Guest User

memory.dmp

a guest
Jul 24th, 2017
127
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.13 KB | None | 0 0
  1.  
  2. Microsoft (R) Windows Debugger Version 10.0.15063.468 AMD64
  3. Copyright (c) Microsoft Corporation. All rights reserved.
  4.  
  5.  
  6. Loading Dump File [C:\WINDOWS\MEMORY.DMP]
  7. Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
  8.  
  9. Symbol search path is: srv*
  10. Executable search path is:
  11. Windows 10 Kernel Version 10586 MP (8 procs) Free x64
  12. Product: WinNt, suite: TerminalServer SingleUserTS
  13. Built by: 10586.103.amd64fre.th2_release.160126-1819
  14. Machine Name:
  15. Kernel base = 0xfffff801`9ea1c000 PsLoadedModuleList = 0xfffff801`9ecfacf0
  16. Debug session time: Sat Jul 22 21:41:24.423 2017 (UTC + 2:00)
  17. System Uptime: 0 days 23:37:42.131
  18. Loading Kernel Symbols
  19. ...............................................................
  20. ................................................................
  21. .............................................
  22. Loading User Symbols
  23.  
  24. Loading unloaded module list
  25. .................
  26. *******************************************************************************
  27. * *
  28. * Bugcheck Analysis *
  29. * *
  30. *******************************************************************************
  31.  
  32. Use !analyze -v to get detailed debugging information.
  33.  
  34. BugCheck D1, {5, d, 8, 5}
  35.  
  36. Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+247 )
  37.  
  38. Followup: MachineOwner
  39. ---------
  40.  
  41. 3: kd> !analyze -v
  42. *******************************************************************************
  43. * *
  44. * Bugcheck Analysis *
  45. * *
  46. *******************************************************************************
  47.  
  48. DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
  49. An attempt was made to access a pageable (or completely invalid) address at an
  50. interrupt request level (IRQL) that is too high. This is usually
  51. caused by drivers using improper addresses.
  52. If kernel debugger is available get stack backtrace.
  53. Arguments:
  54. Arg1: 0000000000000005, memory referenced
  55. Arg2: 000000000000000d, IRQL
  56. Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
  57. Arg4: 0000000000000005, address which referenced memory
  58.  
  59. Debugging Details:
  60. ------------------
  61.  
  62.  
  63. DUMP_CLASS: 1
  64.  
  65. DUMP_QUALIFIER: 401
  66.  
  67. BUILD_VERSION_STRING: 10586.103.amd64fre.th2_release.160126-1819
  68.  
  69. SYSTEM_PRODUCT_NAME: To Be Filled By O.E.M.
  70.  
  71. SYSTEM_SKU: To Be Filled By O.E.M.
  72.  
  73. SYSTEM_VERSION: To Be Filled By O.E.M.
  74.  
  75. BIOS_VENDOR: American Megatrends Inc.
  76.  
  77. BIOS_VERSION: P2.80
  78.  
  79. BIOS_DATE: 05/31/2016
  80.  
  81. BASEBOARD_MANUFACTURER: ASRock
  82.  
  83. BASEBOARD_PRODUCT: 970 Pro3 R2.0
  84.  
  85. BASEBOARD_VERSION:
  86.  
  87. DUMP_TYPE: 1
  88.  
  89. BUGCHECK_P1: 5
  90.  
  91. BUGCHECK_P2: d
  92.  
  93. BUGCHECK_P3: 8
  94.  
  95. BUGCHECK_P4: 5
  96.  
  97. READ_ADDRESS: 0000000000000005
  98.  
  99. CURRENT_IRQL: d
  100.  
  101. FAULTING_IP:
  102. +0
  103. 00000000`00000005 ?? ???
  104.  
  105. PROCESS_NAME: System
  106.  
  107. CPU_COUNT: 8
  108.  
  109. CPU_MHZ: f97
  110.  
  111. CPU_VENDOR: AuthenticAMD
  112.  
  113. CPU_FAMILY: 15
  114.  
  115. CPU_MODEL: 2
  116.  
  117. CPU_STEPPING: 0
  118.  
  119. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  120.  
  121. BUGCHECK_STR: AV
  122.  
  123. ANALYSIS_SESSION_HOST: L934054
  124.  
  125. ANALYSIS_SESSION_TIME: 07-24-2017 08:07:03.0405
  126.  
  127. ANALYSIS_VERSION: 10.0.15063.468 amd64fre
  128.  
  129. TRAP_FRAME: ffffd001626bbdf0 -- (.trap 0xffffd001626bbdf0)
  130. NOTE: The trap frame does not contain all registers.
  131. Some register values may be zeroed or incorrect.
  132. rax=0000af23675b8f01 rbx=0000000000000000 rcx=0000000000000240
  133. rdx=0000af2300000000 rsi=0000000000000000 rdi=0000000000000000
  134. rip=0000000000000005 rsp=ffffd001626bbf88 rbp=ffffd00100000000
  135. r8=000000000031833e r9=0000000000000000 r10=ffffd0016268942c
  136. r11=ffffd0016268fcc0 r12=0000000000000000 r13=0000000000000000
  137. r14=0000000000000000 r15=0000000000000000
  138. iopl=0 nv up ei pl nz na po nc
  139. 00000000`00000005 ?? ???
  140. Resetting default scope
  141.  
  142. LAST_CONTROL_TRANSFER: from fffff8019eb68fe9 to fffff8019eb5e480
  143.  
  144. FAILED_INSTRUCTION_ADDRESS:
  145. +0
  146. 00000000`00000005 ?? ???
  147.  
  148. STACK_TEXT:
  149. ffffd001`626bbca8 fffff801`9eb68fe9 : 00000000`0000000a 00000000`00000005 00000000`0000000d 00000000`00000008 : nt!KeBugCheckEx
  150. ffffd001`626bbcb0 fffff801`9eb677c7 : 00000236`f9870d00 ffffd001`62683180 00000000`00000000 00000000`00000001 : nt!KiBugCheckDispatch+0x69
  151. ffffd001`626bbdf0 00000000`00000005 : 00000000`00000000 0000004d`32a61e23 ffffd001`626ad760 ffffe001`4bc39010 : nt!KiPageFault+0x247
  152. ffffd001`626bbf88 00000000`00000000 : 0000004d`32a61e23 ffffd001`626ad760 ffffe001`4bc39010 fffff801`9eb5f8aa : 0x5
  153.  
  154.  
  155. STACK_COMMAND: kb
  156.  
  157. THREAD_SHA1_HASH_MOD_FUNC: bf99962f16aee8a6a536cfcc5454c0cd4db15ac9
  158.  
  159. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 3fc3928ee7b2857c7b0acb22199e00ab7dceb90c
  160.  
  161. THREAD_SHA1_HASH_MOD: 2a7ca9d3ab5386d53fea7498e1d81b9c4a4c036b
  162.  
  163. FOLLOWUP_IP:
  164. nt!KiPageFault+247
  165. fffff801`9eb677c7 33c0 xor eax,eax
  166.  
  167. FAULT_INSTR_CODE: ffb0c033
  168.  
  169. SYMBOL_STACK_INDEX: 2
  170.  
  171. SYMBOL_NAME: nt!KiPageFault+247
  172.  
  173. FOLLOWUP_NAME: MachineOwner
  174.  
  175. MODULE_NAME: nt
  176.  
  177. IMAGE_NAME: ntkrnlmp.exe
  178.  
  179. DEBUG_FLR_IMAGE_TIMESTAMP: 56a849a9
  180.  
  181. BUCKET_ID_FUNC_OFFSET: 247
  182.  
  183. FAILURE_BUCKET_ID: AV_CODE_AV_NULL_IP_nt!KiPageFault
  184.  
  185. BUCKET_ID: AV_CODE_AV_NULL_IP_nt!KiPageFault
  186.  
  187. PRIMARY_PROBLEM_CLASS: AV_CODE_AV_NULL_IP_nt!KiPageFault
  188.  
  189. TARGET_TIME: 2017-07-22T19:41:24.000Z
  190.  
  191. OSBUILD: 10586
  192.  
  193. OSSERVICEPACK: 0
  194.  
  195. SERVICEPACK_NUMBER: 0
  196.  
  197. OS_REVISION: 0
  198.  
  199. SUITE_MASK: 272
  200.  
  201. PRODUCT_TYPE: 1
  202.  
  203. OSPLATFORM_TYPE: x64
  204.  
  205. OSNAME: Windows 10
  206.  
  207. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
  208.  
  209. OS_LOCALE:
  210.  
  211. USER_LCID: 0
  212.  
  213. OSBUILD_TIMESTAMP: 2016-01-27 05:38:01
  214.  
  215. BUILDDATESTAMP_STR: 160126-1819
  216.  
  217. BUILDLAB_STR: th2_release
  218.  
  219. BUILDOSVER_STR: 10.0.10586.103.amd64fre.th2_release.160126-1819
  220.  
  221. ANALYSIS_SESSION_ELAPSED_TIME: 90c
  222.  
  223. ANALYSIS_SOURCE: KM
  224.  
  225. FAILURE_ID_HASH_STRING: km:av_code_av_null_ip_nt!kipagefault
  226.  
  227. FAILURE_ID_HASH: {4ce35ff9-c5cf-d66d-0323-0f05e33f6692}
  228.  
  229. Followup: MachineOwner
  230. ---------
Advertisement
Add Comment
Please, Sign In to add comment