Guest User

Untitled

a guest
Sep 5th, 2017
144
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. *******************************************************************************
  2. * *
  3. * Bugcheck Analysis *
  4. * *
  5. *******************************************************************************
  6. DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
  7. An attempt was made to access a pageable (or completely invalid) address at an
  8. interrupt request level (IRQL) that is too high. This is usually
  9. caused by drivers using improper addresses.
  10. If kernel debugger is available get stack backtrace.
  11. Arguments:
  12. Arg1: 000000001bd11158, memory referenced
  13. Arg2: 000000000000000a, IRQL
  14. Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
  15. Arg4: fffff8034a47029f, address which referenced memory
  16. Debugging Details:
  17. ------------------
  18. TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
  19. READ_ADDRESS: unable to get nt!MmSpecialPoolStart
  20. unable to get nt!MmSpecialPoolEnd
  21. unable to get nt!MmPagedPoolEnd
  22. unable to get nt!MmNonPagedPoolStart
  23. unable to get nt!MmSizeOfNonPagedPoolInBytes
  24. 000000001bd11158
  25. CURRENT_IRQL: a
  26. FAULTING_IP:
  27. atikmdag+173029f
  28. fffff803`4a47029f 83780800 cmp dword ptr [rax+8],0
  29. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  30. BUGCHECK_STR: AV
  31. PROCESS_NAME: System
  32. TRAP_FRAME: fffff80343052680 -- (.trap 0xfffff80343052680)
  33. NOTE: The trap frame does not contain all registers.
  34. Some register values may be zeroed or incorrect.
  35. rax=000000001bd11150 rbx=0000000000000000 rcx=ffff87011bd11010
  36. rdx=000000001bd11150 rsi=0000000000000000 rdi=0000000000000000
  37. rip=fffff8034a47029f rsp=fffff80343052818 rbp=fffff80343052b60
  38. r8=ffff87011bd11138 r9=ffff87011bce1000 r10=0000000000000001
  39. r11=ffff87011bd11058 r12=0000000000000000 r13=0000000000000000
  40. r14=0000000000000000 r15=0000000000000000
  41. iopl=0 nv up ei pl nz ac po nc
  42. atikmdag+0x173029f:
  43. fffff803`4a47029f 83780800 cmp dword ptr [rax+8],0 ds:00000000`1bd11158=????????
  44. Resetting default scope
  45. LAST_CONTROL_TRANSFER: from fffff8034117a8a9 to fffff8034116f560
  46. STACK_TEXT:
  47. fffff803`43052538 fffff803`4117a8a9 : 00000000`0000000a 00000000`1bd11158 00000000`0000000a 00000000`00000000 : nt!KeBugCheckEx
  48. fffff803`43052540 fffff803`41178e7d : ffff8701`1bce10b4 ffff8701`1bd11010 ffff8701`1bd110e0 ffff8701`1bce10b4 : nt!KiBugCheckDispatch+0x69
  49. fffff803`43052680 fffff803`4a47029f : fffff803`4a470acf ffff8701`1bd11010 00000000`1bd11150 ffff8701`1bce10b4 : nt!KiPageFault+0x23d
  50. fffff803`43052818 fffff803`4a470acf : ffff8701`1bd11010 00000000`1bd11150 ffff8701`1bce10b4 00000000`00000000 : atikmdag+0x173029f
  51. fffff803`43052820 ffff8701`1bd11010 : 00000000`1bd11150 ffff8701`1bce10b4 00000000`00000000 00000400`00000001 : atikmdag+0x1730acf
  52. fffff803`43052828 00000000`1bd11150 : ffff8701`1bce10b4 00000000`00000000 00000400`00000001 ffff8701`1bce1364 : 0xffff8701`1bd11010
  53. fffff803`43052830 ffff8701`1bce10b4 : 00000000`00000000 00000400`00000001 ffff8701`1bce1364 00000000`00000000 : 0x1bd11150
  54. fffff803`43052838 00000000`00000000 : 00000400`00000001 ffff8701`1bce1364 00000000`00000000 fffff803`4a46b40b : 0xffff8701`1bce10b4
  55. STACK_COMMAND: kb
  56. MODULE_NAME: memory_corruption
  57. IMAGE_NAME: memory_corruption
  58. FOLLOWUP_NAME: memory_corruption
  59. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  60. MEMORY_CORRUPTOR: LARGE
  61. FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_LARGE
  62. BUCKET_ID: X64_MEMORY_CORRUPTION_LARGE
  63. Followup: memory_corruption
RAW Paste Data