Advertisement
Guest User

Untitled

a guest
Oct 25th, 2018
147
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.01 KB | None | 0 0
  1. Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
  2. Online Crash Dump Analysis Service
  3. See http://www.osronline.com for more information
  4. Windows 8 Kernel Version 17134 MP (6 procs) Free x64
  5. Product: WinNt, suite: TerminalServer SingleUserTS
  6. Built by: 17134.1.amd64fre.rs4_release.180410-1804
  7. Machine Name:
  8. Kernel base = 0xfffff800`d989b000 PsLoadedModuleList = 0xfffff800`d9c49290
  9. Debug session time: Tue Oct 23 17:06:17.341 2018 (UTC - 4:00)
  10. System Uptime: 1 days 22:42:40.966
  11. *******************************************************************************
  12. * *
  13. * Bugcheck Analysis *
  14. * *
  15. *******************************************************************************
  16.  
  17. MEMORY_MANAGEMENT (1a)
  18. # Any other values for parameter 1 must be individually examined.
  19. Arguments:
  20. Arg1: 0000000000041201, The subtype of the bugcheck.
  21. Arg2: ffff8a3ffc022138
  22. Arg3: 0000000000000001
  23. Arg4: ffffde850fe342a0
  24.  
  25. Debugging Details:
  26. ------------------
  27.  
  28. TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
  29.  
  30. BUGCHECK_STR: 0x1a_41201
  31.  
  32. CUSTOMER_CRASH_COUNT: 1
  33.  
  34. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  35.  
  36. PROCESS_NAME: nvcontainer.ex
  37.  
  38. CURRENT_IRQL: 2
  39.  
  40. LAST_CONTROL_TRANSFER: from fffff800d999a8fb to fffff800d9a44490
  41.  
  42. STACK_TEXT:
  43. ffffc505`05c27498 fffff800`d999a8fb : 00000000`0000001a 00000000`00041201 ffff8a3f`fc022138 00000000`00000001 : nt!KeBugCheckEx
  44. ffffc505`05c274a0 fffff800`d9997874 : 00007ff8`04427000 00000000`00000001 ffff8a45`1ffe0110 0a000003`e50fa867 : nt!MiGetPageProtection+0x58b
  45. ffffc505`05c27510 fffff800`d9955b46 : 00007ff8`04a8d000 00007ff8`04426000 ffffde85`0fe342a0 fffff800`d98cb398 : nt!MiQueryAddressState+0x414
  46. ffffc505`05c27700 fffff800`d9d85376 : ffffde85`00000001 00000000`00000003 ffffde85`00000001 ffffc505`00000003 : nt!MiQueryAddressSpan+0x126
  47. ffffc505`05c277a0 fffff800`d9d84c11 : ffffbd86`f85e99ba 000001af`47ec0000 00000000`10000000 00000026`c89df140 : nt!MmQueryVirtualMemory+0x756
  48. ffffc505`05c27940 fffff800`d9a54b43 : ffffde85`07cdddc0 00000000`00000000 00007ff8`77566d4d ffffc505`05c27900 : nt!NtQueryVirtualMemory+0x25
  49. ffffc505`05c27990 00007ff8`07a0a354 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
  50. 00000026`c89deec8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7ff8`07a0a354
  51.  
  52.  
  53. STACK_COMMAND: kb
  54.  
  55. FOLLOWUP_IP:
  56. nt!MiGetPageProtection+58b
  57. fffff800`d999a8fb cc int 3
  58.  
  59. SYMBOL_STACK_INDEX: 1
  60.  
  61. SYMBOL_NAME: nt!MiGetPageProtection+58b
  62.  
  63. FOLLOWUP_NAME: MachineOwner
  64.  
  65. MODULE_NAME: nt
  66.  
  67. DEBUG_FLR_IMAGE_TIMESTAMP: 5ba316ae
  68.  
  69. IMAGE_NAME: memory_corruption
  70.  
  71. FAILURE_BUCKET_ID: X64_0x1a_41201_nt!MiGetPageProtection+58b
  72.  
  73. BUCKET_ID: X64_0x1a_41201_nt!MiGetPageProtection+58b
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement