c1280
  118. fffff880`13010580 fffffa80`16651150 : 00000000`02b1fe48 00000000`00000004 0000057f`eaebb300 fffff880`130105f0 : 0xffffffff`8298e1d0
  119. fffff880`13010588 00000000`02b1fe48 : 00000000`00000004 0000057f`eaebb300 fffff880`130105f0 0000057f`ea2e5438 : 0xfffffa80`16651150
  120. fffff880`13010590 00000000`00000004 : 0000057f`eaebb300 fffff880`130105f0 0000057f`ea2e5438 fffffa80`00000000 : 0x2b1fe48
  121. fffff880`13010598 0000057f`eaebb300 : fffff880`130105f0 0000057f`ea2e5438 fffffa80`00000000 fffffa80`183c1280 : 0x4
  122. fffff880`130105a0 fffff880`130105f0 : 0000057f`ea2e5438 fffffa80`00000000 fffffa80`183c1280 fffffa80`183c1280 : 0x0000057f`eaebb300
  123. fffff880`130105a8 0000057f`ea2e5438 : fffffa80`00000000 fffffa80`183c1280 fffffa80`183c1280 fffffa80`0d2cfae0 : 0xfffff880`130105f0
  124. fffff880`130105b0 fffffa80`00000000 : fffffa80`183c1280 fffffa80`183c1280 fffffa80`0d2cfae0 ffffffff`8298e1d0 : 0x0000057f`ea2e5438
  125. fffff880`130105b8 fffffa80`183c1280 : fffffa80`183c1280 fffffa80`0d2cfae0 ffffffff`8298e1d0 00000000`02b1fe48 : 0xfffffa80`00000000
  126. fffff880`130105c0 fffffa80`183c1280 : fffffa80`0d2cfae0 ffffffff`8298e1d0 00000000`02b1fe48 fffffa80`16651150 : 0xfffffa80`183c1280
  127. fffff880`130105c8 fffffa80`0d2cfae0 : ffffffff`8298e1d0 00000000`02b1fe48 fffffa80`16651150 00000000`00000020 : 0xfffffa80`183c1280
  128. fffff880`130105d0 ffffffff`8298e1d0 : 00000000`02b1fe48 fffffa80`16651150 00000000`00000020 00000000`00000000 : 0xfffffa80`0d2cfae0
  129. fffff880`130105d8 00000000`02b1fe48 : fffffa80`16651150 00000000`00000020 00000000`00000000 00000000`00000001 : 0xffffffff`8298e1d0
  130. fffff880`130105e0 fffffa80`16651150 : 00000000`00000020 00000000`00000000 00000000`00000001 00000000`00000000 : 0x2b1fe48
  131. fffff880`130105e8 00000000`00000020 : 00000000`00000000 00000000`00000001 00000000`00000000 fffff880`09545843 : 0xfffffa80`16651150
  132. fffff880`130105f0 00000000`00000000 : 00000000`00000001 00000000`00000000 fffff880`09545843 fffffa80`1402f840 : 0x20
  133.  
  134.  
  135. STACK_COMMAND: kb
  136.  
  137. FOLLOWUP_IP:
  138. driver+1698
  139. fffff880`09545698 ?? ???
  140.  
  141. SYMBOL_STACK_INDEX: 5
  142.  
  143. SYMBOL_NAME: driver+1698
  144.  
  145. FOLLOWUP_NAME: MachineOwner
  146.  
  147. MODULE_NAME: driver
  148.  
  149. IMAGE_NAME: driver.sys
  150.  
  151. DEBUG_FLR_IMAGE_TIMESTAMP: 55d64ba9
  152.  
  153. FAILURE_BUCKET_ID: X64_0x50_driver+1698
  154.  
  155. BUCKET_ID: X64_0x50_driver+1698
  156.  
  157. ANALYSIS_SOURCE: KM
  158.  
  159. FAILURE_ID_HASH_STRING: km:x64_0x50_driver+1698
  160.  
  161. FAILURE_ID_HASH: {bc04ac80-71e5-deb2-6e62-72e0d3ab0584}
  162.  
  163. Followup: MachineOwner
  164. ---------
  165.  
  166. 7: kd> !analyze -v
  167. *******************************************************************************
  168. * *
  169. * Bugcheck Analysis *
  170. * *
  171. *******************************************************************************
  172.  
  173. PAGE_FAULT_IN_NONPAGED_AREA (50)
  174. Invalid system memory was referenced. This cannot be protected by try-except,
  175. it must be protected by a Probe. Typically the address is just plain bad or it
  176. is pointing at freed memory.
  177. Arguments:
  178. Arg1: ffffffff8298e1d0, memory referenced.
  179. Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
  180. Arg3: fffff800030c4360, If non-zero, the instruction address which referenced the bad memory
  181. address.
  182. Arg4: 0000000000000005, (reserved)
  183.  
  184. Debugging Details:
  185. ------------------
  186.  
  187.  
  188. Could not read faulting driver name
  189.  
  190. READ_ADDRESS: ffffffff8298e1d0
  191.  
  192. FAULTING_IP:
  193. nt!memcpy+80
  194. fffff800`030c4360 8a040a mov al,byte ptr [rdx+rcx]
  195.  
  196. MM_INTERNAL_CODE: 5
  197.  
  198. CUSTOMER_CRASH_COUNT: 1
  199.  
  200. DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
  201.  
  202. BUGCHECK_STR: 0x50
  203.  
  204. PROCESS_NAME: DayZ.exe
  205.  
  206. CURRENT_IRQL: 0
  207.  
  208. ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) amd64fre
  209.  
  210. TRAP_FRAME: fffff88013010020 -- (.trap 0xfffff88013010020)
  211. NOTE: The trap frame does not contain all registers.
  212. Some register values may be zeroed or incorrect.
  213. rax=fffffa801659eb50 rbx=0000000000000000 rcx=fffff88013010330
  214. rdx=0000077f6f97dea0 rsi=0000000000000000 rdi=0000000000000000
  215. rip=fffff800030c4360 rsp=fffff880130101b8 rbp=fffff880130106b0
  216. r8=0000000000000004 r9=ffffffff8298e1d0 r10=0000000000000000
  217. r11=fffff88013010330 r12=0000000000000000 r13=0000000000000000
  218. r14=0000000000000000 r15=0000000000000000
  219. iopl=0 nv up ei pl nz na pe nc
  220. nt!memcpy+0x80:
  221. fffff800`030c4360 8a040a mov al,byte ptr [rdx+rcx] ds:ffffffff`8298e1d0=??
  222. Resetting default scope
  223.  
  224. LAST_CONTROL_TRANSFER: from fffff800031477aa to fffff800030cd8c0
  225.  
  226. STACK_TEXT:
  227. fffff880`1300feb8 fffff800`031477aa : 00000000`00000050 ffffffff`8298e1d0 00000000`00000000 fffff880`13010020 : nt!KeBugCheckEx
  228. fffff880`1300fec0 fffff800`030cb9ee : 00000000`00000000 ffffffff`8298e1d0 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x3fda1
  229. fffff880`13010020 fffff800`030c4360 : fffff800`03371bc7 fffff880`130106b0 00000000`0000004d 00000000`00000000 : nt!KiPageFault+0x16e
  230. fffff880`130101b8 fffff800`03371bc7 : fffff880`130106b0 00000000`0000004d 00000000`00000000 00000000`00000000 : nt!memcpy+0x80
  231. fffff880`130101c0 fffff880`09545698 : fffffa80`183c1280 ffffffff`8298e1d0 fffffa80`16651150 00000000`02b1fe48 : nt!MmCopyVirtualMemory+0x17b
  232. fffff880`13010570 fffffa80`183c1280 : ffffffff`8298e1d0 fffffa80`16651150 00000000`02b1fe48 00000000`00000004 : driver+0x1698
  233. fffff880`13010578 ffffffff`8298e1d0 : fffffa80`16651150 00000000`02b1fe48 00000000`00000004 0000057f`eaebb300 : 0xfffffa80`183c1280
  234. fffff880`13010580 fffffa80`16651150 : 00000000`02b1fe48 00000000`00000004 0000057f`eaebb300 fffff880`130105f0 : 0xffffffff`8298e1d0
  235. fffff880`13010588 00000000`02b1fe48 : 00000000`00000004 0000057f`eaebb300 fffff880`130105f0 0000057f`ea2e5438 : 0xfffffa80`16651150
  236. fffff880`13010590 00000000`00000004 : 0000057f`eaebb300 fffff880`130105f0 0000057f`ea2e5438 fffffa80`00000000 : 0x2b1fe48
  237. fffff880`13010598 0000057f`eaebb300 : fffff880`130105f0 0000057f`ea2e5438 fffffa80`00000000 fffffa80`183c1280 : 0x4
  238. fffff880`130105a0 fffff880`130105f0 : 0000057f`ea2e5438 fffffa80`00000000 fffffa80`183c1280 fffffa80`183c1280 : 0x0000057f`eaebb300
  239. fffff880`130105a8 0000057f`ea2e5438 : fffffa80`00000000 fffffa80`183c1280 fffffa80`183c1280 fffffa80`0d2cfae0 : 0xfffff880`130105f0
  240. fffff880`130105b0 fffffa80`00000000 : fffffa80`183c1280 fffffa80`183c1280 fffffa80`0d2cfae0 ffffffff`8298e1d0 : 0x0000057f`ea2e5438
  241. fffff880`130105b8 fffffa80`183c1280 : fffffa80`183c1280 fffffa80`0d2cfae0 ffffffff`8298e1d0 00000000`02b1fe48 : 0xfffffa80`00000000
  242. fffff880`130105c0 fffffa80`183c1280 : fffffa80`0d2cfae0 ffffffff`8298e1d0 00000000`02b1fe48 fffffa80`16651150 : 0xfffffa80`183c1280
  243. fffff880`130105c8 fffffa80`0d2cfae0 : ffffffff`8298e1d0 00000000`02b1fe48 fffffa80`16651150 00000000`00000020 : 0xfffffa80`183c1280
  244. fffff880`130105d0 ffffffff`8298e1d0 : 00000000`02b1fe48 fffffa80`16651150 00000000`00000020 00000000`00000000 : 0xfffffa80`0d2cfae0
  245. fffff880`130105d8 00000000`02b1fe48 : fffffa80`16651150 00000000`00000020 00000000`00000000 00000000`00000001 : 0xffffffff`8298e1d0
  246. fffff880`130105e0 fffffa80`16651150 : 00000000`00000020 00000000`00000000 00000000`00000001 00000000`00000000 : 0x2b1fe48
  247. fffff880`130105e8 00000000`00000020 : 00000000`00000000 00000000`00000001 00000000`00000000 fffff880`09545843 : 0xfffffa80`16651150
  248. fffff880`130105f0 00000000`00000000 : 00000000`00000001 00000000`00000000 fffff880`09545843 fffffa80`1402f840 : 0x20
  249.  
  250.  
  251. STACK_COMMAND: kb
  252.  
  253. FOLLOWUP_IP:
  254. driver+1698
  255. fffff880`09545698 ?? ???
  256.  
  257. SYMBOL_STACK_INDEX: 5
  258.  
  259. SYMBOL_NAME: driver+1698
  260.  
  261. FOLLOWUP_NAME: MachineOwner
  262.  
  263. MODULE_NAME: driver
  264.  
  265. IMAGE_NAME: driver.sys
  266.  
  267. DEBUG_FLR_IMAGE_TIMESTAMP: 55d64ba9
  268.  
  269. FAILURE_BUCKET_ID: X64_0x50_driver+1698
  270.  
  271. BUCKET_ID: X64_0x50_driver+1698
  272.  
  273. ANALYSIS_SOURCE: KM
  274.  
  275. FAILURE_ID_HASH_STRING: km:x64_0x50_driver+1698
  276.  
  277. FAILURE_ID_HASH: {bc04ac80-71e5-deb2-6e62-72e0d3ab0584}
  278.  
  279. Followup: MachineOwner
  280. ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement