Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 10.0.17763.1 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Users\rezhy\Desktop\110918-8968-01.dmp]
- Mini Kernel Dump File: Only registers and stack trace are available
- Symbol search path is: srv*
- Executable search path is:
- Windows 10 Kernel Version 17134 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Machine Name:
- Kernel base = 0xfffff801`b5aa9000 PsLoadedModuleList = 0xfffff801`b5e57150
- Debug session time: Fri Nov 9 18:21:51.159 2018 (UTC - 5:00)
- System Uptime: 1 days 16:16:21.824
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- ......................................................
- Loading User Symbols
- Loading unloaded module list
- ..................................
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- Use !analyze -v to get detailed debugging information.
- BugCheck A, {20, 2, 1, fffff801b5b86307}
- Probably caused by : ntkrnlmp.exe ( nt!KiExecuteAllDpcs+2c7 )
- Followup: MachineOwner
- ---------
- 0: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- IRQL_NOT_LESS_OR_EQUAL (a)
- An attempt was made to access a pageable (or completely invalid) address at an
- interrupt request level (IRQL) that is too high. This is usually
- caused by drivers using improper addresses.
- If a kernel debugger is available get the stack backtrace.
- Arguments:
- Arg1: 0000000000000020, memory referenced
- Arg2: 0000000000000002, IRQL
- Arg3: 0000000000000001, bitfield :
- bit 0 : value 0 = read operation, 1 = write operation
- bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
- Arg4: fffff801b5b86307, address which referenced memory
- Debugging Details:
- ------------------
- KEY_VALUES_STRING: 1
- STACKHASH_ANALYSIS: 1
- TIMELINE_ANALYSIS: 1
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.17134.376 (WinBuild.160101.0800)
- SYSTEM_MANUFACTURER: MSI
- SYSTEM_PRODUCT_NAME: MS-7850
- SYSTEM_SKU: To be filled by O.E.M.
- SYSTEM_VERSION: 1.0
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: V4.11
- BIOS_DATE: 02/16/2016
- BASEBOARD_MANUFACTURER: MSI
- BASEBOARD_PRODUCT: Z97 PC Mate(MS-7850)
- BASEBOARD_VERSION: 1.0
- DUMP_FILE_ATTRIBUTES: 0x8
- Kernel Generated Triage Dump
- DUMP_TYPE: 2
- BUGCHECK_P1: 20
- BUGCHECK_P2: 2
- BUGCHECK_P3: 1
- BUGCHECK_P4: fffff801b5b86307
- WRITE_ADDRESS: fffff801b5ef6388: Unable to get MiVisibleState
- Unable to get NonPagedPoolStart
- Unable to get NonPagedPoolEnd
- Unable to get PagedPoolStart
- Unable to get PagedPoolEnd
- 0000000000000020
- CURRENT_IRQL: 2
- FAULTING_IP:
- nt!KiExecuteAllDpcs+2c7
- fffff801`b5b86307 49894720 mov qword ptr [r15+20h],rax
- CPU_COUNT: 4
- CPU_MHZ: dac
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 3c
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 24'00000000 (cache) 24'00000000 (init)
- BLACKBOXBSD: 1 (!blackboxbsd)
- BLACKBOXPNP: 1 (!blackboxpnp)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- BUGCHECK_STR: AV
- PROCESS_NAME: csgo.exe
- ANALYSIS_SESSION_HOST: DESKTOP-F2USL4G
- ANALYSIS_SESSION_TIME: 11-09-2018 18:35:44.0352
- ANALYSIS_VERSION: 10.0.17763.1 amd64fre
- DPC_STACK_BASE: FFFFF801B81D5FB0
- TRAP_FRAME: fffff801b81d5ad0 -- (.trap 0xfffff801b81d5ad0)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=0000edcfc28b89bb rbx=0000000000000000 rcx=ffffa98338b76000
- rdx=0000edcf00000000 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff801b5b86307 rsp=fffff801b81d5c60 rbp=fffff801b81d5d60
- r8=0000000000000000 r9=0000000000000000 r10=ffffa9833d8c3898
- r11=fffff801b81d5e60 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl nz na po nc
- nt!KiExecuteAllDpcs+0x2c7:
- fffff801`b5b86307 49894720 mov qword ptr [r15+20h],rax ds:00000000`00000020=????????????????
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff801b5c63069 to fffff801b5c52490
- STACK_TEXT:
- fffff801`b81d5988 fffff801`b5c63069 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
- fffff801`b81d5990 fffff801`b5c5fce5 : ffffa983`42e3e700 00000003`00000030 00000000`00000005 ffffa983`3d762ab8 : nt!KiBugCheckDispatch+0x69
- fffff801`b81d5ad0 fffff801`b5b86307 : fffff801`b4945f80 ffffa983`3cc74cb8 fffff801`b81d5d60 ffffa983`3ca63660 : nt!KiPageFault+0x425
- fffff801`b81d5c60 fffff801`b5b8597b : fffff801`b4943180 00000000`00000000 00000000`00000002 00000000`00000004 : nt!KiExecuteAllDpcs+0x2c7
- fffff801`b81d5da0 fffff801`b5c593e5 : 00000000`00000000 fffff801`b4943180 ffffa886`c0e3cb80 ffffe501`878c0140 : nt!KiRetireDpcList+0x1db
- fffff801`b81d5fb0 fffff801`b5c591e0 : 00000000`22da0601 fffff801`b5a204e6 00000000`00000000 00000000`00761000 : nt!KxRetireDpcList+0x5
- ffffa886`c0e3cac0 fffff801`b5c58b15 : 00000000`f5ec7e70 fffff801`b5c53e11 00000000`00000079 ffffe501`878c0140 : nt!KiDispatchInterruptContinue
- ffffa886`c0e3caf0 fffff801`b5c53e11 : 00000000`00000079 ffffe501`878c0140 ffffa886`c0e3cad8 ffffa983`39739350 : nt!KiDpcInterruptBypass+0x25
- ffffa886`c0e3cb00 00000000`1e80991b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1
- 00000000`009b56e0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x1e80991b
- THREAD_SHA1_HASH_MOD_FUNC: e9ddd7334ce9ee4e578346f634110a08ba176517
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bb528691b10456fe1e60ac2853f9fb0f6c8b8e06
- THREAD_SHA1_HASH_MOD: 9f457f347057f10e1df248e166a3e95e6570ecfe
- FOLLOWUP_IP:
- nt!KiExecuteAllDpcs+2c7
- fffff801`b5b86307 49894720 mov qword ptr [r15+20h],rax
- FAULT_INSTR_CODE: 20478949
- SYMBOL_STACK_INDEX: 3
- SYMBOL_NAME: nt!KiExecuteAllDpcs+2c7
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- DEBUG_FLR_IMAGE_TIMESTAMP: 5bcc2809
- IMAGE_VERSION: 10.0.17134.376
- STACK_COMMAND: .thread ; .cxr ; kb
- BUCKET_ID_FUNC_OFFSET: 2c7
- FAILURE_BUCKET_ID: AV_nt!KiExecuteAllDpcs
- BUCKET_ID: AV_nt!KiExecuteAllDpcs
- PRIMARY_PROBLEM_CLASS: AV_nt!KiExecuteAllDpcs
- TARGET_TIME: 2018-11-09T23:21:51.000Z
- OSBUILD: 17134
- OSSERVICEPACK: 376
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- OS_LOCALE:
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2018-10-21 03:17:29
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.17134.376
- ANALYSIS_SESSION_ELAPSED_TIME: 481
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:av_nt!kiexecutealldpcs
- FAILURE_ID_HASH: {b88a28a0-fcde-99e9-6174-619833d00ab9}
- Followup: MachineOwner
- ---------
Advertisement
Add Comment
Please, Sign In to add comment