Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 10.0.17134.12 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Windows\MEMORY.DMP]
- Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
- Symbol search path is: srv*
- Executable search path is:
- Windows 10 Kernel Version 17134 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 17134.1.amd64fre.rs4_release.180410-1804
- Machine Name:
- Kernel base = 0xfffff801`c5a0d000 PsLoadedModuleList = 0xfffff801`c5dbb170
- Debug session time: Sat Sep 1 18:45:10.815 2018 (UTC - 3:00)
- System Uptime: 1 days 5:36:05.800
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- ............................................................
- Loading User Symbols
- PEB is paged out (Peb.Ldr = 0000005b`dfd84018). Type ".hh dbgerr001" for details
- Loading unloaded module list
- ................
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- Use !analyze -v to get detailed debugging information.
- BugCheck BE, {ffffe000be82e380, 1a000003230d8025, ffffca87a59b0060, a}
- Probably caused by : memory_corruption ( nt!MiRaisedIrqlFault+e5a55 )
- Followup: MachineOwner
- ---------
- 0: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
- An attempt was made to write to readonly memory. The guilty driver is on the
- stack trace (and is typically the current instruction pointer).
- When possible, the guilty driver's name (Unicode string) is printed on
- the bugcheck screen and saved in KiBugCheckDriver.
- Arguments:
- Arg1: ffffe000be82e380, Virtual address for the attempted write.
- Arg2: 1a000003230d8025, PTE contents.
- Arg3: ffffca87a59b0060, (reserved)
- Arg4: 000000000000000a, (reserved)
- Debugging Details:
- ------------------
- KEY_VALUES_STRING: 1
- TIMELINE_ANALYSIS: 1
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 401
- BUILD_VERSION_STRING: 17134.1.amd64fre.rs4_release.180410-1804
- SYSTEM_MANUFACTURER: ASUS
- SYSTEM_PRODUCT_NAME: All Series
- SYSTEM_SKU: All
- SYSTEM_VERSION: System Version
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: 0802
- BIOS_DATE: 12/07/2015
- BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
- BASEBOARD_PRODUCT: Z97-E
- BASEBOARD_VERSION: Rev X.0x
- DUMP_TYPE: 1
- BUGCHECK_P1: ffffe000be82e380
- BUGCHECK_P2: 1a000003230d8025
- BUGCHECK_P3: ffffca87a59b0060
- BUGCHECK_P4: a
- CPU_COUNT: 8
- CPU_MHZ: f9e
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 3c
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 22'00000000 (cache) 22'00000000 (init)
- BLACKBOXBSD: 1 (!blackboxbsd)
- BLACKBOXPNP: 1 (!blackboxpnp)
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- BUGCHECK_STR: 0xBE
- PROCESS_NAME: reg.exe
- CURRENT_IRQL: 2
- ANALYSIS_SESSION_HOST: DESKTOP-R92QV4T
- ANALYSIS_SESSION_TIME: 09-01-2018 20:24:42.0217
- ANALYSIS_VERSION: 10.0.17134.12 amd64fre
- TRAP_FRAME: ffffca87a59b06d0 -- (.trap 0xffffca87a59b06d0)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=0000000000000004 rbx=0000000000000000 rcx=0000017d05c70020
- rdx=ffffa38bfa1c7000 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff801c5bc776f rsp=ffffca87a59b0868 rbp=ffffa508ffe37000
- r8=000000000000001c r9=00000000000000e5 r10=ffffa508fdb1e080
- r11=0000017d05c70000 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl nz na pe nc
- nt!memcpy+0xaf:
- fffff801`c5bc776f 660f7f41e0 movdqa xmmword ptr [rcx-20h],xmm0 ds:0000017d`05c70000=????????????????????????????????
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff801c5c0eadd to fffff801c5bb5ca0
- STACK_TEXT:
- ffffca87`a59afea8 fffff801`c5c0eadd : 00000000`000000be ffffe000`be82e380 1a000003`230d8025 ffffca87`a59b0060 : nt!KeBugCheckEx
- ffffca87`a59afeb0 fffff801`c5a76f86 : 00000000`00000003 1a000003`230d8025 ffffca87`a59afff0 00000000`00000000 : nt!MiRaisedIrqlFault+0xe5a55
- ffffca87`a59afef0 fffff801`c5bc33da : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x3f6
- ffffca87`a59b0060 fffff801`c5a70003 : 00000000`00000002 00000000`00000000 00000000`00000001 000000ff`00000000 : nt!KiPageFault+0x31a
- ffffca87`a59b01f0 fffff801`c5a73134 : ffffca87`a59b04a0 ffff8300`01f798b0 00000000`00000001 ffffa508`fdb1e580 : nt!MiCompletePrivateZeroFault+0x463
- ffffca87`a59b0310 fffff801`c5a78316 : df5e607f`00000000 ffffa508`00000000 ffffffff`ffffffff 0000017d`05c70000 : nt!MiResolvePrivateZeroFault+0x154
- ffffca87`a59b0430 fffff801`c5a76caf : ffffca87`a59b0590 00000000`00000000 ffffa508`fdb1e080 a5090316`00000000 : nt!MiUserFault+0x1236
- ffffca87`a59b0560 fffff801`c5bc33da : ffffca87`a59b0ce0 ffffa509`01fa9080 00000000`00000000 00000000`00001cbc : nt!MmAccessFault+0x11f
- ffffca87`a59b06d0 fffff801`c5bc776f : fffff801`c5f0de35 ffffca87`a59b1040 ffffa508`fdb1e080 ffffca87`a59b1040 : nt!KiPageFault+0x31a
- ffffca87`a59b0868 fffff801`c5f0de35 : ffffca87`a59b1040 ffffa508`fdb1e080 ffffca87`a59b1040 fffff801`c5f8d53b : nt!memcpy+0xaf
- ffffca87`a59b0870 fffff801`c5f0d7ff : ffffa509`01fa9080 ffffa508`fdb1e001 00000000`00000004 ffffa508`fdb1e080 : nt!PspCopyAndFixupParameters+0xf5
- ffffca87`a59b0900 fffff801`c5f10f93 : 00000000`000022aa ffffca87`a59b1b80 00000000`000022a0 00000000`00000000 : nt!PspSetupUserProcessAddressSpace+0x13f
- ffffca87`a59b09b0 fffff801`c5ef55b1 : 00000000`a4440700 ffffca87`a59b1b80 00000000`00000000 00000000`00000000 : nt!PspAllocateProcess+0xf9f
- ffffca87`a59b0e50 fffff801`c5bc6343 : 00000000`00000002 00000000`00000000 00000000`00000000 00000000`00000001 : nt!NtCreateUserProcess+0x719
- ffffca87`a59b1a90 00007ffb`a7d7b6e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
- 00000045`03cfe4f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`a7d7b6e4
- THREAD_SHA1_HASH_MOD_FUNC: b93bba80c3eeb5804a5323be612dafd6422cfa9b
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 9fafc0fd95b56c6d34e6cf05c80b0f7f6a547d0e
- THREAD_SHA1_HASH_MOD: 38bc5fec3f0409c265cf5c87da6f8f8859d0711c
- FOLLOWUP_IP:
- nt!MiRaisedIrqlFault+e5a55
- fffff801`c5c0eadd cc int 3
- FAULT_INSTR_CODE: 2c8440cc
- SYMBOL_STACK_INDEX: 1
- SYMBOL_NAME: nt!MiRaisedIrqlFault+e5a55
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: nt
- DEBUG_FLR_IMAGE_TIMESTAMP: 5b63c7b5
- STACK_COMMAND: .thread ; .cxr ; kb
- IMAGE_NAME: memory_corruption
- BUCKET_ID_FUNC_OFFSET: e5a55
- FAILURE_BUCKET_ID: 0xBE_nt!MiRaisedIrqlFault
- BUCKET_ID: 0xBE_nt!MiRaisedIrqlFault
- PRIMARY_PROBLEM_CLASS: 0xBE_nt!MiRaisedIrqlFault
- TARGET_TIME: 2018-09-01T21:45:10.000Z
- OSBUILD: 17134
- OSSERVICEPACK: 0
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
- OS_LOCALE:
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2018-08-03 00:10:45
- BUILDDATESTAMP_STR: 180410-1804
- BUILDLAB_STR: rs4_release
- BUILDOSVER_STR: 10.0.17134.1.amd64fre.rs4_release.180410-1804
- ANALYSIS_SESSION_ELAPSED_TIME: b46
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:0xbe_nt!miraisedirqlfault
- FAILURE_ID_HASH: {1c5b4d11-09e0-def3-d2d0-70a11d69b92d}
- Followup: MachineOwner
- ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement