Advertisement
Guest User

Untitled

a guest
Feb 8th, 2019
148
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.09 KB | None | 0 0
  1. *******************************************************************************
  2. * *
  3. * Bugcheck Analysis *
  4. * *
  5. *******************************************************************************
  6.  
  7. PAGE_FAULT_IN_NONPAGED_AREA (50)
  8. Invalid system memory was referenced. This cannot be protected by try-except,
  9. it must be protected by a Probe. Typically the address is just plain bad or it
  10. is pointing at freed memory.
  11. Arguments:
  12. Arg1: ffffbc0efffff928, memory referenced.
  13. Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
  14. Arg3: fffff80380134f7b, If non-zero, the instruction address which referenced the bad memory
  15. address.
  16. Arg4: 000000000000000c, (reserved)
  17.  
  18. Debugging Details:
  19. ------------------
  20.  
  21.  
  22. Could not read faulting driver name
  23. TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
  24.  
  25. READ_ADDRESS: unable to get nt!MmSpecialPoolStart
  26. unable to get nt!MmSpecialPoolEnd
  27. unable to get nt!MmPagedPoolEnd
  28. unable to get nt!MmNonPagedPoolStart
  29. unable to get nt!MmSizeOfNonPagedPoolInBytes
  30. ffffbc0efffff928
  31.  
  32. FAULTING_IP:
  33. nt!ObReferenceObjectSafeWithTag+b
  34. fffff803`80134f7b 488b01 mov rax,qword ptr [rcx]
  35.  
  36. MM_INTERNAL_CODE: c
  37.  
  38. CUSTOMER_CRASH_COUNT: 1
  39.  
  40. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  41.  
  42. BUGCHECK_STR: AV
  43.  
  44. PROCESS_NAME: Steam.exe
  45.  
  46. CURRENT_IRQL: 0
  47.  
  48. BAD_PAGES_DETECTED: d13b
  49.  
  50. TRAP_FRAME: ffffa7075b555a80 -- (.trap 0xffffa7075b555a80)
  51. NOTE: The trap frame does not contain all registers.
  52. Some register values may be zeroed or incorrect.
  53. rax=ffffbc0f33334080 rbx=0000000000000000 rcx=ffffbc0efffff928
  54. rdx=000000006e457350 rsi=0000000000000000 rdi=0000000000000000
  55. rip=fffff80380134f7b rsp=ffffa7075b555c10 rbp=ffffa7075b556b80
  56. r8=ffffa7075b555c48 r9=0000000000000000 r10=7ffffffffffffffc
  57. r11=ffffbc0f39ebadc0 r12=0000000000000000 r13=0000000000000000
  58. r14=0000000000000000 r15=0000000000000000
  59. iopl=0 nv up ei ng nz na po cy
  60. nt!ObReferenceObjectSafeWithTag+0xb:
  61. fffff803`80134f7b 488b01 mov rax,qword ptr [rcx] ds:ffffbc0e`fffff928=????????????????
  62. Resetting default scope
  63.  
  64. LAST_CONTROL_TRANSFER: from fffff80380102659 to fffff8038024a0a0
  65.  
  66. STACK_TEXT:
  67. ffffa707`5b5557c8 fffff803`80102659 : 00000000`00000050 ffffbc0e`fffff928 00000000`00000000 ffffa707`5b555a80 : nt!KeBugCheckEx
  68. ffffa707`5b5557d0 fffff803`800fa228 : 00000000`0000000f 00000000`00000000 ffff8000`00000000 fffff178`bc5e2f10 : nt!MiSystemFault+0xcf9
  69. ffffa707`5b555910 fffff803`802577da : ffffbc0f`3af86728 ffffbc0f`35baba08 ffffbc0f`35bab580 00000000`00000000 : nt!MmAccessFault+0x1f8
  70. ffffa707`5b555a80 fffff803`80134f7b : ffffbc0f`32655700 00000000`00000001 00000000`00000000 ffffa707`5b556b80 : nt!KiPageFault+0x31a
  71. ffffa707`5b555c10 fffff803`80599f85 : 00000000`0002cf88 ffffbc0f`00000000 ffffbc0f`00000000 00000000`00000000 : nt!ObReferenceObjectSafeWithTag+0xb
  72. ffffa707`5b555c40 fffff803`8056137f : fffff178`00000001 fffff803`00010400 ffff9661`00000000 00000000`00000000 : nt!ExpGetProcessInformation+0x6e5
  73. ffffa707`5b556260 fffff803`80560aab : 00000000`0ad82498 00000000`011a0000 00000000`00000000 00000000`007ab000 : nt!ExpQuerySystemInformation+0x7bf
  74. ffffa707`5b556ac0 fffff803`8025a743 : ffffbc0f`32655700 00000000`00000000 ffffa707`5b556ad8 ffffbc0f`36883520 : nt!NtQuerySystemInformation+0x2b
  75. ffffa707`5b556b00 00007ffc`ecd9b064 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
  76. 00000000`0982e0c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7ffc`ecd9b064
  77.  
  78.  
  79. STACK_COMMAND: kb
  80.  
  81. SYMBOL_NAME: PAGE_NOT_ZERO
  82.  
  83. FOLLOWUP_NAME: MachineOwner
  84.  
  85. MODULE_NAME: Unknown_Module
  86.  
  87. IMAGE_NAME: Unknown_Image
  88.  
  89. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  90.  
  91. BUCKET_ID: PAGE_NOT_ZERO
  92.  
  93. Followup: MachineOwner
  94. ---------
  95.  
  96. *** Memory manager detected 53563 instance(s) of page corruption, target is likely to have memory corruption.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement