Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 10.0.14321.1024 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- ========================================================================
- =================== Dump File: 071517-9484-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 14393 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 14393.1480.amd64fre.rs1_release.170706-2004
- Kernel base = 0xfffff803`6d618000 PsLoadedModuleList = 0xfffff803`6d917040
- Debug session time: Sat Jul 15 17:56:08.470 2017 (UTC - 4:00)
- System Uptime: 0 days 21:58:46.230
- BugCheck A, {28, 2, 0, fffff8036d7874dd}
- Probably caused by : memory_corruption
- Followup: memory_corruption
- IRQL_NOT_LESS_OR_EQUAL (a)
- An attempt was made to access a pageable (or completely invalid) address at an
- interrupt request level (IRQL) that is too high. This is usually
- caused by drivers using improper addresses.
- If a kernel debugger is available get the stack backtrace.
- Arguments:
- Arg1: 0000000000000028, memory referenced
- Arg2: 0000000000000002, IRQL
- Arg3: 0000000000000000, bitfield :
- bit 0 : value 0 = read operation, 1 = write operation
- bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
- Arg4: fffff8036d7874dd, address which referenced memory
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
- SYSTEM_MANUFACTURER: CYBERPOWER Corporation
- SYSTEM_PRODUCT_NAME: FANG
- SYSTEM_SKU: Default string
- SYSTEM_VERSION: REV:1.0
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: E16J5ICP.106
- BIOS_DATE: 09/04/2015
- BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd.
- BASEBOARD_PRODUCT: MS-16J5
- BASEBOARD_VERSION: REV:0.A
- DUMP_TYPE: 2
- DUMP_FILE_ATTRIBUTES: 0x8
- Kernel Generated Triage Dump
- READ_ADDRESS: 0000000000000028
- CURRENT_IRQL: 2
- FAULTING_IP:
- nt!MiProbeLeafFrame+1326ad
- fffff803`6d7874dd 488b4628 mov rax,qword ptr [rsi+28h]
- CPU_COUNT: 8
- CPU_MHZ: a20
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 5e
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: 3A'00000000 (cache) 3A'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- BUGCHECK_STR: AV
- PROCESS_NAME: Battle.net.exe
- ANALYSIS_SESSION_HOST: USERNAME-PC
- ANALYSIS_SESSION_TIME: 07-16-2017 21:44:39.0486
- ANALYSIS_VERSION: 10.0.14321.1024 amd64fre
- TRAP_FRAME: ffffbf8058666100 -- (.trap 0xffffbf8058666100)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=ffffa58000000028 rbx=0000000000000000 rcx=0000000000000000
- rdx=ffffa58000000028 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff8036d7874dd rsp=ffffbf8058666290 rbp=0000000000000000
- r8=ffff9300b4a850a0 r9=0000000000000001 r10=0000000fffffffff
- r11=ffffa58000000000 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei ng nz na po nc
- nt!MiProbeLeafFrame+0x1326ad:
- fffff803`6d7874dd 488b4628 mov rax,qword ptr [rsi+28h] ds:00000000`00000028=????????????????
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff8036d772b29 to fffff8036d767960
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff8036d7875b7 - nt!MiProbeLeafFrame+132787
- [ fa:a5 ]
- fffff8036d7875cb - nt!MiProbeLeafFrame+13279b (+0x14)
- [ fa:a5 ]
- fffff8036d7876a4 - nt!MiProbeLeafFrame+132874 (+0xd9)
- [ fa:a5 ]
- fffff8036d7876ae - nt!MiProbeLeafFrame+13287e (+0x0a)
- [ fa:a5 ]
- fffff8036d787b63-fffff8036d787b65 3 bytes - nt!MiProtectPool+131333 (+0x4b5)
- [ 40 fb f6:80 7d fb ]
- fffff8036d787bc1 - nt!MiProtectPool+131391 (+0x5e)
- [ fa:a5 ]
- fffff8036d787c67-fffff8036d787c68 2 bytes - nt!MiProtectPool+131437 (+0xa6)
- [ 80 f6:00 fb ]
- fffff8036d787cb5 - nt!MiProtectPool+131485 (+0x4e)
- [ fa:a5 ]
- fffff8036d787d69-fffff8036d787d6a 2 bytes - nt!MiProtectPool+131539 (+0xb4)
- [ 80 f6:00 fb ]
- fffff8036d787db7-fffff8036d787db8 2 bytes - nt!MiProtectPool+131587 (+0x4e)
- [ 80 f6:00 fb ]
- fffff8036d787e26-fffff8036d787e27 2 bytes - nt!MiProtectPool+1315f6 (+0x6f)
- [ 80 f6:00 fb ]
- fffff8036d787e88 - nt!MiProtectPool+131658 (+0x62)
- [ fa:a5 ]
- fffff8036d787fbb-fffff8036d787fbc 2 bytes - nt!MiProtectPool+13178b (+0x133)
- [ 80 f6:00 fb ]
- 20 errors : !nt (fffff8036d7875b7-fffff8036d787fbc)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-07-15T21:56:08.000Z
- OSBUILD: 14393
- OSSERVICEPACK: 1480
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
- BUILDDATESTAMP_STR: 170706-2004
- BUILDLAB_STR: rs1_release
- BUILDOSVER_STR: 10.0.14393.1480
- ANALYSIS_SESSION_ELAPSED_TIME: 17bf
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement