Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
- An attempt was made to write to readonly memory. The guilty driver is on the
- stack trace (and is typically the current instruction pointer).
- When possible, the guilty driver's name (Unicode string) is printed on
- the BugCheck screen and saved in KiBugCheckDriver.
- Arguments:
- Arg1: fffff80379f920da, Virtual address for the attempted write.
- Arg2: 090000068a615121, PTE contents.
- Arg3: ffffce0b22abf160, (reserved)
- Arg4: 000000000000000b, (reserved)
- Debugging Details:
- ------------------
- *** WARNING: Unable to verify timestamp for BEDaisy.sys
- KEY_VALUES_STRING: 1
- Key : Analysis.CPU.mSec
- Value: 1125
- Key : Analysis.Elapsed.mSec
- Value: 1343
- Key : Analysis.IO.Other.Mb
- Value: 0
- Key : Analysis.IO.Read.Mb
- Value: 1
- Key : Analysis.IO.Write.Mb
- Value: 0
- Key : Analysis.Init.CPU.mSec
- Value: 296
- Key : Analysis.Init.Elapsed.mSec
- Value: 8867
- Key : Analysis.Memory.CommitPeak.Mb
- Value: 104
- Key : Analysis.Version.DbgEng
- Value: 10.0.27829.1001
- Key : Analysis.Version.Description
- Value: 10.2503.24.01 amd64fre
- Key : Analysis.Version.Ext
- Value: 1.2503.24.1
- Key : Bugcheck.Code.LegacyAPI
- Value: 0xbe
- Key : Bugcheck.Code.TargetModel
- Value: 0xbe
- Key : Dump.Attributes.AsUlong
- Value: 0x21808
- Key : Dump.Attributes.DiagDataWrittenToHeader
- Value: 1
- Key : Dump.Attributes.ErrorCode
- Value: 0x0
- Key : Dump.Attributes.KernelGeneratedTriageDump
- Value: 1
- Key : Dump.Attributes.LastLine
- Value: Dump completed successfully.
- Key : Dump.Attributes.ProgressPercentage
- Value: 0
- Key : Failure.Bucket
- Value: AV_BEDaisy!unknown_function
- Key : Failure.Hash
- Value: {36b04c21-521f-babb-382f-2a12c3ddef17}
- Key : Hypervisor.Enlightenments.ValueHex
- Value: 0x7417df84
- Key : Hypervisor.Flags.AnyHypervisorPresent
- Value: 1
- Key : Hypervisor.Flags.ApicEnlightened
- Value: 0
- Key : Hypervisor.Flags.ApicVirtualizationAvailable
- Value: 1
- Key : Hypervisor.Flags.AsyncMemoryHint
- Value: 0
- Key : Hypervisor.Flags.CoreSchedulerRequested
- Value: 0
- Key : Hypervisor.Flags.CpuManager
- Value: 1
- Key : Hypervisor.Flags.DeprecateAutoEoi
- Value: 1
- Key : Hypervisor.Flags.DynamicCpuDisabled
- Value: 1
- Key : Hypervisor.Flags.Epf
- Value: 0
- Key : Hypervisor.Flags.ExtendedProcessorMasks
- Value: 1
- Key : Hypervisor.Flags.HardwareMbecAvailable
- Value: 1
- Key : Hypervisor.Flags.MaxBankNumber
- Value: 0
- Key : Hypervisor.Flags.MemoryZeroingControl
- Value: 0
- Key : Hypervisor.Flags.NoExtendedRangeFlush
- Value: 0
- Key : Hypervisor.Flags.NoNonArchCoreSharing
- Value: 1
- Key : Hypervisor.Flags.Phase0InitDone
- Value: 1
- Key : Hypervisor.Flags.PowerSchedulerQos
- Value: 0
- Key : Hypervisor.Flags.RootScheduler
- Value: 0
- Key : Hypervisor.Flags.SynicAvailable
- Value: 1
- Key : Hypervisor.Flags.UseQpcBias
- Value: 0
- Key : Hypervisor.Flags.Value
- Value: 55185662
- Key : Hypervisor.Flags.ValueHex
- Value: 0x34a10fe
- Key : Hypervisor.Flags.VpAssistPage
- Value: 1
- Key : Hypervisor.Flags.VsmAvailable
- Value: 1
- Key : Hypervisor.RootFlags.AccessStats
- Value: 1
- Key : Hypervisor.RootFlags.CrashdumpEnlightened
- Value: 1
- Key : Hypervisor.RootFlags.CreateVirtualProcessor
- Value: 1
- Key : Hypervisor.RootFlags.DisableHyperthreading
- Value: 0
- Key : Hypervisor.RootFlags.HostTimelineSync
- Value: 1
- Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
- Value: 0
- Key : Hypervisor.RootFlags.IsHyperV
- Value: 1
- Key : Hypervisor.RootFlags.LivedumpEnlightened
- Value: 1
- Key : Hypervisor.RootFlags.MapDeviceInterrupt
- Value: 1
- Key : Hypervisor.RootFlags.MceEnlightened
- Value: 1
- Key : Hypervisor.RootFlags.Nested
- Value: 0
- Key : Hypervisor.RootFlags.StartLogicalProcessor
- Value: 1
- Key : Hypervisor.RootFlags.Value
- Value: 1015
- Key : Hypervisor.RootFlags.ValueHex
- Value: 0x3f7
- BUGCHECK_CODE: be
- BUGCHECK_P1: fffff80379f920da
- BUGCHECK_P2: 90000068a615121
- BUGCHECK_P3: ffffce0b22abf160
- BUGCHECK_P4: b
- FILE_IN_CAB: 062925-12750-01.dmp
- TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
- DUMP_FILE_ATTRIBUTES: 0x21808
- Kernel Generated Triage Dump
- FAULTING_THREAD: ffffbb8aafdf1040
- BLACKBOXBSD: 1 (!blackboxbsd)
- BLACKBOXNTFS: 1 (!blackboxntfs)
- BLACKBOXPNP: 1 (!blackboxpnp)
- BLACKBOXWINLOGON: 1
- CUSTOMER_CRASH_COUNT: 1
- PROCESS_NAME: aces.exe
- STACK_TEXT:
- ffffce0b`22abeef8 fffff803`c2510f6c : 00000000`000000be fffff803`79f920da 09000006`8a615121 ffffce0b`22abf160 : nt!KeBugCheckEx
- ffffce0b`22abef00 fffff803`c2429a70 : 00000000`00002061 ffff8000`00000000 fffff803`79f920da 0000007f`fffffff8 : nt!MiSystemFault+0x638
- ffffce0b`22abeff0 fffff803`c28b47cb : 00000000`00000000 00000000`00000000 00000000`0a5401a0 fffff803`c2581693 : nt!MmAccessFault+0x630
- ffffce0b`22abf160 fffff803`7a0e3926 : 00000000`00000001 00000000`00000002 00000001`401f20c7 132b92d2`589e0000 : nt!KiPageFault+0x38b
- ffffce0b`22abf2f0 00000000`00000001 : 00000000`00000002 00000001`401f20c7 132b92d2`589e0000 fffff803`c28a11d0 : BEDaisy+0x343926
- ffffce0b`22abf2f8 00000000`00000002 : 00000001`401f20c7 132b92d2`589e0000 fffff803`c28a11d0 ffffce0b`22abf6b0 : 0x1
- ffffce0b`22abf300 00000001`401f20c7 : 132b92d2`589e0000 fffff803`c28a11d0 ffffce0b`22abf6b0 00000001`401f2056 : 0x2
- ffffce0b`22abf308 132b92d2`589e0000 : fffff803`c28a11d0 ffffce0b`22abf6b0 00000001`401f2056 00000000`00000000 : 0x00000001`401f20c7
- ffffce0b`22abf310 fffff803`c28a11cf : ffffce0b`22abf6b0 00000001`401f2056 00000000`00000000 ffffbb8a`afdf18b0 : 0x132b92d2`589e0000
- ffffce0b`22abf318 ffffce0b`22abf6b0 : 00000001`401f2056 00000000`00000000 ffffbb8a`afdf18b0 00000000`00000000 : nt!ZwRequestWaitReplyPort+0x1f
- ffffce0b`22abf320 00000001`401f2056 : 00000000`00000000 ffffbb8a`afdf18b0 00000000`00000000 0000006a`00000002 : 0xffffce0b`22abf6b0
- ffffce0b`22abf328 00000000`00000000 : ffffbb8a`afdf18b0 00000000`00000000 0000006a`00000002 00000000`00040246 : 0x00000001`401f2056
- SYMBOL_NAME: BEDaisy+343926
- MODULE_NAME: BEDaisy
- IMAGE_NAME: BEDaisy.sys
- STACK_COMMAND: .process /r /p 0xffffbb8a8b4c7040; .thread 0xffffbb8aafdf1040 ; kb
- BUCKET_ID_FUNC_OFFSET: 343926
- FAILURE_BUCKET_ID: AV_BEDaisy!unknown_function
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- FAILURE_ID_HASH: {36b04c21-521f-babb-382f-2a12c3ddef17}
- Followup: MachineOwner
- ---------
Advertisement
Add Comment
Please, Sign In to add comment