Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- PAGE_FAULT_IN_NONPAGED_AREA (50)
- Invalid system memory was referenced. This cannot be protected by try-except,
- it must be protected by a Probe. Typically the address is just plain bad or it
- is pointing at freed memory.
- Arguments:
- Arg1: ffffbc0efffff928, memory referenced.
- Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
- Arg3: fffff80380134f7b, If non-zero, the instruction address which referenced the bad memory
- address.
- Arg4: 000000000000000c, (reserved)
- Debugging Details:
- ------------------
- Could not read faulting driver name
- TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
- READ_ADDRESS: unable to get nt!MmSpecialPoolStart
- unable to get nt!MmSpecialPoolEnd
- unable to get nt!MmPagedPoolEnd
- unable to get nt!MmNonPagedPoolStart
- unable to get nt!MmSizeOfNonPagedPoolInBytes
- ffffbc0efffff928
- FAULTING_IP:
- nt!ObReferenceObjectSafeWithTag+b
- fffff803`80134f7b 488b01 mov rax,qword ptr [rcx]
- MM_INTERNAL_CODE: c
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- BUGCHECK_STR: AV
- PROCESS_NAME: Steam.exe
- CURRENT_IRQL: 0
- BAD_PAGES_DETECTED: d13b
- TRAP_FRAME: ffffa7075b555a80 -- (.trap 0xffffa7075b555a80)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=ffffbc0f33334080 rbx=0000000000000000 rcx=ffffbc0efffff928
- rdx=000000006e457350 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff80380134f7b rsp=ffffa7075b555c10 rbp=ffffa7075b556b80
- r8=ffffa7075b555c48 r9=0000000000000000 r10=7ffffffffffffffc
- r11=ffffbc0f39ebadc0 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei ng nz na po cy
- nt!ObReferenceObjectSafeWithTag+0xb:
- fffff803`80134f7b 488b01 mov rax,qword ptr [rcx] ds:ffffbc0e`fffff928=????????????????
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff80380102659 to fffff8038024a0a0
- STACK_TEXT:
- ffffa707`5b5557c8 fffff803`80102659 : 00000000`00000050 ffffbc0e`fffff928 00000000`00000000 ffffa707`5b555a80 : nt!KeBugCheckEx
- ffffa707`5b5557d0 fffff803`800fa228 : 00000000`0000000f 00000000`00000000 ffff8000`00000000 fffff178`bc5e2f10 : nt!MiSystemFault+0xcf9
- ffffa707`5b555910 fffff803`802577da : ffffbc0f`3af86728 ffffbc0f`35baba08 ffffbc0f`35bab580 00000000`00000000 : nt!MmAccessFault+0x1f8
- ffffa707`5b555a80 fffff803`80134f7b : ffffbc0f`32655700 00000000`00000001 00000000`00000000 ffffa707`5b556b80 : nt!KiPageFault+0x31a
- ffffa707`5b555c10 fffff803`80599f85 : 00000000`0002cf88 ffffbc0f`00000000 ffffbc0f`00000000 00000000`00000000 : nt!ObReferenceObjectSafeWithTag+0xb
- ffffa707`5b555c40 fffff803`8056137f : fffff178`00000001 fffff803`00010400 ffff9661`00000000 00000000`00000000 : nt!ExpGetProcessInformation+0x6e5
- ffffa707`5b556260 fffff803`80560aab : 00000000`0ad82498 00000000`011a0000 00000000`00000000 00000000`007ab000 : nt!ExpQuerySystemInformation+0x7bf
- ffffa707`5b556ac0 fffff803`8025a743 : ffffbc0f`32655700 00000000`00000000 ffffa707`5b556ad8 ffffbc0f`36883520 : nt!NtQuerySystemInformation+0x2b
- ffffa707`5b556b00 00007ffc`ecd9b064 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
- 00000000`0982e0c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7ffc`ecd9b064
- STACK_COMMAND: kb
- SYMBOL_NAME: PAGE_NOT_ZERO
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: Unknown_Module
- IMAGE_NAME: Unknown_Image
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- BUCKET_ID: PAGE_NOT_ZERO
- Followup: MachineOwner
- ---------
- *** Memory manager detected 53563 instance(s) of page corruption, target is likely to have memory corruption.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement