Guest User

dump

a guest
May 21st, 2021
893
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 9.06 KB | None | 0 0
  1.  
  2. Microsoft (R) Windows Debugger Version 10.0.18362.1 AMD64
  3. Copyright (c) Microsoft Corporation. All rights reserved.
  4.  
  5.  
  6. Loading Dump File [C:\Windows\MEMORY.DMP]
  7. Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
  8.  
  9.  
  10. ************* Path validation summary **************
  11. Response Time (ms) Location
  12. Deferred SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
  13. Symbol search path is: SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
  14. Executable search path is:
  15. Windows 10 Kernel Version 19041 MP (12 procs) Free x64
  16. Product: WinNt, suite: TerminalServer SingleUserTS
  17. Built by: 19041.1.amd64fre.vb_release.191206-1406
  18. Machine Name:
  19. Kernel base = 0xfffff800`07400000 PsLoadedModuleList = 0xfffff800`0802a1b0
  20. Debug session time: Fri May 21 14:41:21.378 2021 (UTC + 8:00)
  21. System Uptime: 0 days 1:42:32.079
  22. Loading Kernel Symbols
  23. ........................................Page 200006810 too large to be in the dump file.
  24. .......................
  25. .........Page 20013451c too large to be in the dump file.
  26. .......................................................
  27. ................................................................
  28. ................................................................
  29. ...
  30. Loading User Symbols
  31. PEB is paged out (Peb.Ldr = 0000002c`80f9e018). Type ".hh dbgerr001" for details
  32. Loading unloaded module list
  33. ......................
  34. For analysis of this file, run !analyze -v
  35. 4: kd> !analyze -v
  36. *******************************************************************************
  37. * *
  38. * Bugcheck Analysis *
  39. * *
  40. *******************************************************************************
  41.  
  42. ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
  43. An attempt was made to write to readonly memory. The guilty driver is on the
  44. stack trace (and is typically the current instruction pointer).
  45. When possible, the guilty driver's name (Unicode string) is printed on
  46. the bugcheck screen and saved in KiBugCheckDriver.
  47. Arguments:
  48. Arg1: ffffba8030000018, Virtual address for the attempted write.
  49. Arg2: 8a00000000200021, PTE contents.
  50. Arg3: ffffc089523ef590, (reserved)
  51. Arg4: 000000000000000a, (reserved)
  52.  
  53. Debugging Details:
  54. ------------------
  55.  
  56.  
  57. KEY_VALUES_STRING: 1
  58.  
  59.  
  60. PROCESSES_ANALYSIS: 1
  61.  
  62. SERVICE_ANALYSIS: 1
  63.  
  64. STACKHASH_ANALYSIS: 1
  65.  
  66. TIMELINE_ANALYSIS: 1
  67.  
  68.  
  69. DUMP_CLASS: 1
  70.  
  71. DUMP_QUALIFIER: 401
  72.  
  73. BUILD_VERSION_STRING: 19041.1.amd64fre.vb_release.191206-1406
  74.  
  75. SYSTEM_MANUFACTURER: Dell Inc.
  76.  
  77. SYSTEM_PRODUCT_NAME: Precision 7530
  78.  
  79. SYSTEM_SKU: 0831
  80.  
  81. BIOS_VENDOR: Dell Inc.
  82.  
  83. BIOS_VERSION: 1.14.4
  84.  
  85. BIOS_DATE: 10/21/2020
  86.  
  87. BASEBOARD_MANUFACTURER: Dell Inc.
  88.  
  89. BASEBOARD_PRODUCT: 07NCNV
  90.  
  91. BASEBOARD_VERSION: A00
  92.  
  93. DUMP_TYPE: 1
  94.  
  95. BUGCHECK_P1: ffffba8030000018
  96.  
  97. BUGCHECK_P2: 8a00000000200021
  98.  
  99. BUGCHECK_P3: ffffc089523ef590
  100.  
  101. BUGCHECK_P4: a
  102.  
  103. CPU_COUNT: c
  104.  
  105. CPU_MHZ: a98
  106.  
  107. CPU_VENDOR: GenuineIntel
  108.  
  109. CPU_FAMILY: 6
  110.  
  111. CPU_MODEL: 9e
  112.  
  113. CPU_STEPPING: a
  114.  
  115. CPU_MICROCODE: 6,9e,a,0 (F,M,S,R) SIG: DE'00000000 (cache) DE'00000000 (init)
  116.  
  117. BLACKBOXBSD: 1 (!blackboxbsd)
  118.  
  119.  
  120. BLACKBOXNTFS: 1 (!blackboxntfs)
  121.  
  122.  
  123. BLACKBOXPNP: 1 (!blackboxpnp)
  124.  
  125.  
  126. BLACKBOXWINLOGON: 1
  127.  
  128. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  129.  
  130. BUGCHECK_STR: 0xBE
  131.  
  132. PROCESS_NAME: SearchFilterHost.exe
  133.  
  134. CURRENT_IRQL: 2
  135.  
  136. ANALYSIS_SESSION_HOST: XXXXX-P7530
  137.  
  138. ANALYSIS_SESSION_TIME: 05-21-2021 14:52:33.0764
  139.  
  140. ANALYSIS_VERSION: 10.0.18362.1 amd64fre
  141.  
  142. TRAP_FRAME: ffffc089523ef590 -- (.trap 0xffffc089523ef590)
  143. NOTE: The trap frame does not contain all registers.
  144. Some register values may be zeroed or incorrect.
  145. rax=fffff88000000000 rbx=0000000000000000 rcx=0000000000000001
  146. rdx=fffff88000000000 rsi=0000000000000000 rdi=0000000000000000
  147. rip=fffff8000773c85e rsp=ffffc089523ef720 rbp=0000000000000000
  148. r8=0000000000000000 r9=000000003940f26c r10=0000000000000000
  149. r11=ffffc089523ef7a8 r12=0000000000000000 r13=0000000000000000
  150. r14=0000000000000000 r15=0000000000000000
  151. iopl=0 nv up ei ng nz ac po cy
  152. nt!MiWsleFree+0x17e:
  153. fffff800`0773c85e f0480fba2e3f lock bts qword ptr [rsi],3Fh ds:00000000`00000000=????????????????
  154. Resetting default scope
  155.  
  156. LAST_CONTROL_TRANSFER: from fffff80007856dbe to fffff800077f6cf0
  157.  
  158. STACK_TEXT:
  159. ffffc089`523ef398 fffff800`07856dbe : 00000000`000000be ffffba80`30000018 8a000000`00200021 ffffc089`523ef590 : nt!KeBugCheckEx
  160. ffffc089`523ef3a0 fffff800`077282ff : 8a000000`00200021 00000000`00000003 ffffc089`523ef610 00000000`00000000 : nt!MiRaisedIrqlFault+0x184142
  161. ffffc089`523ef3f0 fffff800`07804e5e : ffffa807`8e8fb72c ffff8405`74ad69e0 ffff8405`77437010 ffff8405`77437170 : nt!MmAccessFault+0x4ef
  162. ffffc089`523ef590 fffff800`0773c85e : 00000000`00000000 00000000`00000000 00000000`00000637 fffff8fc`7e3f1000 : nt!KiPageFault+0x35e
  163. ffffc089`523ef720 fffff800`0773bceb : ffffa807`8b1c9700 00007ffe`00000000 ffffc089`00000000 00000010`00000001 : nt!MiWsleFree+0x17e
  164. ffffc089`523ef7b0 fffff800`0775c76f : 00000000`00000000 00007ffe`40381000 ffffc089`523efe90 00000000`00000000 : nt!MiFreeWsleList+0x1bb
  165. ffffc089`523ef980 fffff800`0775c6a8 : 00000000`00000000 00000000`00000000 ffffa807`8b1c9700 00000000`00000016 : nt!MiTrimWorkingSetBuildup+0x87
  166. ffffc089`523efa00 fffff800`0772778d : 00000000`00000004 ffffa807`8b1c9700 00000000`00000000 00000000`00000000 : nt!MiTrimWorkingSetTail+0x28
  167. ffffc089`523efa30 fffff800`077273ab : fffff8fc`00000000 ffffa807`8b1c9700 00000000`00000000 ffffc089`523efe30 : nt!MiWalkPageTablesRecursively+0xc6d
  168. ffffc089`523efad0 fffff800`077273ab : fffff8fc`7e2fffc8 ffffa807`8b1c9700 00000000`00000001 ffffc089`523efe40 : nt!MiWalkPageTablesRecursively+0x88b
  169. ffffc089`523efb70 fffff800`077273ab : fffff8fc`00000000 ffffa807`8b1c9700 00000000`00000002 ffffc089`523efe50 : nt!MiWalkPageTablesRecursively+0x88b
  170. ffffc089`523efc10 fffff800`07604f4b : ffffc089`00000000 ffffa807`8b1c9700 ffffc089`00000003 ffffc089`523efe60 : nt!MiWalkPageTablesRecursively+0x88b
  171. ffffc089`523efcb0 fffff800`076b20a7 : ffffc089`523efde0 ffffa807`00000000 00000000`00000002 fffff800`00000000 : nt!MiWalkPageTables+0x36b
  172. ffffc089`523efdb0 fffff800`076b1ea1 : 00000000`00000000 ffffc089`523f0840 ffffa807`89d3c080 00000000`00000000 : nt!MiTrimWorkingSet+0x1db
  173. ffffc089`523f0190 fffff800`076b1d6d : ffffa807`8b1c9700 ffffc089`523f0210 00000000`00000000 00000000`00000000 : nt!MiReduceWs+0x71
  174. ffffc089`523f01d0 fffff800`0772a5ed : 00000000`00000001 00000000`00000000 ffffa807`8b1c9700 00000000`00000000 : nt!MiPreUnlockWorkingSetShared+0xb5
  175. ffffc089`523f0220 fffff800`07613587 : 00000000`00000001 00000000`00000032 ffffa807`00000000 a8078c36`e1b4ffff : nt!MiUnlockWorkingSetShared+0xdd
  176. ffffc089`523f0250 fffff800`076eb8bc : 00000000`00000001 00000000`10000000 00000000`00000032 00000000`00000032 : nt!MiUnlockWorkingSetExclusive+0x117
  177. ffffc089`523f0290 fffff800`07aa62dc : 00000000`00000001 00000000`0000000a 00000000`00000000 00000000`00000000 : nt!MmAdjustWorkingSetSizeEx+0x228
  178. ffffc089`523f0350 fffff800`07b0d724 : ffffa807`8b1c9660 00000000`00000000 00000000`00000058 ffffffff`ffffffff : nt!PspSetQuotaLimits+0x2e8
  179. ffffc089`523f04b0 fffff800`078086b5 : ffffa807`89d3c080 000001b0`00000001 0000002c`00000000 ffffa807`00000000 : nt!NtSetInformationProcess+0x7e4
  180. ffffc089`523f0a00 00007ffe`4584d1a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
  181. 0000002c`80cdeef8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`4584d1a4
  182.  
  183.  
  184. THREAD_SHA1_HASH_MOD_FUNC: 61c433e5abd59903811de2139f883956350526f9
  185.  
  186. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 317235c48af0f3ace0e6f57ef028e345906e8f44
  187.  
  188. THREAD_SHA1_HASH_MOD: d615f6b3dcff38ae41646e5a9d32380488b7bd98
  189.  
  190. FOLLOWUP_IP:
  191. nt!MiRaisedIrqlFault+184142
  192. fffff800`07856dbe cc int 3
  193.  
  194. FAULT_INSTR_CODE: cf8b48cc
  195.  
  196. SYMBOL_STACK_INDEX: 1
  197.  
  198. SYMBOL_NAME: nt!MiRaisedIrqlFault+184142
  199.  
  200. FOLLOWUP_NAME: MachineOwner
  201.  
  202. MODULE_NAME: nt
  203.  
  204. DEBUG_FLR_IMAGE_TIMESTAMP: 411f9e5a
  205.  
  206. STACK_COMMAND: .thread ; .cxr ; kb
  207.  
  208. IMAGE_NAME: memory_corruption
  209.  
  210. BUCKET_ID_FUNC_OFFSET: 184142
  211.  
  212. FAILURE_BUCKET_ID: 0xBE_nt!MiRaisedIrqlFault
  213.  
  214. BUCKET_ID: 0xBE_nt!MiRaisedIrqlFault
  215.  
  216. PRIMARY_PROBLEM_CLASS: 0xBE_nt!MiRaisedIrqlFault
  217.  
  218. TARGET_TIME: 2021-05-21T06:41:21.000Z
  219.  
  220. OSBUILD: 19041
  221.  
  222. OSSERVICEPACK: 0
  223.  
  224. SERVICEPACK_NUMBER: 0
  225.  
  226. OS_REVISION: 0
  227.  
  228. SUITE_MASK: 272
  229.  
  230. PRODUCT_TYPE: 1
  231.  
  232. OSPLATFORM_TYPE: x64
  233.  
  234. OSNAME: Windows 10
  235.  
  236. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
  237.  
  238. OS_LOCALE:
  239.  
  240. USER_LCID: 0
  241.  
  242. OSBUILD_TIMESTAMP: 2004-08-16 01:33:14
  243.  
  244. BUILDDATESTAMP_STR: 191206-1406
  245.  
  246. BUILDLAB_STR: vb_release
  247.  
  248. BUILDOSVER_STR: 10.0.19041.1.amd64fre.vb_release.191206-1406
  249.  
  250. ANALYSIS_SESSION_ELAPSED_TIME: 1092
  251.  
  252. ANALYSIS_SOURCE: KM
  253.  
  254. FAILURE_ID_HASH_STRING: km:0xbe_nt!miraisedirqlfault
  255.  
  256. FAILURE_ID_HASH: {1c5b4d11-09e0-def3-d2d0-70a11d69b92d}
  257.  
  258. Followup: MachineOwner
  259. ---------
  260.  
  261.  
Advertisement
Add Comment
Please, Sign In to add comment