*****Ignore this dump file, it's the wrong dump, a full dump is posted on my next post****
I put this into open systems resource, to try and analyze my dump file, but i still don't understand, can anyone help me out? I've been having crashing issues (BSOD)
Primary Analysis
Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
Online Crash Dump Analysis Service
See http://www.osronline.com for more information
Windows 8 Kernel Version 10586 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 10586.63.amd64fre.th2_release.160104-1513
Machine Name:
Kernel base = 0xfffff800`7a090000 PsLoadedModuleList = 0xfffff800`7a36ec70
Debug session time: Wed Jan 20 20:21:43.733 2016 (UTC - 5:00)
System Uptime: 0 days 1:23:18.359
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff800d1360058, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8007a108220, address which referenced memory
Debugging Details:
------------------
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
OVERLAPPED_MODULE: Address regions for 'dump_iaStorA' and 'dump_storpor' overlap
READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
fffff800d1360058
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiDispatchException+18
fffff800`7a108220 488b05317e2500 mov rax,qword ptr [nt!_security_cookie (fffff800`7a360058)]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
TRAP_FRAME: ffffd001c99f4330 -- (.trap 0xffffd001c99f4330)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd001c99f4638 rbx=0000000000000000 rcx=ffffd001c99f4638
rdx=ffffd001c99f4500 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8007a108220 rsp=ffffd001c99f44c8 rbp=ffff70055cddd1a0
r8=ffffd001c99f46e0 r9=0000000000000000 r10=0000000000000000
r11=00000000000000c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!KiDispatchException+0x18:
fffff800`7a108220 488b05317e2500 mov rax,qword ptr [nt!_security_cookie (fffff800`7a360058)] ds:fffff800`7a360058=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8007a1dd2e9 to fffff8007a1d2770
STACK_TEXT:
ffffd001`c99f41e8 fffff800`7a1dd2e9 : 00000000`0000000a fffff800`d1360058 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd001`c99f41f0 fffff800`7a1dbac7 : fffff800`68822800 00000000`0007c0c8 fffff800`68822800 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffd001`c99f4330 fffff800`7a108220 : ffffd001`c99de180 00000000`00000000 00000000`000000ff 00000000`00000000 : nt!KiPageFault+0x247
ffffd001`c99f44c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x18
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiDispatchException+18
fffff800`7a108220 488b05317e2500 mov rax,qword ptr [nt!_security_cookie (fffff800`7a360058)]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KiDispatchException+18
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 568b1c58
FAILURE_BUCKET_ID: X64_AV_nt!KiDispatchException+18
BUCKET_ID: X64_AV_nt!KiDispatchException+18
Followup: MachineOwner
---------
I put this into open systems resource, to try and analyze my dump file, but i still don't understand, can anyone help me out? I've been having crashing issues (BSOD)
Primary Analysis
Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
Online Crash Dump Analysis Service
See http://www.osronline.com for more information
Windows 8 Kernel Version 10586 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 10586.63.amd64fre.th2_release.160104-1513
Machine Name:
Kernel base = 0xfffff800`7a090000 PsLoadedModuleList = 0xfffff800`7a36ec70
Debug session time: Wed Jan 20 20:21:43.733 2016 (UTC - 5:00)
System Uptime: 0 days 1:23:18.359
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff800d1360058, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8007a108220, address which referenced memory
Debugging Details:
------------------
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
OVERLAPPED_MODULE: Address regions for 'dump_iaStorA' and 'dump_storpor' overlap
READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
fffff800d1360058
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiDispatchException+18
fffff800`7a108220 488b05317e2500 mov rax,qword ptr [nt!_security_cookie (fffff800`7a360058)]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
TRAP_FRAME: ffffd001c99f4330 -- (.trap 0xffffd001c99f4330)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd001c99f4638 rbx=0000000000000000 rcx=ffffd001c99f4638
rdx=ffffd001c99f4500 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8007a108220 rsp=ffffd001c99f44c8 rbp=ffff70055cddd1a0
r8=ffffd001c99f46e0 r9=0000000000000000 r10=0000000000000000
r11=00000000000000c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!KiDispatchException+0x18:
fffff800`7a108220 488b05317e2500 mov rax,qword ptr [nt!_security_cookie (fffff800`7a360058)] ds:fffff800`7a360058=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8007a1dd2e9 to fffff8007a1d2770
STACK_TEXT:
ffffd001`c99f41e8 fffff800`7a1dd2e9 : 00000000`0000000a fffff800`d1360058 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd001`c99f41f0 fffff800`7a1dbac7 : fffff800`68822800 00000000`0007c0c8 fffff800`68822800 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffd001`c99f4330 fffff800`7a108220 : ffffd001`c99de180 00000000`00000000 00000000`000000ff 00000000`00000000 : nt!KiPageFault+0x247
ffffd001`c99f44c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x18
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiDispatchException+18
fffff800`7a108220 488b05317e2500 mov rax,qword ptr [nt!_security_cookie (fffff800`7a360058)]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KiDispatchException+18
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 568b1c58
FAILURE_BUCKET_ID: X64_AV_nt!KiDispatchException+18
BUCKET_ID: X64_AV_nt!KiDispatchException+18
Followup: MachineOwner
---------