Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 6.3.9600.17237 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Windows\Minidump\082015-15802-01.dmp]
- Mini Kernel Dump File: Only registers and stack trace are available
- ************* Symbol Path validation summary **************
- Response Time (ms) Location
- Deferred SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
- Symbol search path is: SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
- Executable search path is:
- Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 7601.18869.amd64fre.win7sp1_gdr.150525-0603
- Machine Name:
- Kernel base = 0xfffff800`03059000 PsLoadedModuleList = 0xfffff800`032a0730
- Debug session time: Thu Aug 20 17:33:22.345 2015 (UTC - 5:00)
- System Uptime: 1 days 22:12:11.173
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- ..............................................................
- Loading User Symbols
- Loading unloaded module list
- ..................................................
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- Use !analyze -v to get detailed debugging information.
- BugCheck 50, {ffffffff8298e1d0, 0, fffff800030c4360, 5}
- *** WARNING: Unable to verify timestamp for driver.sys
- *** ERROR: Module load completed but symbols could not be loaded for driver.sys
- Could not read faulting driver name
- Probably caused by : driver.sys ( driver+1698 )
- Followup: MachineOwner
- ---------
- 7: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- PAGE_FAULT_IN_NONPAGED_AREA (50)
- Invalid system memory was referenced. This cannot be protected by try-except,
- it must be protected by a Probe. Typically the address is just plain bad or it
- is pointing at freed memory.
- Arguments:
- Arg1: ffffffff8298e1d0, memory referenced.
- Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
- Arg3: fffff800030c4360, If non-zero, the instruction address which referenced the bad memory
- address.
- Arg4: 0000000000000005, (reserved)
- Debugging Details:
- ------------------
- Could not read faulting driver name
- READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8000330a100
- GetUlongFromAddress: unable to read from fffff8000330a1c0
- ffffffff8298e1d0
- FAULTING_IP:
- nt!memcpy+80
- fffff800`030c4360 8a040a mov al,byte ptr [rdx+rcx]
- MM_INTERNAL_CODE: 5
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
- BUGCHECK_STR: 0x50
- PROCESS_NAME: DayZ.exe
- CURRENT_IRQL: 0
- ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) amd64fre
- TRAP_FRAME: fffff88013010020 -- (.trap 0xfffff88013010020)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=fffffa801659eb50 rbx=0000000000000000 rcx=fffff88013010330
- rdx=0000077f6f97dea0 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff800030c4360 rsp=fffff880130101b8 rbp=fffff880130106b0
- r8=0000000000000004 r9=ffffffff8298e1d0 r10=0000000000000000
- r11=fffff88013010330 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl nz na pe nc
- nt!memcpy+0x80:
- fffff800`030c4360 8a040a mov al,byte ptr [rdx+rcx] ds:ffffffff`8298e1d0=??
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff800031477aa to fffff800030cd8c0
- STACK_TEXT:
- fffff880`1300feb8 fffff800`031477aa : 00000000`00000050 ffffffff`8298e1d0 00000000`00000000 fffff880`13010020 : nt!KeBugCheckEx
- fffff880`1300fec0 fffff800`030cb9ee : 00000000`00000000 ffffffff`8298e1d0 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x3fda1
- fffff880`13010020 fffff800`030c4360 : fffff800`03371bc7 fffff880`130106b0 00000000`0000004d 00000000`00000000 : nt!KiPageFault+0x16e
- fffff880`130101b8 fffff800`03371bc7 : fffff880`130106b0 00000000`0000004d 00000000`00000000 00000000`00000000 : nt!memcpy+0x80
- fffff880`130101c0 fffff880`09545698 : fffffa80`183c1280 ffffffff`8298e1d0 fffffa80`16651150 00000000`02b1fe48 : nt!MmCopyVirtualMemory+0x17b
- fffff880`13010570 fffffa80`183c1280 : ffffffff`8298e1d0 fffffa80`16651150 00000000`02b1fe48 00000000`00000004 : driver+0x1698
- fffff880`13010578 ffffffff`8298e1d0 : fffffa80`16651150 00000000`02b1fe48 00000000`00000004 0000057f`eaebb300 : 0xfffffa80`183c1280
- fffff880`13010580 fffffa80`16651150 : 00000000`02b1fe48 00000000`00000004 0000057f`eaebb300 fffff880`130105f0 : 0xffffffff`8298e1d0
- fffff880`13010588 00000000`02b1fe48 : 00000000`00000004 0000057f`eaebb300 fffff880`130105f0 0000057f`ea2e5438 : 0xfffffa80`16651150
- fffff880`13010590 00000000`00000004 : 0000057f`eaebb300 fffff880`130105f0 0000057f`ea2e5438 fffffa80`00000000 : 0x2b1fe48
- fffff880`13010598 0000057f`eaebb300 : fffff880`130105f0 0000057f`ea2e5438 fffffa80`00000000 fffffa80`183c1280 : 0x4
- fffff880`130105a0 fffff880`130105f0 : 0000057f`ea2e5438 fffffa80`00000000 fffffa80`183c1280 fffffa80`183c1280 : 0x0000057f`eaebb300
- fffff880`130105a8 0000057f`ea2e5438 : fffffa80`00000000 fffffa80`183c1280 fffffa80`183c1280 fffffa80`0d2cfae0 : 0xfffff880`130105f0
- fffff880`130105b0 fffffa80`00000000 : fffffa80`183c1280 fffffa80`183c1280 fffffa80`0d2cfae0 ffffffff`8298e1d0 : 0x0000057f`ea2e5438
- fffff880`130105b8 fffffa80`183c1280 : fffffa80`183c1280 fffffa80`0d2cfae0 ffffffff`8298e1d0 00000000`02b1fe48 : 0xfffffa80`00000000
- fffff880`130105c0 fffffa80`183c1280 : fffffa80`0d2cfae0 ffffffff`8298e1d0 00000000`02b1fe48 fffffa80`16651150 : 0xfffffa80`183c1280
- fffff880`130105c8 fffffa80`0d2cfae0 : ffffffff`8298e1d0 00000000`02b1fe48 fffffa80`16651150 00000000`00000020 : 0xfffffa80`183c1280
- fffff880`130105d0 ffffffff`8298e1d0 : 00000000`02b1fe48 fffffa80`16651150 00000000`00000020 00000000`00000000 : 0xfffffa80`0d2cfae0
- fffff880`130105d8 00000000`02b1fe48 : fffffa80`16651150 00000000`00000020 00000000`00000000 00000000`00000001 : 0xffffffff`8298e1d0
- fffff880`130105e0 fffffa80`16651150 : 00000000`00000020 00000000`00000000 00000000`00000001 00000000`00000000 : 0x2b1fe48
- fffff880`130105e8 00000000`00000020 : 00000000`00000000 00000000`00000001 00000000`00000000 fffff880`09545843 : 0xfffffa80`16651150
- fffff880`130105f0 00000000`00000000 : 00000000`00000001 00000000`00000000 fffff880`09545843 fffffa80`1402f840 : 0x20
- STACK_COMMAND: kb
- FOLLOWUP_IP:
- driver+1698
- fffff880`09545698 ?? ???
- SYMBOL_STACK_INDEX: 5
- SYMBOL_NAME: driver+1698
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: driver
- IMAGE_NAME: driver.sys
- DEBUG_FLR_IMAGE_TIMESTAMP: 55d64ba9
- FAILURE_BUCKET_ID: X64_0x50_driver+1698
- BUCKET_ID: X64_0x50_driver+1698
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:x64_0x50_driver+1698
- FAILURE_ID_HASH: {bc04ac80-71e5-deb2-6e62-72e0d3ab0584}
- Followup: MachineOwner
- ---------
- 7: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- PAGE_FAULT_IN_NONPAGED_AREA (50)
- Invalid system memory was referenced. This cannot be protected by try-except,
- it must be protected by a Probe. Typically the address is just plain bad or it
- is pointing at freed memory.
- Arguments:
- Arg1: ffffffff8298e1d0, memory referenced.
- Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
- Arg3: fffff800030c4360, If non-zero, the instruction address which referenced the bad memory
- address.
- Arg4: 0000000000000005, (reserved)
- Debugging Details:
- ------------------
- Could not read faulting driver name
- READ_ADDRESS: ffffffff8298e1d0
- FAULTING_IP:
- nt!memcpy+80
- fffff800`030c4360 8a040a mov al,byte ptr [rdx+rcx]
- MM_INTERNAL_CODE: 5
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
- BUGCHECK_STR: 0x50
- PROCESS_NAME: DayZ.exe
- CURRENT_IRQL: 0
- ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) amd64fre
- TRAP_FRAME: fffff88013010020 -- (.trap 0xfffff88013010020)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=fffffa801659eb50 rbx=0000000000000000 rcx=fffff88013010330
- rdx=0000077f6f97dea0 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff800030c4360 rsp=fffff880130101b8 rbp=fffff880130106b0
- r8=0000000000000004 r9=ffffffff8298e1d0 r10=0000000000000000
- r11=fffff88013010330 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl nz na pe nc
- nt!memcpy+0x80:
- fffff800`030c4360 8a040a mov al,byte ptr [rdx+rcx] ds:ffffffff`8298e1d0=??
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff800031477aa to fffff800030cd8c0
- STACK_TEXT:
- fffff880`1300feb8 fffff800`031477aa : 00000000`00000050 ffffffff`8298e1d0 00000000`00000000 fffff880`13010020 : nt!KeBugCheckEx
- fffff880`1300fec0 fffff800`030cb9ee : 00000000`00000000 ffffffff`8298e1d0 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x3fda1
- fffff880`13010020 fffff800`030c4360 : fffff800`03371bc7 fffff880`130106b0 00000000`0000004d 00000000`00000000 : nt!KiPageFault+0x16e
- fffff880`130101b8 fffff800`03371bc7 : fffff880`130106b0 00000000`0000004d 00000000`00000000 00000000`00000000 : nt!memcpy+0x80
- fffff880`130101c0 fffff880`09545698 : fffffa80`183c1280 ffffffff`8298e1d0 fffffa80`16651150 00000000`02b1fe48 : nt!MmCopyVirtualMemory+0x17b
- fffff880`13010570 fffffa80`183c1280 : ffffffff`8298e1d0 fffffa80`16651150 00000000`02b1fe48 00000000`00000004 : driver+0x1698
- fffff880`13010578 ffffffff`8298e1d0 : fffffa80`16651150 00000000`02b1fe48 00000000`00000004 0000057f`eaebb300 : 0xfffffa80`183c1280
- fffff880`13010580 fffffa80`16651150 : 00000000`02b1fe48 00000000`00000004 0000057f`eaebb300 fffff880`130105f0 : 0xffffffff`8298e1d0
- fffff880`13010588 00000000`02b1fe48 : 00000000`00000004 0000057f`eaebb300 fffff880`130105f0 0000057f`ea2e5438 : 0xfffffa80`16651150
- fffff880`13010590 00000000`00000004 : 0000057f`eaebb300 fffff880`130105f0 0000057f`ea2e5438 fffffa80`00000000 : 0x2b1fe48
- fffff880`13010598 0000057f`eaebb300 : fffff880`130105f0 0000057f`ea2e5438 fffffa80`00000000 fffffa80`183c1280 : 0x4
- fffff880`130105a0 fffff880`130105f0 : 0000057f`ea2e5438 fffffa80`00000000 fffffa80`183c1280 fffffa80`183c1280 : 0x0000057f`eaebb300
- fffff880`130105a8 0000057f`ea2e5438 : fffffa80`00000000 fffffa80`183c1280 fffffa80`183c1280 fffffa80`0d2cfae0 : 0xfffff880`130105f0
- fffff880`130105b0 fffffa80`00000000 : fffffa80`183c1280 fffffa80`183c1280 fffffa80`0d2cfae0 ffffffff`8298e1d0 : 0x0000057f`ea2e5438
- fffff880`130105b8 fffffa80`183c1280 : fffffa80`183c1280 fffffa80`0d2cfae0 ffffffff`8298e1d0 00000000`02b1fe48 : 0xfffffa80`00000000
- fffff880`130105c0 fffffa80`183c1280 : fffffa80`0d2cfae0 ffffffff`8298e1d0 00000000`02b1fe48 fffffa80`16651150 : 0xfffffa80`183c1280
- fffff880`130105c8 fffffa80`0d2cfae0 : ffffffff`8298e1d0 00000000`02b1fe48 fffffa80`16651150 00000000`00000020 : 0xfffffa80`183c1280
- fffff880`130105d0 ffffffff`8298e1d0 : 00000000`02b1fe48 fffffa80`16651150 00000000`00000020 00000000`00000000 : 0xfffffa80`0d2cfae0
- fffff880`130105d8 00000000`02b1fe48 : fffffa80`16651150 00000000`00000020 00000000`00000000 00000000`00000001 : 0xffffffff`8298e1d0
- fffff880`130105e0 fffffa80`16651150 : 00000000`00000020 00000000`00000000 00000000`00000001 00000000`00000000 : 0x2b1fe48
- fffff880`130105e8 00000000`00000020 : 00000000`00000000 00000000`00000001 00000000`00000000 fffff880`09545843 : 0xfffffa80`16651150
- fffff880`130105f0 00000000`00000000 : 00000000`00000001 00000000`00000000 fffff880`09545843 fffffa80`1402f840 : 0x20
- STACK_COMMAND: kb
- FOLLOWUP_IP:
- driver+1698
- fffff880`09545698 ?? ???
- SYMBOL_STACK_INDEX: 5
- SYMBOL_NAME: driver+1698
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: driver
- IMAGE_NAME: driver.sys
- DEBUG_FLR_IMAGE_TIMESTAMP: 55d64ba9
- FAILURE_BUCKET_ID: X64_0x50_driver+1698
- BUCKET_ID: X64_0x50_driver+1698
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:x64_0x50_driver+1698
- FAILURE_ID_HASH: {bc04ac80-71e5-deb2-6e62-72e0d3ab0584}
- Followup: MachineOwner
- ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement