Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)Online Crash Dump Analysis Service
See http://www.osronline.com for more information
Windows 8 Kernel Version 10586 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 10586.494.amd64fre.th2_release_sec.160630-1736
Machine Name:
Kernel base = 0xfffff803`dcc86000 PsLoadedModuleList = 0xfffff803`dcf63cf0
Debug session time: Sat Jul 30 19:10:52.621 2016 (UTC - 4:00)
System Uptime: 0 days 0:08:42.331
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: ffffc00156d3a119, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff803dcd4e882, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
OVERLAPPED_MODULE: Address regions for 'peauth' and 'dump_storpor' overlap
READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
ffffc00156d3a119
FAULTING_IP:
nt!SeAccessCheckWithHint+272
fffff803`dcd4e882 410fb64101 movzx eax,byte ptr [r9+1]
MM_INTERNAL_CODE: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
BUGCHECK_STR: AV
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 0
TRAP_FRAME: ffffd000271bd160 -- (.trap 0xffffd000271bd160)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000f5000080 rbx=0000000000000000 rcx=ffffc0005dd56060
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff803dcd4e882 rsp=ffffd000271bd2f0 rbp=ffffd000271bd410
r8=0000000000008000 r9=ffffc00156d3a118 r10=0000000000000001
r11=ffffd000271bd4e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!SeAccessCheckWithHint+0x272:
fffff803`dcd4e882 410fb64101 movzx eax,byte ptr [r9+1] ds:ffffc001`56d3a119=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff803dce0dd3f to fffff803dcdc8940
STACK_TEXT:
ffffd000`271bcf08 fffff803`dce0dd3f : 00000000`00000050 ffffc001`56d3a119 00000000`00000000 ffffd000`271bd160 : nt!KeBugCheckEx
ffffd000`271bcf10 fffff803`dcd23621 : 00000000`00000000 00000000`ffffffff ffffd000`271bd160 ffffd000`271bd150 : nt! ?? ::FNODOBFM::`string'+0x36a3f
ffffd000`271bd000 fffff803`dcdd1bbc : ffffa48a`734ce706 fffff6fb`7dbedc00 00000000`00000000 fffff803`dcf818b8 : nt!MmAccessFault+0x5f1
ffffd000`271bd160 fffff803`dcd4e882 : ffffd000`271bd410 ffffc000`61d3a098 ffffd000`271bd568 00000000`00076080 : nt!KiPageFault+0x13c
ffffd000`271bd2f0 fffff803`dcd4e602 : ffffc000`802c39b0 ffffe001`00000000 ffffd000`271bd4c8 00000000`00000001 : nt!SeAccessCheckWithHint+0x272
ffffd000`271bd4a0 fffff803`dd12a036 : ffffc000`802c3902 00000000`00076080 ffffe001`c7d56b10 fffff803`00000000 : nt!SeAccessCheck+0x62
ffffd000`271bd510 fffff803`dd125f1d : 00000000`ffffffff ffffc000`5c57d258 ffffd000`271bd659 ffffe001`c7d56b10 : nt!CmpCheckKeyBodyAccess+0x176
ffffd000`271bd5b0 fffff803`dd129666 : ffffe001`00000000 ffffd000`0007b070 ffffe001`c7d56b10 00000000`00000001 : nt!CmpDoOpen+0x40d
ffffd000`271bd6a0 fffff803`dd134e32 : fffff803`dcc86000 fffff803`dcc86000 ffffc000`00020000 ffffd000`271bdba0 : nt!CmpParseKey+0x1616
ffffd000`271bd9b0 fffff803`dd1360dc : ffffe001`c7d56b00 ffffd000`271bdba0 ffffc000`00000040 ffffe001`c6119b20 : nt!ObpLookupObjectName+0x992
ffffd000`271bdb30 fffff803`dd0c8986 : 00020019`00000001 ffffe001`c6119b20 00000000`006bcac8 00000000`00000000 : nt!ObOpenObjectByNameEx+0x1ec
ffffd000`271bdc50 fffff803`dd0c86d3 : 00000000`00000000 00000000`00000042 00000000`006bfda0 00000000`6d2d0000 : nt!CmOpenKey+0x2a6
ffffd000`271bde00 fffff803`dcdd31a3 : ffffe001`cb4b6540 ffffd000`00000010 fffff901`41c1d860 00000000`00000000 : nt!NtOpenKeyEx+0xf
ffffd000`271bde40 00007ffe`ea5772b4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`006bca88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7ffe`ea5772b4
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!SeAccessCheckWithHint+272
fffff803`dcd4e882 410fb64101 movzx eax,byte ptr [r9+1]
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: nt!SeAccessCheckWithHint+272
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 5775e2f5
FAILURE_BUCKET_ID: X64_AV_VRF_nt!SeAccessCheckWithHint+272
BUCKET_ID: X64_AV_VRF_nt!SeAccessCheckWithHint+272
Followup: MachineOwner
---------