Advertisement
Guest User

Untitled

a guest
Jul 16th, 2017
151
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.42 KB | None | 0 0
  1. Microsoft (R) Windows Debugger Version 10.0.14321.1024 AMD64
  2. Copyright (c) Microsoft Corporation. All rights reserved.
  3.  
  4. ========================================================================
  5. =================== Dump File: 071517-9484-01.dmp ====================
  6. ========================================================================
  7. Mini Kernel Dump File: Only registers and stack trace are available
  8. Windows 10 Kernel Version 14393 MP (8 procs) Free x64
  9. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  10. Built by: 14393.1480.amd64fre.rs1_release.170706-2004
  11. Kernel base = 0xfffff803`6d618000 PsLoadedModuleList = 0xfffff803`6d917040
  12. Debug session time: Sat Jul 15 17:56:08.470 2017 (UTC - 4:00)
  13. System Uptime: 0 days 21:58:46.230
  14.  
  15. BugCheck A, {28, 2, 0, fffff8036d7874dd}
  16. Probably caused by : memory_corruption
  17. Followup: memory_corruption
  18.  
  19. IRQL_NOT_LESS_OR_EQUAL (a)
  20. An attempt was made to access a pageable (or completely invalid) address at an
  21. interrupt request level (IRQL) that is too high. This is usually
  22. caused by drivers using improper addresses.
  23. If a kernel debugger is available get the stack backtrace.
  24.  
  25. Arguments:
  26. Arg1: 0000000000000028, memory referenced
  27. Arg2: 0000000000000002, IRQL
  28. Arg3: 0000000000000000, bitfield :
  29. bit 0 : value 0 = read operation, 1 = write operation
  30. bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
  31. Arg4: fffff8036d7874dd, address which referenced memory
  32.  
  33. Debugging Details:
  34. DUMP_CLASS: 1
  35. DUMP_QUALIFIER: 400
  36. BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
  37. SYSTEM_MANUFACTURER: CYBERPOWER Corporation
  38. SYSTEM_PRODUCT_NAME: FANG
  39. SYSTEM_SKU: Default string
  40. SYSTEM_VERSION: REV:1.0
  41. BIOS_VENDOR: American Megatrends Inc.
  42. BIOS_VERSION: E16J5ICP.106
  43. BIOS_DATE: 09/04/2015
  44. BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd.
  45. BASEBOARD_PRODUCT: MS-16J5
  46. BASEBOARD_VERSION: REV:0.A
  47. DUMP_TYPE: 2
  48. DUMP_FILE_ATTRIBUTES: 0x8
  49. Kernel Generated Triage Dump
  50. READ_ADDRESS: 0000000000000028
  51. CURRENT_IRQL: 2
  52. FAULTING_IP:
  53. nt!MiProbeLeafFrame+1326ad
  54. fffff803`6d7874dd 488b4628 mov rax,qword ptr [rsi+28h]
  55. CPU_COUNT: 8
  56. CPU_MHZ: a20
  57. CPU_VENDOR: GenuineIntel
  58. CPU_FAMILY: 6
  59. CPU_MODEL: 5e
  60. CPU_STEPPING: 3
  61. CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: 3A'00000000 (cache) 3A'00000000 (init)
  62. CUSTOMER_CRASH_COUNT: 1
  63. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  64. BUGCHECK_STR: AV
  65.  
  66. PROCESS_NAME: Battle.net.exe
  67.  
  68. ANALYSIS_SESSION_HOST: USERNAME-PC
  69. ANALYSIS_SESSION_TIME: 07-16-2017 21:44:39.0486
  70. ANALYSIS_VERSION: 10.0.14321.1024 amd64fre
  71. TRAP_FRAME: ffffbf8058666100 -- (.trap 0xffffbf8058666100)
  72. NOTE: The trap frame does not contain all registers.
  73. Some register values may be zeroed or incorrect.
  74. rax=ffffa58000000028 rbx=0000000000000000 rcx=0000000000000000
  75. rdx=ffffa58000000028 rsi=0000000000000000 rdi=0000000000000000
  76. rip=fffff8036d7874dd rsp=ffffbf8058666290 rbp=0000000000000000
  77. r8=ffff9300b4a850a0 r9=0000000000000001 r10=0000000fffffffff
  78. r11=ffffa58000000000 r12=0000000000000000 r13=0000000000000000
  79. r14=0000000000000000 r15=0000000000000000
  80. iopl=0 nv up ei ng nz na po nc
  81. nt!MiProbeLeafFrame+0x1326ad:
  82. fffff803`6d7874dd 488b4628 mov rax,qword ptr [rsi+28h] ds:00000000`00000028=????????????????
  83. Resetting default scope
  84. LAST_CONTROL_TRANSFER: from fffff8036d772b29 to fffff8036d767960
  85. STACK_COMMAND: kb
  86. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  87. fffff8036d7875b7 - nt!MiProbeLeafFrame+132787
  88. [ fa:a5 ]
  89. fffff8036d7875cb - nt!MiProbeLeafFrame+13279b (+0x14)
  90. [ fa:a5 ]
  91. fffff8036d7876a4 - nt!MiProbeLeafFrame+132874 (+0xd9)
  92. [ fa:a5 ]
  93. fffff8036d7876ae - nt!MiProbeLeafFrame+13287e (+0x0a)
  94. [ fa:a5 ]
  95. fffff8036d787b63-fffff8036d787b65 3 bytes - nt!MiProtectPool+131333 (+0x4b5)
  96. [ 40 fb f6:80 7d fb ]
  97. fffff8036d787bc1 - nt!MiProtectPool+131391 (+0x5e)
  98. [ fa:a5 ]
  99. fffff8036d787c67-fffff8036d787c68 2 bytes - nt!MiProtectPool+131437 (+0xa6)
  100. [ 80 f6:00 fb ]
  101. fffff8036d787cb5 - nt!MiProtectPool+131485 (+0x4e)
  102. [ fa:a5 ]
  103. fffff8036d787d69-fffff8036d787d6a 2 bytes - nt!MiProtectPool+131539 (+0xb4)
  104. [ 80 f6:00 fb ]
  105. fffff8036d787db7-fffff8036d787db8 2 bytes - nt!MiProtectPool+131587 (+0x4e)
  106. [ 80 f6:00 fb ]
  107. fffff8036d787e26-fffff8036d787e27 2 bytes - nt!MiProtectPool+1315f6 (+0x6f)
  108. [ 80 f6:00 fb ]
  109. fffff8036d787e88 - nt!MiProtectPool+131658 (+0x62)
  110. [ fa:a5 ]
  111. fffff8036d787fbb-fffff8036d787fbc 2 bytes - nt!MiProtectPool+13178b (+0x133)
  112. [ 80 f6:00 fb ]
  113. 20 errors : !nt (fffff8036d7875b7-fffff8036d787fbc)
  114. MODULE_NAME: memory_corruption
  115.  
  116. IMAGE_NAME: memory_corruption
  117.  
  118. FOLLOWUP_NAME: memory_corruption
  119. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  120. MEMORY_CORRUPTOR: LARGE
  121. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  122. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  123. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  124. TARGET_TIME: 2017-07-15T21:56:08.000Z
  125. OSBUILD: 14393
  126. OSSERVICEPACK: 1480
  127. SERVICEPACK_NUMBER: 0
  128. OS_REVISION: 0
  129. SUITE_MASK: 784
  130. PRODUCT_TYPE: 1
  131. OSPLATFORM_TYPE: x64
  132. OSNAME: Windows 10
  133. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  134. USER_LCID: 0
  135. OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
  136. BUILDDATESTAMP_STR: 170706-2004
  137. BUILDLAB_STR: rs1_release
  138. BUILDOSVER_STR: 10.0.14393.1480
  139. ANALYSIS_SESSION_ELAPSED_TIME: 17bf
  140. ANALYSIS_SOURCE: KM
  141. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  142. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  143. Followup: memory_corruption
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement