Advertisement
Guest User

Untitled

a guest
Sep 1st, 2018
762
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 8.12 KB | None | 0 0
  1.  
  2. Microsoft (R) Windows Debugger Version 10.0.17134.12 AMD64
  3. Copyright (c) Microsoft Corporation. All rights reserved.
  4.  
  5.  
  6. Loading Dump File [C:\Windows\MEMORY.DMP]
  7. Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
  8.  
  9. Symbol search path is: srv*
  10. Executable search path is:
  11. Windows 10 Kernel Version 17134 MP (8 procs) Free x64
  12. Product: WinNt, suite: TerminalServer SingleUserTS
  13. Built by: 17134.1.amd64fre.rs4_release.180410-1804
  14. Machine Name:
  15. Kernel base = 0xfffff801`c5a0d000 PsLoadedModuleList = 0xfffff801`c5dbb170
  16. Debug session time: Sat Sep 1 18:45:10.815 2018 (UTC - 3:00)
  17. System Uptime: 1 days 5:36:05.800
  18. Loading Kernel Symbols
  19. ...............................................................
  20. ................................................................
  21. ............................................................
  22. Loading User Symbols
  23. PEB is paged out (Peb.Ldr = 0000005b`dfd84018). Type ".hh dbgerr001" for details
  24. Loading unloaded module list
  25. ................
  26. *******************************************************************************
  27. * *
  28. * Bugcheck Analysis *
  29. * *
  30. *******************************************************************************
  31.  
  32. Use !analyze -v to get detailed debugging information.
  33.  
  34. BugCheck BE, {ffffe000be82e380, 1a000003230d8025, ffffca87a59b0060, a}
  35.  
  36. Probably caused by : memory_corruption ( nt!MiRaisedIrqlFault+e5a55 )
  37.  
  38. Followup: MachineOwner
  39. ---------
  40.  
  41. 0: kd> !analyze -v
  42. *******************************************************************************
  43. * *
  44. * Bugcheck Analysis *
  45. * *
  46. *******************************************************************************
  47.  
  48. ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
  49. An attempt was made to write to readonly memory. The guilty driver is on the
  50. stack trace (and is typically the current instruction pointer).
  51. When possible, the guilty driver's name (Unicode string) is printed on
  52. the bugcheck screen and saved in KiBugCheckDriver.
  53. Arguments:
  54. Arg1: ffffe000be82e380, Virtual address for the attempted write.
  55. Arg2: 1a000003230d8025, PTE contents.
  56. Arg3: ffffca87a59b0060, (reserved)
  57. Arg4: 000000000000000a, (reserved)
  58.  
  59. Debugging Details:
  60. ------------------
  61.  
  62.  
  63. KEY_VALUES_STRING: 1
  64.  
  65.  
  66. TIMELINE_ANALYSIS: 1
  67.  
  68.  
  69. DUMP_CLASS: 1
  70.  
  71. DUMP_QUALIFIER: 401
  72.  
  73. BUILD_VERSION_STRING: 17134.1.amd64fre.rs4_release.180410-1804
  74.  
  75. SYSTEM_MANUFACTURER: ASUS
  76.  
  77. SYSTEM_PRODUCT_NAME: All Series
  78.  
  79. SYSTEM_SKU: All
  80.  
  81. SYSTEM_VERSION: System Version
  82.  
  83. BIOS_VENDOR: American Megatrends Inc.
  84.  
  85. BIOS_VERSION: 0802
  86.  
  87. BIOS_DATE: 12/07/2015
  88.  
  89. BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
  90.  
  91. BASEBOARD_PRODUCT: Z97-E
  92.  
  93. BASEBOARD_VERSION: Rev X.0x
  94.  
  95. DUMP_TYPE: 1
  96.  
  97. BUGCHECK_P1: ffffe000be82e380
  98.  
  99. BUGCHECK_P2: 1a000003230d8025
  100.  
  101. BUGCHECK_P3: ffffca87a59b0060
  102.  
  103. BUGCHECK_P4: a
  104.  
  105. CPU_COUNT: 8
  106.  
  107. CPU_MHZ: f9e
  108.  
  109. CPU_VENDOR: GenuineIntel
  110.  
  111. CPU_FAMILY: 6
  112.  
  113. CPU_MODEL: 3c
  114.  
  115. CPU_STEPPING: 3
  116.  
  117. CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 22'00000000 (cache) 22'00000000 (init)
  118.  
  119. BLACKBOXBSD: 1 (!blackboxbsd)
  120.  
  121.  
  122. BLACKBOXPNP: 1 (!blackboxpnp)
  123.  
  124.  
  125. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  126.  
  127. BUGCHECK_STR: 0xBE
  128.  
  129. PROCESS_NAME: reg.exe
  130.  
  131. CURRENT_IRQL: 2
  132.  
  133. ANALYSIS_SESSION_HOST: DESKTOP-R92QV4T
  134.  
  135. ANALYSIS_SESSION_TIME: 09-01-2018 20:24:42.0217
  136.  
  137. ANALYSIS_VERSION: 10.0.17134.12 amd64fre
  138.  
  139. TRAP_FRAME: ffffca87a59b06d0 -- (.trap 0xffffca87a59b06d0)
  140. NOTE: The trap frame does not contain all registers.
  141. Some register values may be zeroed or incorrect.
  142. rax=0000000000000004 rbx=0000000000000000 rcx=0000017d05c70020
  143. rdx=ffffa38bfa1c7000 rsi=0000000000000000 rdi=0000000000000000
  144. rip=fffff801c5bc776f rsp=ffffca87a59b0868 rbp=ffffa508ffe37000
  145. r8=000000000000001c r9=00000000000000e5 r10=ffffa508fdb1e080
  146. r11=0000017d05c70000 r12=0000000000000000 r13=0000000000000000
  147. r14=0000000000000000 r15=0000000000000000
  148. iopl=0 nv up ei pl nz na pe nc
  149. nt!memcpy+0xaf:
  150. fffff801`c5bc776f 660f7f41e0 movdqa xmmword ptr [rcx-20h],xmm0 ds:0000017d`05c70000=????????????????????????????????
  151. Resetting default scope
  152.  
  153. LAST_CONTROL_TRANSFER: from fffff801c5c0eadd to fffff801c5bb5ca0
  154.  
  155. STACK_TEXT:
  156. ffffca87`a59afea8 fffff801`c5c0eadd : 00000000`000000be ffffe000`be82e380 1a000003`230d8025 ffffca87`a59b0060 : nt!KeBugCheckEx
  157. ffffca87`a59afeb0 fffff801`c5a76f86 : 00000000`00000003 1a000003`230d8025 ffffca87`a59afff0 00000000`00000000 : nt!MiRaisedIrqlFault+0xe5a55
  158. ffffca87`a59afef0 fffff801`c5bc33da : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x3f6
  159. ffffca87`a59b0060 fffff801`c5a70003 : 00000000`00000002 00000000`00000000 00000000`00000001 000000ff`00000000 : nt!KiPageFault+0x31a
  160. ffffca87`a59b01f0 fffff801`c5a73134 : ffffca87`a59b04a0 ffff8300`01f798b0 00000000`00000001 ffffa508`fdb1e580 : nt!MiCompletePrivateZeroFault+0x463
  161. ffffca87`a59b0310 fffff801`c5a78316 : df5e607f`00000000 ffffa508`00000000 ffffffff`ffffffff 0000017d`05c70000 : nt!MiResolvePrivateZeroFault+0x154
  162. ffffca87`a59b0430 fffff801`c5a76caf : ffffca87`a59b0590 00000000`00000000 ffffa508`fdb1e080 a5090316`00000000 : nt!MiUserFault+0x1236
  163. ffffca87`a59b0560 fffff801`c5bc33da : ffffca87`a59b0ce0 ffffa509`01fa9080 00000000`00000000 00000000`00001cbc : nt!MmAccessFault+0x11f
  164. ffffca87`a59b06d0 fffff801`c5bc776f : fffff801`c5f0de35 ffffca87`a59b1040 ffffa508`fdb1e080 ffffca87`a59b1040 : nt!KiPageFault+0x31a
  165. ffffca87`a59b0868 fffff801`c5f0de35 : ffffca87`a59b1040 ffffa508`fdb1e080 ffffca87`a59b1040 fffff801`c5f8d53b : nt!memcpy+0xaf
  166. ffffca87`a59b0870 fffff801`c5f0d7ff : ffffa509`01fa9080 ffffa508`fdb1e001 00000000`00000004 ffffa508`fdb1e080 : nt!PspCopyAndFixupParameters+0xf5
  167. ffffca87`a59b0900 fffff801`c5f10f93 : 00000000`000022aa ffffca87`a59b1b80 00000000`000022a0 00000000`00000000 : nt!PspSetupUserProcessAddressSpace+0x13f
  168. ffffca87`a59b09b0 fffff801`c5ef55b1 : 00000000`a4440700 ffffca87`a59b1b80 00000000`00000000 00000000`00000000 : nt!PspAllocateProcess+0xf9f
  169. ffffca87`a59b0e50 fffff801`c5bc6343 : 00000000`00000002 00000000`00000000 00000000`00000000 00000000`00000001 : nt!NtCreateUserProcess+0x719
  170. ffffca87`a59b1a90 00007ffb`a7d7b6e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
  171. 00000045`03cfe4f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`a7d7b6e4
  172.  
  173.  
  174. THREAD_SHA1_HASH_MOD_FUNC: b93bba80c3eeb5804a5323be612dafd6422cfa9b
  175.  
  176. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 9fafc0fd95b56c6d34e6cf05c80b0f7f6a547d0e
  177.  
  178. THREAD_SHA1_HASH_MOD: 38bc5fec3f0409c265cf5c87da6f8f8859d0711c
  179.  
  180. FOLLOWUP_IP:
  181. nt!MiRaisedIrqlFault+e5a55
  182. fffff801`c5c0eadd cc int 3
  183.  
  184. FAULT_INSTR_CODE: 2c8440cc
  185.  
  186. SYMBOL_STACK_INDEX: 1
  187.  
  188. SYMBOL_NAME: nt!MiRaisedIrqlFault+e5a55
  189.  
  190. FOLLOWUP_NAME: MachineOwner
  191.  
  192. MODULE_NAME: nt
  193.  
  194. DEBUG_FLR_IMAGE_TIMESTAMP: 5b63c7b5
  195.  
  196. STACK_COMMAND: .thread ; .cxr ; kb
  197.  
  198. IMAGE_NAME: memory_corruption
  199.  
  200. BUCKET_ID_FUNC_OFFSET: e5a55
  201.  
  202. FAILURE_BUCKET_ID: 0xBE_nt!MiRaisedIrqlFault
  203.  
  204. BUCKET_ID: 0xBE_nt!MiRaisedIrqlFault
  205.  
  206. PRIMARY_PROBLEM_CLASS: 0xBE_nt!MiRaisedIrqlFault
  207.  
  208. TARGET_TIME: 2018-09-01T21:45:10.000Z
  209.  
  210. OSBUILD: 17134
  211.  
  212. OSSERVICEPACK: 0
  213.  
  214. SERVICEPACK_NUMBER: 0
  215.  
  216. OS_REVISION: 0
  217.  
  218. SUITE_MASK: 272
  219.  
  220. PRODUCT_TYPE: 1
  221.  
  222. OSPLATFORM_TYPE: x64
  223.  
  224. OSNAME: Windows 10
  225.  
  226. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
  227.  
  228. OS_LOCALE:
  229.  
  230. USER_LCID: 0
  231.  
  232. OSBUILD_TIMESTAMP: 2018-08-03 00:10:45
  233.  
  234. BUILDDATESTAMP_STR: 180410-1804
  235.  
  236. BUILDLAB_STR: rs4_release
  237.  
  238. BUILDOSVER_STR: 10.0.17134.1.amd64fre.rs4_release.180410-1804
  239.  
  240. ANALYSIS_SESSION_ELAPSED_TIME: b46
  241.  
  242. ANALYSIS_SOURCE: KM
  243.  
  244. FAILURE_ID_HASH_STRING: km:0xbe_nt!miraisedirqlfault
  245.  
  246. FAILURE_ID_HASH: {1c5b4d11-09e0-def3-d2d0-70a11d69b92d}
  247.  
  248. Followup: MachineOwner
  249. ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement