Advertisement
Guest User

blue screen

a guest
Jul 21st, 2017
148
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.73 KB | None | 0 0
  1. Loading Dump File [C:\Users\Sergio\Desktop\072117-29781-01.dmp]
  2. Mini Kernel Dump File: Only registers and stack trace are available
  3.  
  4. Symbol search path is: srv*
  5. Executable search path is:
  6. Windows 10 Kernel Version 10586 MP (8 procs) Free x64
  7. Product: WinNt, suite: TerminalServer SingleUserTS
  8. Built by: 10586.103.amd64fre.th2_release.160126-1819
  9. Machine Name:
  10. Kernel base = 0xfffff802`82076000 PsLoadedModuleList = 0xfffff802`82354cf0
  11. Debug session time: Fri Jul 21 14:56:54.054 2017 (UTC + 2:00)
  12. System Uptime: 0 days 1:45:30.810
  13. Loading Kernel Symbols
  14. .
  15.  
  16. Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
  17. Run !sym noisy before .reload to track down problems loading symbols.
  18.  
  19. ..............................................................
  20. ................................................................
  21. ............................................
  22. Loading User Symbols
  23. Loading unloaded module list
  24. ...............
  25. *******************************************************************************
  26. * *
  27. * Bugcheck Analysis *
  28. * *
  29. *******************************************************************************
  30.  
  31. Use !analyze -v to get detailed debugging information.
  32.  
  33. BugCheck A, {1e4, 2, 0, fffff802820e43ec}
  34.  
  35. Probably caused by : ntkrnlmp.exe ( nt!KiExecuteAllDpcs+29c )
  36.  
  37. Followup: MachineOwner
  38. ---------
  39.  
  40. 2: kd> !analyze -v
  41. *******************************************************************************
  42. * *
  43. * Bugcheck Analysis *
  44. * *
  45. *******************************************************************************
  46.  
  47. IRQL_NOT_LESS_OR_EQUAL (a)
  48. An attempt was made to access a pageable (or completely invalid) address at an
  49. interrupt request level (IRQL) that is too high. This is usually
  50. caused by drivers using improper addresses.
  51. If a kernel debugger is available get the stack backtrace.
  52. Arguments:
  53. Arg1: 00000000000001e4, memory referenced
  54. Arg2: 0000000000000002, IRQL
  55. Arg3: 0000000000000000, bitfield :
  56. bit 0 : value 0 = read operation, 1 = write operation
  57. bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
  58. Arg4: fffff802820e43ec, address which referenced memory
  59.  
  60. Debugging Details:
  61. ------------------
  62.  
  63.  
  64. DUMP_CLASS: 1
  65.  
  66. DUMP_QUALIFIER: 400
  67.  
  68. BUILD_VERSION_STRING: 10.0.10586.103 (th2_release.160126-1819)
  69.  
  70. SYSTEM_PRODUCT_NAME: To Be Filled By O.E.M.
  71.  
  72. SYSTEM_SKU: To Be Filled By O.E.M.
  73.  
  74. SYSTEM_VERSION: To Be Filled By O.E.M.
  75.  
  76. BIOS_VENDOR: American Megatrends Inc.
  77.  
  78. BIOS_VERSION: P2.80
  79.  
  80. BIOS_DATE: 05/31/2016
  81.  
  82. BASEBOARD_MANUFACTURER: ASRock
  83.  
  84. BASEBOARD_PRODUCT: 970 Pro3 R2.0
  85.  
  86. BASEBOARD_VERSION:
  87.  
  88. DUMP_TYPE: 2
  89.  
  90. BUGCHECK_P1: 1e4
  91.  
  92. BUGCHECK_P2: 2
  93.  
  94. BUGCHECK_P3: 0
  95.  
  96. BUGCHECK_P4: fffff802820e43ec
  97.  
  98. READ_ADDRESS: fffff802823f4520: Unable to get MiVisibleState
  99. 00000000000001e4
  100.  
  101. CURRENT_IRQL: 2
  102.  
  103. FAULTING_IP:
  104. nt!KiExecuteAllDpcs+29c
  105. fffff802`820e43ec 453bb3e4010000 cmp r14d,dword ptr [r11+1E4h]
  106.  
  107. CPU_COUNT: 8
  108.  
  109. CPU_MHZ: f97
  110.  
  111. CPU_VENDOR: AuthenticAMD
  112.  
  113. CPU_FAMILY: 15
  114.  
  115. CPU_MODEL: 2
  116.  
  117. CPU_STEPPING: 0
  118.  
  119. CUSTOMER_CRASH_COUNT: 1
  120.  
  121. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  122.  
  123. BUGCHECK_STR: AV
  124.  
  125. PROCESS_NAME: System
  126.  
  127. ANALYSIS_SESSION_HOST: L934054
  128.  
  129. ANALYSIS_SESSION_TIME: 07-21-2017 16:23:00.0717
  130.  
  131. ANALYSIS_VERSION: 10.0.15063.468 amd64fre
  132.  
  133. TRAP_FRAME: ffffd0006dffc730 -- (.trap 0xffffd0006dffc730)
  134. NOTE: The trap frame does not contain all registers.
  135. Some register values may be zeroed or incorrect.
  136. rax=0000000000062eb3 rbx=0000000000000000 rcx=24f4d544209d0000
  137. rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
  138. rip=fffff802820e43ec rsp=ffffd0006dffc8c0 rbp=ffffd0006dffc9c0
  139. r8=0000000000000001 r9=0000000000000000 r10=ffffd0006df7a180
  140. r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
  141. r14=0000000000000000 r15=0000000000000000
  142. iopl=0 nv up ei pl zr na po nc
  143. nt!KiExecuteAllDpcs+0x29c:
  144. fffff802`820e43ec 453bb3e4010000 cmp r14d,dword ptr [r11+1E4h] ds:00000000`000001e4=????????
  145. Resetting default scope
  146.  
  147. LAST_CONTROL_TRANSFER: from fffff802821c2fe9 to fffff802821b8480
  148.  
  149. STACK_TEXT:
  150. ffffd000`6dffc5e8 fffff802`821c2fe9 : 00000000`0000000a 00000000`000001e4 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
  151. ffffd000`6dffc5f0 fffff802`821c17c7 : 75af1625`2c7df594 ffffe001`0000005d 00000000`00000002 ffffe001`7417eea8 : nt!KiBugCheckDispatch+0x69
  152. ffffd000`6dffc730 fffff802`820e43ec : ffffd000`6dffcb20 ffffd000`6df7a180 ffffe001`75831320 ffffe001`74260f44 : nt!KiPageFault+0x247
  153. ffffd000`6dffc8c0 fffff802`820e3ad9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x29c
  154. ffffd000`6dffca10 fffff802`821bb23a : ffffffff`00000000 ffffd000`6df7a180 ffffd000`6df86cc0 ffffe001`73bf2840 : nt!KiRetireDpcList+0xe9
  155. ffffd000`6dffcc60 00000000`00000000 : ffffd000`6dffd000 ffffd000`6dff7000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
  156.  
  157.  
  158. STACK_COMMAND: kb
  159.  
  160. THREAD_SHA1_HASH_MOD_FUNC: 08147b47469579b607a5d7d9344a6795c211d870
  161.  
  162. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: ec13776148230090081086c4d1dcf7030f5273f3
  163.  
  164. THREAD_SHA1_HASH_MOD: ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693
  165.  
  166. FOLLOWUP_IP:
  167. nt!KiExecuteAllDpcs+29c
  168. fffff802`820e43ec 453bb3e4010000 cmp r14d,dword ptr [r11+1E4h]
  169.  
  170. FAULT_INSTR_CODE: e4b33b45
  171.  
  172. SYMBOL_STACK_INDEX: 3
  173.  
  174. SYMBOL_NAME: nt!KiExecuteAllDpcs+29c
  175.  
  176. FOLLOWUP_NAME: MachineOwner
  177.  
  178. MODULE_NAME: nt
  179.  
  180. IMAGE_NAME: ntkrnlmp.exe
  181.  
  182. DEBUG_FLR_IMAGE_TIMESTAMP: 56a849a9
  183.  
  184. IMAGE_VERSION: 10.0.10586.103
  185.  
  186. BUCKET_ID_FUNC_OFFSET: 29c
  187.  
  188. FAILURE_BUCKET_ID: AV_nt!KiExecuteAllDpcs
  189.  
  190. BUCKET_ID: AV_nt!KiExecuteAllDpcs
  191.  
  192. PRIMARY_PROBLEM_CLASS: AV_nt!KiExecuteAllDpcs
  193.  
  194. TARGET_TIME: 2017-07-21T12:56:54.000Z
  195.  
  196. OSBUILD: 10586
  197.  
  198. OSSERVICEPACK: 103
  199.  
  200. SERVICEPACK_NUMBER: 0
  201.  
  202. OS_REVISION: 0
  203.  
  204. SUITE_MASK: 272
  205.  
  206. PRODUCT_TYPE: 1
  207.  
  208. OSPLATFORM_TYPE: x64
  209.  
  210. OSNAME: Windows 10
  211.  
  212. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
  213.  
  214. OS_LOCALE:
  215.  
  216. USER_LCID: 0
  217.  
  218. OSBUILD_TIMESTAMP: 2016-01-27 05:38:01
  219.  
  220. BUILDDATESTAMP_STR: 160126-1819
  221.  
  222. BUILDLAB_STR: th2_release
  223.  
  224. BUILDOSVER_STR: 10.0.10586.103
  225.  
  226. ANALYSIS_SESSION_ELAPSED_TIME: f26
  227.  
  228. ANALYSIS_SOURCE: KM
  229.  
  230. FAILURE_ID_HASH_STRING: km:av_nt!kiexecutealldpcs
  231.  
  232. FAILURE_ID_HASH: {b88a28a0-fcde-99e9-6174-619833d00ab9}
  233.  
  234. Followup: MachineOwner
  235. ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement