Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
- Online Crash Dump Analysis Service
- See http://www.osronline.com for more information
- Windows 8 Kernel Version 15063 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Machine Name:
- Kernel base = 0xfffff801`b328d000 PsLoadedModuleList = 0xfffff801`b35d95c0
- Debug session time: Sat Sep 9 18:20:43.677 2017 (UTC - 4:00)
- System Uptime: 0 days 7:07:30.970
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
- This is a very common bugcheck. Usually the exception address pinpoints
- the driver/function that caused the problem. Always note this address
- as well as the link date of the driver/image that contains this address.
- Some common problems are exception code 0x80000003. This means a hard
- coded breakpoint or assertion was hit, but this system was booted
- /NODEBUG. This is not supposed to happen as developers should never have
- hardcoded breakpoints in retail code, but ...
- If this happens, make sure a debugger gets connected, and the
- system is booted /DEBUG. This will let us see why this breakpoint is
- happening.
- Arguments:
- Arg1: ffffffffc0000005, The exception code that was not handled
- Arg2: fffff801b330f80e, The address that the exception occurred at
- Arg3: ffffa00062e2dd58, Exception Record Address
- Arg4: ffffa00062e2d5a0, Context Record Address
- Debugging Details:
- ------------------
- TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
- EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
- FAULTING_IP:
- nt!MiDemoteCombinedPte+1e
- fffff801`b330f80e 498378f001 cmp qword ptr [r8-10h],1
- EXCEPTION_RECORD: ffffa00062e2dd58 -- (.exr 0xffffa00062e2dd58)
- ExceptionAddress: fffff801b330f80e (nt!MiDemoteCombinedPte+0x000000000000001e)
- ExceptionCode: c0000005 (Access violation)
- ExceptionFlags: 00000000
- NumberParameters: 2
- Parameter[0]: 0000000000000000
- Parameter[1]: ffffffffffffffff
- Attempt to read from address ffffffffffffffff
- CONTEXT: ffffa00062e2d5a0 -- (.cxr 0xffffa00062e2d5a0)
- rax=ffff53c70d7257b8 rbx=81001000cbd28847 rcx=ffffca83becaacc0
- rdx=fffff880000816a0 rsi=00000000102d4000 rdi=ffffa00062e2e3f0
- rip=fffff801b330f80e rsp=ffffa00062e2df90 rbp=ffffca83beee4c30
- r8=8000000000000000 r9=0000000000000000 r10=ffffecb002637780
- r11=0000000000000001 r12=0000000000000000 r13=0000000000000001
- r14=ffffca83becaacc0 r15=fffff880000816a0
- iopl=0 nv up ei ng nz na po nc
- cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
- nt!MiDemoteCombinedPte+0x1e:
- fffff801`b330f80e 498378f001 cmp qword ptr [r8-10h],1 ds:002b:7fffffff`fffffff0=????????????????
- Resetting default scope
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- PROCESS_NAME: avp.exe
- CURRENT_IRQL: 2
- ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
- EXCEPTION_PARAMETER1: 0000000000000000
- EXCEPTION_PARAMETER2: ffffffffffffffff
- READ_ADDRESS: unable to get nt!MmSpecialPoolStart
- unable to get nt!MmSpecialPoolEnd
- unable to get nt!MmPagedPoolEnd
- unable to get nt!MmNonPagedPoolStart
- unable to get nt!MmSizeOfNonPagedPoolInBytes
- ffffffffffffffff
- FOLLOWUP_IP:
- nt!MiDemoteCombinedPte+1e
- fffff801`b330f80e 498378f001 cmp qword ptr [r8-10h],1
- BUGCHECK_STR: AV
- EXCEPTION_STR: 0x0
- LAST_CONTROL_TRANSFER: from fffff801b3313836 to fffff801b330f80e
- STACK_TEXT:
- ffffa000`62e2df90 fffff801`b3313836 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDemoteCombinedPte+0x1e
- ffffa000`62e2e050 fffff801`b3312979 : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiAgePte+0x9c6
- ffffa000`62e2e0d0 fffff801`b3312aa9 : fffff801`00000000 00000000`00000000 00000000`00000000 ffffca83`becaacc0 : nt!MiWalkPageTablesRecursively+0x209
- ffffa000`62e2e150 fffff801`b3312aa9 : 00000000`00000000 00000000`00000000 00000000`00000001 ffffca83`becaacc0 : nt!MiWalkPageTablesRecursively+0x339
- ffffa000`62e2e1d0 fffff801`b3312aa9 : 00000000`00000000 fffff801`00000000 ffffca83`00000002 ffffca83`becaacc0 : nt!MiWalkPageTablesRecursively+0x339
- ffffa000`62e2e250 fffff801`b330f730 : 00000000`00000000 00000000`00000000 ffffa000`00000003 ffffca83`becaacc0 : nt!MiWalkPageTablesRecursively+0x339
- ffffa000`62e2e2d0 fffff801`b330f06b : 00000000`00000000 fffff801`b330f350 ffffa000`62e2e470 00000000`00000000 : nt!MiWalkPageTables+0x210
- ffffa000`62e2e370 fffff801`b330e9dd : 00000000`00000000 00000000`00000000 00000000`00000000 fffff801`b33fe6cf : nt!MiAgeWorkingSet+0x2ab
- ffffa000`62e2e750 fffff801`b3332530 : ffffca83`00000000 ffffa000`62e2ea80 ffffca83`becaacd8 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x2ed
- ffffa000`62e2e8a0 fffff801`b3331bc5 : fffff801`b360a100 fffff801`b360a100 00000000`000000a7 00000000`00000000 : nt!MiProcessWorkingSets+0x200
- ffffa000`62e2ea60 fffff801`b33d7a5d : 00000000`ffffffff 00000000`00000008 00000000`ffffffff 00000000`00000001 : nt!MiWorkingSetManager+0x9d
- ffffa000`62e2eb20 fffff801`b3369ac7 : ffffca83`b8743040 00000000`00000080 fffff801`b33d7910 00000000`00000000 : nt!KeBalanceSetManager+0x14d
- ffffa000`62e2ec10 fffff801`b33fe9e6 : ffffa000`62a20180 ffffca83`b8743040 fffff801`b3369a80 00000000`00000000 : nt!PspSystemThreadStartup+0x47
- ffffa000`62e2ec60 00000000`00000000 : ffffa000`62e2f000 ffffa000`62e29000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- STACK_COMMAND: .cxr 0xffffa00062e2d5a0 ; kb
- FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_LARGE
- BUCKET_ID: X64_MEMORY_CORRUPTION_LARGE
- Followup: memory_corruption
- ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement