Advertisement
etekiller

Untitled

Sep 11th, 2017
37
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.29 KB | None | 0 0
  1. Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
  2. Online Crash Dump Analysis Service
  3. See http://www.osronline.com for more information
  4. Windows 8 Kernel Version 15063 MP (8 procs) Free x64
  5. Product: WinNt, suite: TerminalServer SingleUserTS
  6. Built by: 15063.0.amd64fre.rs2_release.170317-1834
  7. Machine Name:
  8. Kernel base = 0xfffff801`b328d000 PsLoadedModuleList = 0xfffff801`b35d95c0
  9. Debug session time: Sat Sep 9 18:20:43.677 2017 (UTC - 4:00)
  10. System Uptime: 0 days 7:07:30.970
  11. *******************************************************************************
  12. * *
  13. * Bugcheck Analysis *
  14. * *
  15. *******************************************************************************
  16.  
  17. SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
  18. This is a very common bugcheck. Usually the exception address pinpoints
  19. the driver/function that caused the problem. Always note this address
  20. as well as the link date of the driver/image that contains this address.
  21. Some common problems are exception code 0x80000003. This means a hard
  22. coded breakpoint or assertion was hit, but this system was booted
  23. /NODEBUG. This is not supposed to happen as developers should never have
  24. hardcoded breakpoints in retail code, but ...
  25. If this happens, make sure a debugger gets connected, and the
  26. system is booted /DEBUG. This will let us see why this breakpoint is
  27. happening.
  28. Arguments:
  29. Arg1: ffffffffc0000005, The exception code that was not handled
  30. Arg2: fffff801b330f80e, The address that the exception occurred at
  31. Arg3: ffffa00062e2dd58, Exception Record Address
  32. Arg4: ffffa00062e2d5a0, Context Record Address
  33.  
  34. Debugging Details:
  35. ------------------
  36.  
  37. TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
  38.  
  39. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
  40.  
  41. FAULTING_IP:
  42. nt!MiDemoteCombinedPte+1e
  43. fffff801`b330f80e 498378f001 cmp qword ptr [r8-10h],1
  44.  
  45. EXCEPTION_RECORD: ffffa00062e2dd58 -- (.exr 0xffffa00062e2dd58)
  46. ExceptionAddress: fffff801b330f80e (nt!MiDemoteCombinedPte+0x000000000000001e)
  47. ExceptionCode: c0000005 (Access violation)
  48. ExceptionFlags: 00000000
  49. NumberParameters: 2
  50. Parameter[0]: 0000000000000000
  51. Parameter[1]: ffffffffffffffff
  52. Attempt to read from address ffffffffffffffff
  53.  
  54. CONTEXT: ffffa00062e2d5a0 -- (.cxr 0xffffa00062e2d5a0)
  55. rax=ffff53c70d7257b8 rbx=81001000cbd28847 rcx=ffffca83becaacc0
  56. rdx=fffff880000816a0 rsi=00000000102d4000 rdi=ffffa00062e2e3f0
  57. rip=fffff801b330f80e rsp=ffffa00062e2df90 rbp=ffffca83beee4c30
  58. r8=8000000000000000 r9=0000000000000000 r10=ffffecb002637780
  59. r11=0000000000000001 r12=0000000000000000 r13=0000000000000001
  60. r14=ffffca83becaacc0 r15=fffff880000816a0
  61. iopl=0 nv up ei ng nz na po nc
  62. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
  63. nt!MiDemoteCombinedPte+0x1e:
  64. fffff801`b330f80e 498378f001 cmp qword ptr [r8-10h],1 ds:002b:7fffffff`fffffff0=????????????????
  65. Resetting default scope
  66.  
  67. CUSTOMER_CRASH_COUNT: 1
  68.  
  69. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  70.  
  71. PROCESS_NAME: avp.exe
  72.  
  73. CURRENT_IRQL: 2
  74.  
  75. ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
  76.  
  77. EXCEPTION_PARAMETER1: 0000000000000000
  78.  
  79. EXCEPTION_PARAMETER2: ffffffffffffffff
  80.  
  81. READ_ADDRESS: unable to get nt!MmSpecialPoolStart
  82. unable to get nt!MmSpecialPoolEnd
  83. unable to get nt!MmPagedPoolEnd
  84. unable to get nt!MmNonPagedPoolStart
  85. unable to get nt!MmSizeOfNonPagedPoolInBytes
  86. ffffffffffffffff
  87.  
  88. FOLLOWUP_IP:
  89. nt!MiDemoteCombinedPte+1e
  90. fffff801`b330f80e 498378f001 cmp qword ptr [r8-10h],1
  91.  
  92. BUGCHECK_STR: AV
  93.  
  94. EXCEPTION_STR: 0x0
  95.  
  96. LAST_CONTROL_TRANSFER: from fffff801b3313836 to fffff801b330f80e
  97.  
  98. STACK_TEXT:
  99. ffffa000`62e2df90 fffff801`b3313836 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDemoteCombinedPte+0x1e
  100. ffffa000`62e2e050 fffff801`b3312979 : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiAgePte+0x9c6
  101. ffffa000`62e2e0d0 fffff801`b3312aa9 : fffff801`00000000 00000000`00000000 00000000`00000000 ffffca83`becaacc0 : nt!MiWalkPageTablesRecursively+0x209
  102. ffffa000`62e2e150 fffff801`b3312aa9 : 00000000`00000000 00000000`00000000 00000000`00000001 ffffca83`becaacc0 : nt!MiWalkPageTablesRecursively+0x339
  103. ffffa000`62e2e1d0 fffff801`b3312aa9 : 00000000`00000000 fffff801`00000000 ffffca83`00000002 ffffca83`becaacc0 : nt!MiWalkPageTablesRecursively+0x339
  104. ffffa000`62e2e250 fffff801`b330f730 : 00000000`00000000 00000000`00000000 ffffa000`00000003 ffffca83`becaacc0 : nt!MiWalkPageTablesRecursively+0x339
  105. ffffa000`62e2e2d0 fffff801`b330f06b : 00000000`00000000 fffff801`b330f350 ffffa000`62e2e470 00000000`00000000 : nt!MiWalkPageTables+0x210
  106. ffffa000`62e2e370 fffff801`b330e9dd : 00000000`00000000 00000000`00000000 00000000`00000000 fffff801`b33fe6cf : nt!MiAgeWorkingSet+0x2ab
  107. ffffa000`62e2e750 fffff801`b3332530 : ffffca83`00000000 ffffa000`62e2ea80 ffffca83`becaacd8 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x2ed
  108. ffffa000`62e2e8a0 fffff801`b3331bc5 : fffff801`b360a100 fffff801`b360a100 00000000`000000a7 00000000`00000000 : nt!MiProcessWorkingSets+0x200
  109. ffffa000`62e2ea60 fffff801`b33d7a5d : 00000000`ffffffff 00000000`00000008 00000000`ffffffff 00000000`00000001 : nt!MiWorkingSetManager+0x9d
  110. ffffa000`62e2eb20 fffff801`b3369ac7 : ffffca83`b8743040 00000000`00000080 fffff801`b33d7910 00000000`00000000 : nt!KeBalanceSetManager+0x14d
  111. ffffa000`62e2ec10 fffff801`b33fe9e6 : ffffa000`62a20180 ffffca83`b8743040 fffff801`b3369a80 00000000`00000000 : nt!PspSystemThreadStartup+0x47
  112. ffffa000`62e2ec60 00000000`00000000 : ffffa000`62e2f000 ffffa000`62e29000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
  113.  
  114.  
  115. MODULE_NAME: memory_corruption
  116.  
  117. IMAGE_NAME: memory_corruption
  118.  
  119. FOLLOWUP_NAME: memory_corruption
  120.  
  121. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  122.  
  123. MEMORY_CORRUPTOR: LARGE
  124.  
  125. STACK_COMMAND: .cxr 0xffffa00062e2d5a0 ; kb
  126.  
  127. FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_LARGE
  128.  
  129. BUCKET_ID: X64_MEMORY_CORRUPTION_LARGE
  130.  
  131. Followup: memory_corruption
  132. ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement