Advertisement
Guest User

Untitled

a guest
Oct 23rd, 2018
188
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.33 KB | None | 0 0
  1. Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
  2. Online Crash Dump Analysis Service
  3. See http://www.osronline.com for more information
  4. Windows 8 Kernel Version 17134 MP (8 procs) Free x64
  5. Product: WinNt, suite: TerminalServer SingleUserTS
  6. Built by: 17134.1.amd64fre.rs4_release.180410-1804
  7. Machine Name:
  8. Kernel base = 0xfffff800`ff612000 PsLoadedModuleList = 0xfffff800`ff9c0290
  9. Debug session time: Tue Oct 23 04:57:08.070 2018 (UTC - 4:00)
  10. System Uptime: 0 days 0:25:22.755
  11. *******************************************************************************
  12. * *
  13. * Bugcheck Analysis *
  14. * *
  15. *******************************************************************************
  16.  
  17. IRQL_NOT_LESS_OR_EQUAL (a)
  18. An attempt was made to access a pageable (or completely invalid) address at an
  19. interrupt request level (IRQL) that is too high. This is usually
  20. caused by drivers using improper addresses.
  21. If a kernel debugger is available get the stack backtrace.
  22. Arguments:
  23. Arg1: ffffab8197e79f70, memory referenced
  24. Arg2: 000000000000000e, IRQL
  25. Arg3: 0000000000000000, bitfield :
  26. bit 0 : value 0 = read operation, 1 = write operation
  27. bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
  28. Arg4: fffff800ff694639, address which referenced memory
  29.  
  30. Debugging Details:
  31. ------------------
  32.  
  33. TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
  34.  
  35. READ_ADDRESS: unable to get nt!MmSpecialPoolStart
  36. unable to get nt!MmSpecialPoolEnd
  37. unable to get nt!MmPagedPoolEnd
  38. unable to get nt!MmNonPagedPoolStart
  39. unable to get nt!MmSizeOfNonPagedPoolInBytes
  40. ffffab8197e79f70
  41.  
  42. CURRENT_IRQL: e
  43.  
  44. FAULTING_IP:
  45. nt!KiIpiProcessRequests+1a9
  46. fffff800`ff694639 488b8c24a0000000 mov rcx,qword ptr [rsp+0A0h]
  47.  
  48. CUSTOMER_CRASH_COUNT: 1
  49.  
  50. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  51.  
  52. BUGCHECK_STR: AV
  53.  
  54. PROCESS_NAME: System
  55.  
  56. TRAP_FRAME: ffffab8195e79d40 -- (.trap 0xffffab8195e79d40)
  57. NOTE: The trap frame does not contain all registers.
  58. Some register values may be zeroed or incorrect.
  59. rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
  60. rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
  61. rip=fffff800ff694639 rsp=ffffab8195e79ed0 rbp=fffffb889522fa00
  62. r8=0000000000000000 r9=0000000000000000 r10=ffffab8195e80100
  63. r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
  64. r14=0000000000000000 r15=0000000000000000
  65. iopl=0 nv up ei pl zr na po nc
  66. nt!KiIpiProcessRequests+0x1a9:
  67. fffff800`ff694639 488b8c24a0000000 mov rcx,qword ptr [rsp+0A0h] ss:0018:ffffab81`95e79f70=ffffd2c583948421
  68. Resetting default scope
  69.  
  70. LAST_CONTROL_TRANSFER: from fffff800ff7cc069 to fffff800ff7bb490
  71.  
  72. STACK_TEXT:
  73. ffffab81`95e79bf8 fffff800`ff7cc069 : 00000000`0000000a ffffab81`97e79f70 00000000`0000000e 00000000`00000000 : nt!KeBugCheckEx
  74. ffffab81`95e79c00 fffff800`ff7c8ce5 : 00000000`00000002 00000000`00000000 ffffd2c5`83948641 00000000`00000000 : nt!KiBugCheckDispatch+0x69
  75. ffffab81`95e79d40 fffff800`ff694639 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x425
  76. ffffab81`95e79ed0 fffff800`ff7c20a0 : ffffab81`95e80180 00000000`00000b64 00000000`00000000 ffffd08a`be698440 : nt!KiIpiProcessRequests+0x1a9
  77. ffffab81`95e79fb0 fffff800`ff7c1e08 : ffffd08a`c1da3000 00000000`00000002 fffffb88`9522fb00 00000000`00000001 : nt!KiIpiInterruptSubDispatch+0x80
  78. fffffb88`9522f9d0 fffff800`ff7beba2 : ffffffff`00000000 ffffab81`95e80180 ffffab81`95e90200 ffffd08a`c19a4700 : nt!KiIpiInterrupt+0x2d8
  79. fffffb88`9522fb60 00000000`00000000 : fffffb88`95230000 fffffb88`95229000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x32
  80.  
  81.  
  82. STACK_COMMAND: kb
  83.  
  84. FOLLOWUP_IP:
  85. nt!KiIpiProcessRequests+1a9
  86. fffff800`ff694639 488b8c24a0000000 mov rcx,qword ptr [rsp+0A0h]
  87.  
  88. SYMBOL_STACK_INDEX: 3
  89.  
  90. SYMBOL_NAME: nt!KiIpiProcessRequests+1a9
  91.  
  92. FOLLOWUP_NAME: MachineOwner
  93.  
  94. MODULE_NAME: nt
  95.  
  96. IMAGE_NAME: ntkrnlmp.exe
  97.  
  98. DEBUG_FLR_IMAGE_TIMESTAMP: 5ba316ae
  99.  
  100. FAILURE_BUCKET_ID: X64_AV_nt!KiIpiProcessRequests+1a9
  101.  
  102. BUCKET_ID: X64_AV_nt!KiIpiProcessRequests+1a9
  103.  
  104. Followup: MachineOwner
  105. ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement