Advertisement
Guest User

Untitled

a guest
Aug 2nd, 2017
203
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 45.39 KB | None | 0 0
  1. Microsoft (R) Windows Debugger Version 10.0.14321.1024 X86
  2. Copyright (c) Microsoft Corporation. All rights reserved.
  3.  
  4. Auto Dump Analyzer by gardenman
  5. Time to debug file(s): 00 hours and 07 minutes and 10 seconds
  6.  
  7. ========================================================================
  8. =================== Dump File: 080217-6718-01.dmp ====================
  9. ========================================================================
  10. Mini Kernel Dump File: Only registers and stack trace are available
  11. Windows 10 Kernel Version 15063 MP (4 procs) Free x64
  12. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  13. Built by: 15063.0.amd64fre.rs2_release.170317-1834
  14. Kernel base = 0xfffff800`9f001000 PsLoadedModuleList = 0xfffff800`9f34d5e0
  15. Debug session time: Wed Aug 2 07:48:52.042 2017 (UTC - 4:00)
  16. System Uptime: 0 days 0:56:24.715
  17.  
  18. BugCheck 12B, {ffffffffc00002c4, d6b, 1ed6c1b0, ffffbb810028d000}
  19. *** WARNING: Unable to verify timestamp for win32k.sys
  20. *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
  21. Probably caused by : memory_corruption
  22. Followup: memory_corruption
  23.  
  24. FAULTY_HARDWARE_CORRUPTED_PAGE (12b)
  25. This bugcheck indicates that a single bit error was found in this page. This is a hardware memory error.
  26.  
  27. Arguments:
  28. Arg1: ffffffffc00002c4, virtual address mapping the corrupted page
  29. Arg2: 0000000000000d6b, physical page number
  30. Arg3: 000000001ed6c1b0, zero
  31. Arg4: ffffbb810028d000, zero
  32.  
  33. Debugging Details:
  34. DUMP_CLASS: 1
  35. DUMP_QUALIFIER: 400
  36. BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
  37. BIOS_VENDOR: American Megatrends Inc.
  38. BIOS_VERSION: P2.60
  39. BIOS_DATE: 12/11/2015
  40. BASEBOARD_MANUFACTURER: ASRock
  41. BASEBOARD_PRODUCT: FM2A88X+ Killer
  42. BASEBOARD_VERSION:
  43. DUMP_TYPE: 2
  44. BUGCHECK_STR: 0x12B_c00002c4_StCtDecompressFailed
  45. CPU_COUNT: 4
  46. CPU_MHZ: f99
  47. CPU_VENDOR: AuthenticAMD
  48. CPU_FAMILY: 15
  49. CPU_MODEL: 30
  50. CPU_STEPPING: 1
  51. CUSTOMER_CRASH_COUNT: 1
  52. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  53.  
  54. PROCESS_NAME: MemCompression
  55.  
  56. CURRENT_IRQL: 0
  57. LAST_CONTROL_TRANSFER: from fffff8009f249b87 to fffff8009f16d4c0
  58. STACK_TEXT:
  59. ffffbb80`fe0f2208 fffff800`9f249b87 : 00000000`0000012b ffffffff`c00002c4 00000000`00000d6b 00000000`1ed6c1b0 : nt!KeBugCheckEx
  60. ffffbb80`fe0f2210 fffff800`9f1b879d : 00000000`00000200 00000000`00000003 00000000`1ed6c1b0 ffffbb81`0028d000 : nt!ST_STORE<SM_TRAITS>::StDmPageError+0x117
  61. ffffbb80`fe0f2260 fffff800`9f0da84f : 00000000`00000000 ffffbb80`fe0f2478 00000000`00000000 00000000`00000f08 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0xddf19
  62. ffffbb80`fe0f2340 fffff800`9f0da23b : 00000000`00000001 00000000`0001c1b0 00000000`0001c1b0 00000000`00002000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0x7b
  63. ffffbb80`fe0f2390 fffff800`9f0da05e : ffffbb80`ffffffff ffffe30d`6b6fc000 ffffbb80`fe0f2478 ffffe30d`6a760060 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x183
  64. ffffbb80`fe0f2430 fffff800`9f0dbc7f : ffffe30d`6a760060 fffff800`00000000 00000000`00000001 ffffe30d`6a760060 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0xea
  65. ffffbb80`fe0f24f0 fffff800`9f12af81 : ffffe30d`5f258000 ffffbb80`fe0f2600 fffff800`9f12af60 ffffbb80`fe0f2600 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x6f
  66. ffffbb80`fe0f2540 fffff800`9f01720b : ffffe30d`6897f7c0 ffffbb80`fe0f2600 00000000`00000002 fffff800`9f0d26d0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21
  67. ffffbb80`fe0f2570 fffff800`9f0d2625 : 00000000`00000003 ffffe30d`6b6fc000 ffffe30d`5f258000 ffffe30d`6a760060 : nt!KeExpandKernelStackAndCalloutInternal+0x8b
  68. ffffbb80`fe0f25c0 fffff800`9f0c8cc2 : ffffbb80`fe0f26c0 fffff800`9f3f7a00 00000000`00000000 fffff800`9f0dcdc0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xad
  69. ffffbb80`fe0f2690 fffff800`9f0c8522 : 00000000`00000000 00000000`00000000 ffffbb80`fe0f2740 ffffe30d`6a760060 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x1ae
  70. ffffbb80`fe0f26e0 fffff800`9f0dcafa : 00000000`0000000c 00000000`00000002 ffffe30d`6a760060 ffffe30d`675755e0 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0xce
  71. ffffbb80`fe0f2760 fffff800`9f1196ea : ffffe30d`00000002 ffffe30d`67575690 ffff9801`00000000 ffffe30d`5f258000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x16a
  72. ffffbb80`fe0f27d0 fffff800`9f0a2fa9 : 00000000`00000004 ffffe30d`67575590 00000000`00000000 ffff9300`00f7f0e0 : nt!SmPageRead+0x2e
  73. ffffbb80`fe0f2820 fffff800`9f0a2970 : 00000000`00000002 ffffbb80`fe0f28b0 00000000`00000000 ffffe30d`67575590 : nt!MiIssueHardFaultIo+0x11d
  74. ffffbb80`fe0f2870 fffff800`9f08e486 : 00000000`c0033333 ffffbb80`fe0f2b00 00000000`00000000 0000026c`00000000 : nt!MiIssueHardFault+0x190
  75. ffffbb80`fe0f2910 fffff800`9f176d72 : ffffe30d`6897f7c0 ffffbb80`fe0f2b80 ffffffff`ffff3cb0 00007ff8`26f60000 : nt!MmAccessFault+0xc96
  76. ffffbb80`fe0f2b00 00007ff8`270125dd : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x132
  77. 00000073`ed04f820 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`270125dd
  78. STACK_COMMAND: kb
  79. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  80. fffff8009f08e54c-fffff8009f08e54d 2 bytes - nt!MmAccessFault+d5c
  81. [ ff f6:7f 98 ]
  82. fffff8009f0a2a12-fffff8009f0a2a13 2 bytes - nt!MiIssueHardFault+232 (+0x144c6)
  83. [ 80 f6:00 98 ]
  84. 4 errors : !nt (fffff8009f08e54c-fffff8009f0a2a13)
  85. MODULE_NAME: memory_corruption
  86.  
  87. IMAGE_NAME: memory_corruption
  88.  
  89. FOLLOWUP_NAME: memory_corruption
  90. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  91. MEMORY_CORRUPTOR: LARGE
  92. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  93. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  94. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  95. TARGET_TIME: 2017-08-02T11:48:52.000Z
  96. OSBUILD: 15063
  97. OSSERVICEPACK: 483
  98. SERVICEPACK_NUMBER: 0
  99. OS_REVISION: 0
  100. SUITE_MASK: 784
  101. PRODUCT_TYPE: 1
  102. OSPLATFORM_TYPE: x64
  103. OSNAME: Windows 10
  104. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  105. USER_LCID: 0
  106. OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
  107. BUILDDATESTAMP_STR: 160101.0800
  108. BUILDLAB_STR: WinBuild
  109. BUILDOSVER_STR: 10.0.15063.483
  110. ANALYSIS_SESSION_ELAPSED_TIME: 2a02
  111. ANALYSIS_SOURCE: KM
  112. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  113. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  114. Followup: memory_corruption
  115.  
  116. ========================================================================
  117. ============================== Drivers ===============================
  118. ========================================================================
  119. Image path: \??\C:\Program Files (x86)\Common Files\BattlEye\BEDaisy.sys
  120. Image name: BEDaisy.sys
  121. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=BEDaisy.sys
  122. Timestamp: Tue Jan 10 2017
  123.  
  124. Image path: \SystemRoot\system32\mcupdate_AuthenticAMD.dll
  125. Image name: mcupdate_AuthenticAMD.dll
  126. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=mcupdate_AuthenticAMD.dll
  127. Timestamp: Tue Jan 31 1978
  128.  
  129. Image path: \SystemRoot\System32\DriverStore\FileRepository\c0316467.inf_amd64_3d8fbd78102e53d7\atikmpag.sys
  130. Image name: atikmpag.sys
  131. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=atikmpag.sys
  132. Timestamp: Thu Jul 20 2017
  133.  
  134. Image path: \SystemRoot\System32\Drivers\SmartDefragDriver.sys
  135. Image name: SmartDefragDriver.sys
  136. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=SmartDefragDriver.sys
  137. Timestamp: Mon Dec 23 2013
  138.  
  139. Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{FF7E1326-8A6D-4BD3-8B38-AB56BEB0C921}\MpKslfacc0225.sys
  140. Image name: MpKslfacc0225.sys
  141. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=MpKslfacc0225.sys
  142. Timestamp: Tue May 19 2015
  143.  
  144. Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{6D8E6A8E-546E-44D4-BFE6-16195EBA654E}\MpKsleac2ef90.sys
  145. Image name: MpKsleac2ef90.sys
  146. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=MpKsleac2ef90.sys
  147. Timestamp: Tue May 19 2015
  148.  
  149. Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{FF7E1326-8A6D-4BD3-8B38-AB56BEB0C921}\MpKsl8d63bc79.sys
  150. Image name: MpKsl8d63bc79.sys
  151. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=MpKsl8d63bc79.sys
  152. Timestamp: Tue May 19 2015
  153.  
  154. Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{E62B9E7A-0916-480A-B2E1-AAFC6A9882E9}\MpKsl7c2a0a9c.sys
  155. Image name: MpKsl7c2a0a9c.sys
  156. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=MpKsl7c2a0a9c.sys
  157. Timestamp: Tue May 19 2015
  158.  
  159. Image path: \??\C:\Windows\SysWOW64\drivers\HWiNFO64A.SYS
  160. Image name: HWiNFO64A.SYS
  161. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=HWiNFO64A.SYS
  162. Timestamp: Tue Mar 31 2015
  163.  
  164. Image path: \SystemRoot\system32\DRIVERS\AsrAppCharger.sys
  165. Image name: AsrAppCharger.sys
  166. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=AsrAppCharger.sys
  167. Timestamp: Tue May 10 2011
  168.  
  169. Image path: \SystemRoot\System32\drivers\rtwlanu.sys
  170. Image name: rtwlanu.sys
  171. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=rtwlanu.sys
  172. Timestamp: Wed Apr 5 2017
  173.  
  174. Image path: \??\C:\WINDOWS\SysWOW64\Drivers\AsrAutoChkUpdDrv.sys
  175. Image name: AsrAutoChkUpdDrv.sys
  176. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=AsrAutoChkUpdDrv.sys
  177. Timestamp: Mon Mar 10 2014
  178.  
  179. Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{D595AE9D-5FB5-4BD7-9F24-D556ED09E50D}\MpKsl8ba4c6ed.sys
  180. Image name: MpKsl8ba4c6ed.sys
  181. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=MpKsl8ba4c6ed.sys
  182. Timestamp: Tue May 19 2015
  183.  
  184. Image path: \??\C:\Windows\system32\drivers\rzpmgrk.sys
  185. Image name: rzpmgrk.sys
  186. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=rzpmgrk.sys
  187. Timestamp: Thu Sep 17 2015
  188.  
  189. Image path: \??\C:\Windows\system32\drivers\rzpnk.sys
  190. Image name: rzpnk.sys
  191. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=rzpnk.sys
  192. Possible Driver Info: Razer Overlay Support https://www.razerzone.com/
  193. Timestamp: Wed Sep 16 2015
  194.  
  195. Image path: \??\C:\WINDOWS\SysWOW64\Drivers\AsrDrv101.sys
  196. Image name: AsrDrv101.sys
  197. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=AsrDrv101.sys
  198. Timestamp: Tue Jan 15 2013
  199.  
  200. Image path: \SystemRoot\System32\drivers\rzendpt.sys
  201. Image name: rzendpt.sys
  202. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=rzendpt.sys
  203. Timestamp: Tue Aug 11 2015
  204.  
  205. Image path: \SystemRoot\System32\drivers\rzmpos.sys
  206. Image name: rzmpos.sys
  207. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=rzmpos.sys
  208. Timestamp: Tue Aug 11 2015
  209.  
  210. Image path: \SystemRoot\System32\drivers\rzudd.sys
  211. Image name: rzudd.sys
  212. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=rzudd.sys
  213. Timestamp: Tue Aug 11 2015
  214.  
  215. Image path: \SystemRoot\system32\drivers\RTKVHD64.sys
  216. Image name: RTKVHD64.sys
  217. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=RTKVHD64.sys
  218. Timestamp: Thu Jan 5 2017
  219.  
  220. Image path: \SystemRoot\System32\drivers\asmthub3.sys
  221. Image name: asmthub3.sys
  222. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=asmthub3.sys
  223. Timestamp: Fri Oct 7 2016
  224.  
  225. Image path: \SystemRoot\system32\DRIVERS\asmtxhci.sys
  226. Image name: asmtxhci.sys
  227. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=asmtxhci.sys
  228. Timestamp: Fri Oct 7 2016
  229.  
  230. Image path: \SystemRoot\System32\drivers\e2xw10x64.sys
  231. Image name: e2xw10x64.sys
  232. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=e2xw10x64.sys
  233. Timestamp: Wed Sep 14 2016
  234.  
  235. Image path: \SystemRoot\system32\drivers\AtihdWT6.sys
  236. Image name: AtihdWT6.sys
  237. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=AtihdWT6.sys
  238. Timestamp: Thu Dec 8 2016
  239.  
  240. Image path: \SystemRoot\System32\DriverStore\FileRepository\c0316467.inf_amd64_3d8fbd78102e53d7\atikmdag.sys
  241. Image name: atikmdag.sys
  242. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=atikmdag.sys
  243. Timestamp: Thu Jul 20 2017
  244.  
  245. Image path: \SystemRoot\System32\win32kfull.sys
  246. Image name: win32kfull.sys
  247. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=win32kfull.sys
  248. Timestamp: unavailable (00000000)
  249.  
  250. Image path: \SystemRoot\System32\win32kbase.sys
  251. Image name: win32kbase.sys
  252. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=win32kbase.sys
  253. Timestamp: unavailable (00000000)
  254.  
  255. Unloaded modules:
  256. fffff802`e61b0000 fffff802`e61bb000 cldflt.sys
  257. fffff802`e46e0000 fffff802`e46ef000 dump_ataport
  258. fffff802`e4700000 fffff802`e470c000 dump_atapi.s
  259. fffff802`e4730000 fffff802`e474d000 dump_dumpfve
  260. fffff802`e7b30000 fffff802`e7b3a000 amdkmafd.sys
  261. fffff802`ea5e0000 fffff802`ea5ea000 amdkmafd.sys
  262. fffff802`e4dd0000 fffff802`e4df0000 dam.sys
  263. fffff802`e3820000 fffff802`e382f000 WdBoot.sys
  264. fffff802`e45f0000 fffff802`e45ff000 hwpolicy.sys
  265.  
  266. ========================================================================
  267. ============================== BIOS INFO =============================
  268. ========================================================================
  269. [SMBIOS Data Tables v2.8]
  270. [DMI Version - 0]
  271. [2.0 Calling Convention - No]
  272. [Table Size - 1524 bytes]
  273. [BIOS Information (Type 0) - Length 24 - Handle 0000h]
  274. Vendor American Megatrends Inc.
  275. BIOS Version P2.60
  276. BIOS Starting Address Segment f000
  277. BIOS Release Date 12/11/2015
  278. BIOS ROM Size 800000
  279. BIOS Characteristics
  280. 07: - PCI Supported
  281. 11: - Upgradeable FLASH BIOS
  282. 12: - BIOS Shadowing Supported
  283. 15: - CD-Boot Supported
  284. 16: - Selectable Boot Supported
  285. 17: - BIOS ROM Socketed
  286. 19: - EDD Supported
  287. 23: - 1.2MB Floppy Supported
  288. 24: - 720KB Floppy Supported
  289. 25: - 2.88MB Floppy Supported
  290. 26: - Print Screen Device Supported
  291. 27: - Keyboard Services Supported
  292. 28: - Serial Services Supported
  293. 29: - Printer Services Supported
  294. 32: - BIOS Vendor Reserved
  295. BIOS Characteristic Extensions
  296. 00: - ACPI Supported
  297. 01: - USB Legacy Supported
  298. 08: - BIOS Boot Specification Supported
  299. 10: - Specification Reserved
  300. 11: - Specification Reserved
  301. BIOS Major Revision 4
  302. BIOS Minor Revision 6
  303. EC Firmware Major Revision 255
  304. EC Firmware Minor Revision 255
  305. [System Information (Type 1) - Length 27 - Handle 0001h]
  306. UUID 00000000-0000-0000-0000-000000000000
  307. Wakeup Type Power Switch
  308. [BaseBoard Information (Type 2) - Length 15 - Handle 0002h]
  309. Manufacturer ASRock
  310. Product FM2A88X+ Killer
  311. Version
  312. Feature Flags 09h
  313. 1591878152: - ?ÿU?ì?ì¡H.õ^3Å?Eü3ÀW?}?Eô?Eø?ÿu
  314. ¸@
  315. 1591878192: - ?ÿU?ì?ì¡H.õ^3Å?Eü3ÀW?}?Eô?Eø?ÿu
  316. ¸@
  317. Location
  318. Chassis Handle 0003h
  319. Board Type 0ah - Processor/Memory Module
  320. Number of Child Handles 0
  321. [System Enclosure (Type 3) - Length 22 - Handle 0003h]
  322. Chassis Type Desktop
  323. Bootup State Safe
  324. Power Supply State Safe
  325. Thermal State Safe
  326. Security Status None
  327. OEM Defined 0
  328. Height 0U
  329. Number of Power Cords 1
  330. Number of Contained Elements 0
  331. Contained Element Size 3
  332. [OEM Strings (Type 11) - Length 5 - Handle 000bh]
  333. Number of Strings 1
  334. [Cache Information (Type 7) - Length 19 - Handle 000ch]
  335. Socket Designation L1 CACHE
  336. Cache Configuration 0180h - WB Enabled Int NonSocketed L1
  337. Maximum Cache Size 0100h - 256K
  338. Installed Size 0100h - 256K
  339. Supported SRAM Type 0010h - Pipeline-Burst
  340. Current SRAM Type 0010h - Pipeline-Burst
  341. Cache Speed 1ns
  342. Error Correction Type Specification Reserved
  343. System Cache Type Unified
  344. Associativity 2-way Set-Associative
  345. [Cache Information (Type 7) - Length 19 - Handle 000dh]
  346. Socket Designation L2 CACHE
  347. Cache Configuration 0181h - WB Enabled Int NonSocketed L2
  348. Maximum Cache Size 1000h - 4096K
  349. Installed Size 1000h - 4096K
  350. Supported SRAM Type 0010h - Pipeline-Burst
  351. Current SRAM Type 0010h - Pipeline-Burst
  352. Cache Speed 1ns
  353. Error Correction Type Specification Reserved
  354. System Cache Type Unified
  355. Associativity 16-way Set-Associative
  356. [Physical Memory Array (Type 16) - Length 23 - Handle 0018h]
  357. Location 03h - SystemBoard/Motherboard
  358. Use 03h - System Memory
  359. Memory Error Correction 03h - None
  360. Maximum Capacity 8388608KB
  361. Number of Memory Devices 4
  362. [Memory Array Mapped Address (Type 19) - Length 31 - Handle 0019h]
  363. Starting Address 00000000h
  364. Ending Address 007fffffh
  365. Memory Array Handle 0018h
  366. Partition Width 255
  367. [Memory Device (Type 17) - Length 40 - Handle 001ah]
  368. Physical Memory Array Handle 0018h
  369. Total Width 64 bits
  370. Data Width 64 bits
  371. Form Factor 0dh - SODIMM
  372. Device Locator DIMM 0
  373. Bank Locator CHANNEL A
  374. Memory Type 18h - Specification Reserved
  375. Type Detail 0000h -
  376. Speed 0MHz
  377. Manufacturer A1_Manufacturer0
  378. Part Number A1_PartNum0
  379. [Memory Device (Type 17) - Length 40 - Handle 001bh]
  380. Physical Memory Array Handle 0018h
  381. Total Width 64 bits
  382. Data Width 64 bits
  383. Size 4096MB
  384. Form Factor 09h - DIMM
  385. Device Locator DIMM 1
  386. Bank Locator CHANNEL A
  387. Memory Type 18h - Specification Reserved
  388. Type Detail 4080h - Synchronous
  389. Speed 1600MHz
  390. Manufacturer [String Not Found]
  391. [Memory Device (Type 17) - Length 40 - Handle 001ch]
  392. Physical Memory Array Handle 0018h
  393. Total Width 64 bits
  394. Data Width 64 bits
  395. Form Factor 0dh - SODIMM
  396. Device Locator DIMM 0
  397. Bank Locator CHANNEL B
  398. Memory Type 18h - Specification Reserved
  399. Type Detail 0000h -
  400. Speed 0MHz
  401. Manufacturer A1_Manufacturer2
  402. Part Number A1_PartNum2
  403. [Memory Device (Type 17) - Length 40 - Handle 001dh]
  404. Physical Memory Array Handle 0018h
  405. Total Width 64 bits
  406. Data Width 64 bits
  407. Size 4096MB
  408. Form Factor 09h - DIMM
  409. Device Locator DIMM 1
  410. Bank Locator CHANNEL B
  411. Memory Type 18h - Specification Reserved
  412. Type Detail 4080h - Synchronous
  413. Speed 1600MHz
  414. Manufacturer [String Not Found]
  415. [Memory Device Mapped Address (Type 20) - Length 35 - Handle 001eh]
  416. Starting Address 00000000h
  417. Ending Address 00000000h
  418. Memory Device Handle 0000h
  419. Mem Array Mapped Adr Handle 0000h
  420. Partition Row Position [Reserved]
  421. Interleave Position [None]
  422. Interleave Data Depth [None]
  423. [Memory Device Mapped Address (Type 20) - Length 35 - Handle 001fh]
  424. Starting Address 00000000h
  425. Ending Address 003fffffh
  426. Memory Device Handle 001bh
  427. Mem Array Mapped Adr Handle 0019h
  428. [Memory Device Mapped Address (Type 20) - Length 35 - Handle 0020h]
  429. Starting Address 00000000h
  430. Ending Address 00000000h
  431. Memory Device Handle 0000h
  432. Mem Array Mapped Adr Handle 0000h
  433. Partition Row Position [Reserved]
  434. Interleave Position [None]
  435. Interleave Data Depth [None]
  436. [Memory Device Mapped Address (Type 20) - Length 35 - Handle 0021h]
  437. Starting Address 00400000h
  438. Ending Address 007fffffh
  439. Memory Device Handle 001bh
  440. Mem Array Mapped Adr Handle 0019h
  441. [Processor Information (Type 4) - Length 42 - Handle 0024h]
  442. Socket Designation CPUSocket
  443. Processor Type Central Processor
  444. Processor Family 48h - Specification Reserved
  445. Processor Manufacturer AMD
  446. Processor ID 010f6300fffb8b17
  447. Processor Version AMD A10-7850K Radeon R7, 12 Compute Cores 4C+8G
  448. Processor Voltage 8eh - 1.4V
  449. External Clock 100MHz
  450. Max Speed 4000MHz
  451. Current Speed 4000MHz
  452. Status Enabled Populated
  453. Processor Upgrade Specification Reserved
  454. L1 Cache Handle 000ch
  455. L2 Cache Handle 000dh
  456. L3 Cache Handle [Not Present]
  457.  
  458. ========================================================================
  459. =================== Dump File: 080217-6906-01.dmp ====================
  460. ========================================================================
  461. Mini Kernel Dump File: Only registers and stack trace are available
  462. Windows 10 Kernel Version 15063 MP (4 procs) Free x64
  463. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  464. Built by: 15063.0.amd64fre.rs2_release.170317-1834
  465. Kernel base = 0xfffff803`65a09000 PsLoadedModuleList = 0xfffff803`65d555e0
  466. Debug session time: Wed Aug 2 04:14:56.422 2017 (UTC - 4:00)
  467. System Uptime: 0 days 3:13:06.096
  468.  
  469. BugCheck 1E, {ffffffffc0000005, fffff805d42819e5, 0, ffffffffffffffff}
  470. *** WARNING: Unable to verify timestamp for rtwlanu.sys
  471. *** ERROR: Module load completed but symbols could not be loaded for rtwlanu.sys
  472. *** WARNING: Unable to verify timestamp for win32k.sys
  473. *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
  474. Probably caused by : memory_corruption
  475. Followup: memory_corruption
  476.  
  477. KMODE_EXCEPTION_NOT_HANDLED (1e)
  478. This is a very common bugcheck. Usually the exception address pinpoints
  479. the driver/function that caused the problem. Always note this address
  480. as well as the link date of the driver/image that contains this address.
  481.  
  482. Arguments:
  483. Arg1: ffffffffc0000005, The exception code that was not handled
  484. Arg2: fffff805d42819e5, The address that the exception occurred at
  485. Arg3: 0000000000000000, Parameter 0 of the exception
  486. Arg4: ffffffffffffffff, Parameter 1 of the exception
  487.  
  488. Debugging Details:
  489. DUMP_CLASS: 1
  490. DUMP_QUALIFIER: 400
  491. BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
  492. BIOS_VENDOR: American Megatrends Inc.
  493. BIOS_VERSION: P2.60
  494. BIOS_DATE: 12/11/2015
  495. BASEBOARD_MANUFACTURER: ASRock
  496. BASEBOARD_PRODUCT: FM2A88X+ Killer
  497. BASEBOARD_VERSION:
  498. DUMP_TYPE: 2
  499. READ_ADDRESS: fffff80365dea358: Unable to get MiVisibleState
  500. ffffffffffffffff
  501. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  502. FAULTING_IP:
  503. Wdf01000!FxRequestContext::ReleaseAndRestore+55
  504. fffff805`d42819e5 488b01 mov rax,qword ptr [rcx]
  505. EXCEPTION_PARAMETER2: ffffffffffffffff
  506. BUGCHECK_STR: 0x1E_c0000005_R
  507. CPU_COUNT: 4
  508. CPU_MHZ: f99
  509. CPU_VENDOR: AuthenticAMD
  510. CPU_FAMILY: 15
  511. CPU_MODEL: 30
  512. CPU_STEPPING: 1
  513. CUSTOMER_CRASH_COUNT: 1
  514. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  515.  
  516. PROCESS_NAME: System
  517.  
  518. CURRENT_IRQL: 2
  519. DPC_STACK_BASE: FFFFF80367862FB0
  520. EXCEPTION_RECORD: 0000000000000200 -- (.exr 0x200)
  521. Cannot read Exception record @ 0000000000000200
  522. LAST_CONTROL_TRANSFER: from fffff80365c040b6 to fffff80365b754c0
  523. STACK_TEXT:
  524. fffff803`67861048 fffff803`65c040b6 : 00000000`0000001e ffffffff`c0000005 fffff805`d42819e5 00000000`00000000 : nt!KeBugCheckEx
  525. fffff803`67861050 fffff803`65b7b99d : fffff803`65d93000 fffff803`65a09000 00053694`00889000 00000000`00000000 : nt!KiFatalExceptionHandler+0x22
  526. fffff803`67861090 fffff803`65a34d94 : 00000000`00000000 fffff803`678611c0 00000000`00000000 fffff805`d8eda7ca : nt!RtlpExecuteHandlerForException+0xd
  527. fffff803`678610c0 fffff803`65a33b36 : fffff803`67861f98 fffff803`67861ce0 fffff803`67861f98 fffff803`67861f98 : nt!RtlDispatchException+0x404
  528. fffff803`678617b0 fffff803`65b8098e : 00000000`00000200 ffff9700`00007a20 fffff803`67861f6c 00000000`00000008 : nt!KiDispatchException+0x1f6
  529. fffff803`67861e60 fffff803`65b7ec34 : ffff9f00`00000103 ffff9f04`4efc2940 00000000`00000000 00000000`00000102 : nt!KiExceptionDispatch+0xce
  530. fffff803`67862040 fffff805`d42819e5 : 00000000`00000002 ffff9f04`46fbfa18 ffff9f04`47a00000 00000000`00000001 : nt!KiGeneralProtectionFault+0xf4
  531. fffff803`678621d0 fffff805`d42a6453 : ffff9f04`4794d530 ffff9f04`47846e20 ffff9f04`47846e20 ffff9f04`47308018 : Wdf01000!FxRequestContext::ReleaseAndRestore+0x55
  532. fffff803`67862210 fffff805`d4255311 : ffff9f04`4602fc50 ffff9f04`4602fc50 00000000`0000002b fffff805`d4278f48 : Wdf01000!FxRequestBase::ValidateTarget+0x44c93
  533. fffff803`67862260 fffff805`d428cf00 : ffff9f04`4602fc50 fffff803`67862330 000060fb`b86b2908 00000000`00000000 : Wdf01000!FxFormatUrbRequest+0x2d
  534. fffff803`678622b0 fffff805`dc131fae : ffff9f04`4794d758 ffff9f04`47862850 ffff9f04`4794d770 ffff9f04`47862850 : Wdf01000!imp_WdfUsbTargetPipeFormatRequestForUrb+0x180
  535. fffff803`67862360 ffff9f04`4794d758 : ffff9f04`47862850 ffff9f04`4794d770 ffff9f04`47862850 00000000`00000000 : rtwlanu+0x41fae
  536. fffff803`67862368 ffff9f04`47862850 : ffff9f04`4794d770 ffff9f04`47862850 00000000`00000000 fffff805`dc407ddd : 0xffff9f04`4794d758
  537. fffff803`67862370 ffff9f04`4794d770 : ffff9f04`47862850 00000000`00000000 fffff805`dc407ddd 00000000`00000000 : 0xffff9f04`47862850
  538. fffff803`67862378 ffff9f04`47862850 : 00000000`00000000 fffff805`dc407ddd 00000000`00000000 ffff9f04`48350140 : 0xffff9f04`4794d770
  539. fffff803`67862380 00000000`00000000 : fffff805`dc407ddd 00000000`00000000 ffff9f04`48350140 00000000`00000000 : 0xffff9f04`47862850
  540. STACK_COMMAND: kb
  541. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  542. fffff80365c89383-fffff80365c89385 3 bytes - nt!ExFreePoolWithTag+363
  543. [ 40 fb f6:c0 d7 af ]
  544. 3 errors : !nt (fffff80365c89383-fffff80365c89385)
  545. MODULE_NAME: memory_corruption
  546.  
  547. IMAGE_NAME: memory_corruption
  548.  
  549. FOLLOWUP_NAME: memory_corruption
  550. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  551. MEMORY_CORRUPTOR: LARGE
  552. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  553. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  554. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  555. TARGET_TIME: 2017-08-02T08:14:56.000Z
  556. OSBUILD: 15063
  557. OSSERVICEPACK: 483
  558. SERVICEPACK_NUMBER: 0
  559. OS_REVISION: 0
  560. SUITE_MASK: 784
  561. PRODUCT_TYPE: 1
  562. OSPLATFORM_TYPE: x64
  563. OSNAME: Windows 10
  564. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  565. USER_LCID: 0
  566. OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
  567. BUILDDATESTAMP_STR: 160101.0800
  568. BUILDLAB_STR: WinBuild
  569. BUILDOSVER_STR: 10.0.15063.483
  570. ANALYSIS_SESSION_ELAPSED_TIME: 2aaa
  571. ANALYSIS_SOURCE: KM
  572. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  573. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  574. Followup: memory_corruption
  575.  
  576. ========================================================================
  577. =================== Dump File: 080217-7015-01.dmp ====================
  578. ========================================================================
  579. Mini Kernel Dump File: Only registers and stack trace are available
  580. Windows 10 Kernel Version 15063 MP (4 procs) Free x64
  581. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  582. Built by: 15063.0.amd64fre.rs2_release.170317-1834
  583. Kernel base = 0xfffff802`b5a8a000 PsLoadedModuleList = 0xfffff802`b5dd65e0
  584. Debug session time: Wed Aug 2 05:14:00.176 2017 (UTC - 4:00)
  585. System Uptime: 0 days 0:58:36.849
  586.  
  587. BugCheck 1A, {41792, ffffcd00f2040d20, 8800000000000000, 0}
  588. Probably caused by : memory_corruption
  589. Followup: memory_corruption
  590.  
  591. MEMORY_MANAGEMENT (1a)
  592. # Any other values for parameter 1 must be individually examined.
  593.  
  594. Arguments:
  595. Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
  596. the PTE. Parameters 3/4 contain the low/high parts of the PTE.
  597. Arg2: ffffcd00f2040d20
  598. Arg3: 8800000000000000
  599. Arg4: 0000000000000000
  600.  
  601. Debugging Details:
  602. DUMP_CLASS: 1
  603. DUMP_QUALIFIER: 400
  604. BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
  605. BIOS_VENDOR: American Megatrends Inc.
  606. BIOS_VERSION: P2.60
  607. BIOS_DATE: 12/11/2015
  608. BASEBOARD_MANUFACTURER: ASRock
  609. BASEBOARD_PRODUCT: FM2A88X+ Killer
  610. BASEBOARD_VERSION:
  611. DUMP_TYPE: 2
  612. BUGCHECK_STR: 0x1a_41792
  613. CPU_COUNT: 4
  614. CPU_MHZ: f99
  615. CPU_VENDOR: AuthenticAMD
  616. CPU_FAMILY: 15
  617. CPU_MODEL: 30
  618. CPU_STEPPING: 1
  619. CUSTOMER_CRASH_COUNT: 1
  620. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  621.  
  622. PROCESS_NAME: svchost.exe
  623.  
  624. CURRENT_IRQL: 2
  625. LAST_CONTROL_TRANSFER: from fffff802b5c29cb0 to fffff802b5bf64c0
  626. STACK_TEXT:
  627. ffffb980`f6183238 fffff802`b5c29cb0 : 00000000`0000001a 00000000`00041792 ffffcd00`f2040d20 88000000`00000000 : nt!KeBugCheckEx
  628. ffffb980`f6183240 fffff802`b5b095bd : ffff8c8b`387fed88 ffff8c8b`3a97f7c0 ffff8c8b`387fed88 ffff8c8b`387fe7c0 : nt!MiDeleteVirtualAddresses+0x11b960
  629. ffffb980`f61834f0 fffff802`b608f3fd : ffffe306`8daf7b88 ffffe306`8daf7b88 00000000`c0000045 00000000`00000000 : nt!MiDeleteVad+0x3ad
  630. ffffb980`f6183670 fffff802`b5f3cabd : ffff8c8b`3bd078d0 ffff8c8b`387fe7c0 ffffb980`f6183a30 ffffb980`f6183a40 : nt!MiMapViewOfDataSection+0x15272d
  631. ffffb980`f61837a0 fffff802`b5f18c69 : ffff8c8b`387fe7c0 ffffb980`f6183a50 ffff8c8b`34f30b50 fffff802`b5d0f888 : nt!MiMapViewOfSection+0x25d
  632. ffffb980`f6183920 fffff802`b5f19028 : ffffe306`93aee7f0 ffffe306`8e135410 ffff8c8b`3a97fb40 fffff802`b5aed059 : nt!MmMapSecureViewOfSection+0x65
  633. ffffb980`f6183990 fffff802`b5fa9863 : 00000000`00000000 00000000`00009000 00000000`00000000 ffff8c8b`34f30cb0 : nt!AlpcpCreateView+0x128
  634. ffffb980`f6183a30 fffff802`b5fa9350 : 00000000`00000000 ffffb980`f6183b80 00007fff`b3e54401 ffffb980`f6183b80 : nt!AlpcpCreateSectionView+0x87
  635. ffffb980`f6183a80 fffff802`b5c01413 : ffff8c8b`3a97f7c0 00007fff`b3e544b4 000001e4`07f1e790 00000000`00000000 : nt!NtAlpcCreateSectionView+0x130
  636. ffffb980`f6183b00 00007fff`b51f62f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
  637. 00000035`d74fe648 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`b51f62f4
  638. STACK_COMMAND: kb
  639. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  640. fffff802b5b120ee-fffff802b5b120ef 2 bytes - nt!MiGetNextPageTable+19e
  641. [ 80 f6:00 cd ]
  642. fffff802b5b12121-fffff802b5b12122 2 bytes - nt!MiGetNextPageTable+1d1 (+0x33)
  643. [ 80 f6:00 cd ]
  644. 4 errors : !nt (fffff802b5b120ee-fffff802b5b12122)
  645. MODULE_NAME: memory_corruption
  646.  
  647. IMAGE_NAME: memory_corruption
  648.  
  649. FOLLOWUP_NAME: memory_corruption
  650. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  651. MEMORY_CORRUPTOR: LARGE
  652. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  653. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  654. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  655. TARGET_TIME: 2017-08-02T09:14:00.000Z
  656. OSBUILD: 15063
  657. OSSERVICEPACK: 483
  658. SERVICEPACK_NUMBER: 0
  659. OS_REVISION: 0
  660. SUITE_MASK: 784
  661. PRODUCT_TYPE: 1
  662. OSPLATFORM_TYPE: x64
  663. OSNAME: Windows 10
  664. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  665. USER_LCID: 0
  666. OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
  667. BUILDDATESTAMP_STR: 160101.0800
  668. BUILDLAB_STR: WinBuild
  669. BUILDOSVER_STR: 10.0.15063.483
  670. ANALYSIS_SESSION_ELAPSED_TIME: 32cf
  671. ANALYSIS_SOURCE: KM
  672. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  673. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  674. Followup: memory_corruption
  675.  
  676. ========================================================================
  677. =================== Dump File: 080217-7140-01.dmp ====================
  678. ========================================================================
  679. Mini Kernel Dump File: Only registers and stack trace are available
  680. Windows 10 Kernel Version 15063 MP (4 procs) Free x64
  681. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  682. Built by: 15063.0.amd64fre.rs2_release.170317-1834
  683. Kernel base = 0xfffff802`1d090000 PsLoadedModuleList = 0xfffff802`1d3dc5e0
  684. Debug session time: Wed Aug 2 01:01:23.933 2017 (UTC - 4:00)
  685. System Uptime: 0 days 0:17:08.399
  686.  
  687. BugCheck 1A, {41792, ffffd70000385d08, 1000000000000000, 0}
  688. Probably caused by : memory_corruption
  689. Followup: memory_corruption
  690.  
  691. MEMORY_MANAGEMENT (1a)
  692. # Any other values for parameter 1 must be individually examined.
  693.  
  694. Arguments:
  695. Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
  696. the PTE. Parameters 3/4 contain the low/high parts of the PTE.
  697. Arg2: ffffd70000385d08
  698. Arg3: 1000000000000000
  699. Arg4: 0000000000000000
  700.  
  701. Debugging Details:
  702. DUMP_CLASS: 1
  703. DUMP_QUALIFIER: 400
  704. BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
  705. BIOS_VENDOR: American Megatrends Inc.
  706. BIOS_VERSION: P2.60
  707. BIOS_DATE: 12/11/2015
  708. BASEBOARD_MANUFACTURER: ASRock
  709. BASEBOARD_PRODUCT: FM2A88X+ Killer
  710. BASEBOARD_VERSION:
  711. DUMP_TYPE: 2
  712. MEMORY_CORRUPTOR: LARGE
  713. BUGCHECK_STR: 0x1a_41792
  714. CPU_COUNT: 4
  715. CPU_MHZ: f99
  716. CPU_VENDOR: AuthenticAMD
  717. CPU_FAMILY: 15
  718. CPU_MODEL: 30
  719. CPU_STEPPING: 1
  720. CUSTOMER_CRASH_COUNT: 1
  721. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  722.  
  723. PROCESS_NAME: GameScannerService.exe
  724.  
  725. CURRENT_IRQL: 2
  726. STACK_TEXT:
  727. ffffaf80`a96f0218 fffff802`1d22fcb0 : 00000000`0000001a 00000000`00041792 ffffd700`00385d08 10000000`00000000 : nt!KeBugCheckEx
  728. ffffaf80`a96f0220 fffff802`1d10f5bd : ffff9f86`f3c3cd88 ffff9f86`ea7a67c0 ffff9f86`f3c3cd88 ffff9f86`f3c3c7c0 : nt!MiDeleteVirtualAddresses+0x11b960
  729. ffffaf80`a96f04d0 fffff802`1d51c217 : ffff9f86`ea7a67c0 ffff9f86`f4195c50 ffff9f86`f4195c50 ffff9f86`ea7a67c0 : nt!MiDeleteVad+0x3ad
  730. ffffaf80`a96f0650 fffff802`1d51c6fe : 00000000`00000000 ffff9f86`f4547f70 ffff9f86`f4195c50 ffff9f86`f3c3c7c0 : nt!MiCleanVad+0x27
  731. ffffaf80`a96f0680 fffff802`1d55a54f : 00000000`00040000 00000000`00000000 ffff9f86`f3c3c7c0 ffff9f86`00000000 : nt!MmCleanProcessAddressSpace+0x13e
  732. ffffaf80`a96f0700 fffff802`1d4ca8b1 : ffff9f86`f3c3c7c0 ffffc68c`1e0c2a70 ffffaf80`a96f0910 00000000`00000000 : nt!PspRundownSingleProcess+0x11f
  733. ffffaf80`a96f0780 fffff802`1d5ca313 : 00000000`c0000005 00000000`00000001 00000000`00fcf000 ffffaf80`a96f0b80 : nt!PspExitThread+0x57d
  734. ffffaf80`a96f0880 fffff802`1d0c55d3 : 00000000`00000000 00000000`00000000 ffffaf80`a96f0a60 fffff802`00000001 : nt!KiSchedulerApcTerminate+0x33
  735. ffffaf80`a96f08c0 fffff802`1d1ffb60 : 00000000`0129dcf0 00000000`00000000 00000000`0454ecc8 ffffaf80`00000000 : nt!KiDeliverApc+0x313
  736. ffffaf80`a96f0950 fffff802`1d2074ba : ffff9f86`ea7a67c0 00000000`0454ecc8 ffffaf80`a96f0aa8 00000000`00000001 : nt!KiInitiateUserApc+0x70
  737. ffffaf80`a96f0a90 00000000`6df621cc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
  738. 00000000`0454eca8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x6df621cc
  739. STACK_COMMAND: kb
  740. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  741. fffff8021d310383-fffff8021d310385 3 bytes - nt!ExFreePoolWithTag+363
  742. [ 40 fb f6:80 6b d7 ]
  743. 3 errors : !nt (fffff8021d310383-fffff8021d310385)
  744. MODULE_NAME: memory_corruption
  745.  
  746. IMAGE_NAME: memory_corruption
  747.  
  748. FOLLOWUP_NAME: memory_corruption
  749. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  750. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  751. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  752. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  753. TARGET_TIME: 2017-08-02T05:01:23.000Z
  754. OSBUILD: 15063
  755. OSSERVICEPACK: 483
  756. SERVICEPACK_NUMBER: 0
  757. OS_REVISION: 0
  758. SUITE_MASK: 784
  759. PRODUCT_TYPE: 1
  760. OSPLATFORM_TYPE: x64
  761. OSNAME: Windows 10
  762. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  763. USER_LCID: 0
  764. OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
  765. BUILDDATESTAMP_STR: 160101.0800
  766. BUILDLAB_STR: WinBuild
  767. BUILDOSVER_STR: 10.0.15063.483
  768. ANALYSIS_SESSION_ELAPSED_TIME: 2b8f
  769. ANALYSIS_SOURCE: KM
  770. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  771. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  772. Followup: memory_corruption
  773.  
  774. ========================================================================
  775. =================== Dump File: 073017-7312-01.dmp ====================
  776. ========================================================================
  777. Mini Kernel Dump File: Only registers and stack trace are available
  778. Windows 10 Kernel Version 15063 MP (4 procs) Free x64
  779. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  780. Built by: 15063.0.amd64fre.rs2_release.170317-1834
  781. Kernel base = 0xfffff802`68a9b000 PsLoadedModuleList = 0xfffff802`68de75e0
  782. Debug session time: Sat Jul 29 15:00:30.043 2017 (UTC - 4:00)
  783. System Uptime: 0 days 5:56:21.730
  784.  
  785. BugCheck EF, {ffffdd8fd11ec7c0, 0, 0, 0}
  786. errfg" bg="errbg">ETW minidump data unavailable
  787. Probably caused by : ntkrnlmp.exe ( nt!PspCatchCriticalBreak+c9 )
  788. Followup: MachineOwner
  789.  
  790. CRITICAL_PROCESS_DIED (ef)
  791. A critical system process died
  792.  
  793. Arguments:
  794. Arg1: ffffdd8fd11ec7c0, Process object or thread object
  795. Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
  796. Arg3: 0000000000000000
  797. Arg4: 0000000000000000
  798.  
  799. Debugging Details:
  800. ETW minidump data unavailable
  801. DUMP_CLASS: 1
  802. DUMP_QUALIFIER: 400
  803. BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
  804. BIOS_VENDOR: American Megatrends Inc.
  805. BIOS_VERSION: P2.60
  806. BIOS_DATE: 12/11/2015
  807. BASEBOARD_MANUFACTURER: ASRock
  808. BASEBOARD_PRODUCT: FM2A88X+ Killer
  809. BASEBOARD_VERSION:
  810. DUMP_TYPE: 2
  811.  
  812. PROCESS_NAME: svchost.exe
  813.  
  814. CRITICAL_PROCESS: svchost.exe
  815. EXCEPTION_CODE: (NTSTATUS) 0xd360e080 - <Unable to get error code text>
  816. ERROR_CODE: (NTSTATUS) 0xd360e080 - <Unable to get error code text>
  817. CPU_COUNT: 4
  818. CPU_MHZ: f99
  819. CPU_VENDOR: AuthenticAMD
  820. CPU_FAMILY: 15
  821. CPU_MODEL: 30
  822. CPU_STEPPING: 1
  823. CUSTOMER_CRASH_COUNT: 1
  824. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  825. BUGCHECK_STR: 0xEF
  826. CURRENT_IRQL: 0
  827. LAST_CONTROL_TRANSFER: from fffff8026917b071 to fffff80268c074c0
  828. STACK_TEXT:
  829. ffffbb00`25757988 fffff802`6917b071 : 00000000`000000ef ffffdd8f`d11ec7c0 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
  830. ffffbb00`25757990 fffff802`690b6c47 : ffffdd8f`d11ec7c0 00000000`00000000 ffffdd8f`d11ec7c0 ffffdd8f`d11ec7c0 : nt!PspCatchCriticalBreak+0xc9
  831. ffffbb00`257579e0 fffff802`68f96186 : ffffdd8f`00000000 ffffdd8f`d11ec7c0 00000000`00000000 ffffdd8f`d11ec7c0 : nt!PspTerminateAllThreads+0x1209bb
  832. ffffbb00`25757a50 fffff802`68f95f47 : ffffffff`ffffffff ffffdd8f`d11ec7c0 ffffdd8f`d11ec7c0 00000000`00000001 : nt!PspTerminateProcess+0xde
  833. ffffbb00`25757a90 fffff802`68c12413 : ffffdd8f`d11ec7c0 ffffdd8f`d360e080 ffffbb00`25757b80 00000034`b18ff600 : nt!NtTerminateProcess+0xa7
  834. ffffbb00`25757b00 00007ff9`9aa45924 : 00007ff9`9aaa5d3f 00000034`b18fd6e0 00007ff9`9aad6598 00000034`b18ff600 : nt!KiSystemServiceCopyEnd+0x13
  835. 00000034`b18fd5a8 00007ff9`9aaa5d3f : 00000034`b18fd6e0 00007ff9`9aad6598 00000034`b18ff600 00000008`00000000 : 0x00007ff9`9aa45924
  836. 00000034`b18fd5b0 00000034`b18fd6e0 : 00007ff9`9aad6598 00000034`b18ff600 00000008`00000000 00000000`00000006 : 0x00007ff9`9aaa5d3f
  837. 00000034`b18fd5b8 00007ff9`9aad6598 : 00000034`b18ff600 00000008`00000000 00000000`00000006 00007ff9`9aa4cf9d : 0x00000034`b18fd6e0
  838. 00000034`b18fd5c0 00000034`b18ff600 : 00000008`00000000 00000000`00000006 00007ff9`9aa4cf9d 00007ff9`9aad6598 : 0x00007ff9`9aad6598
  839. 00000034`b18fd5c8 00000008`00000000 : 00000000`00000006 00007ff9`9aa4cf9d 00007ff9`9aad6598 00000000`00000003 : 0x00000034`b18ff600
  840. 00000034`b18fd5d0 00000000`00000006 : 00007ff9`9aa4cf9d 00007ff9`9aad6598 00000000`00000003 00000000`00000000 : 0x00000008`00000000
  841. 00000034`b18fd5d8 00007ff9`9aa4cf9d : 00007ff9`9aad6598 00000000`00000003 00000000`00000000 00007ff9`9a4a1256 : 0x6
  842. 00000034`b18fd5e0 00007ff9`9aad6598 : 00000000`00000003 00000000`00000000 00007ff9`9a4a1256 00007ff9`9a55d480 : 0x00007ff9`9aa4cf9d
  843. 00000034`b18fd5e8 00000000`00000003 : 00000000`00000000 00007ff9`9a4a1256 00007ff9`9a55d480 00007ff9`9a460000 : 0x00007ff9`9aad6598
  844. 00000034`b18fd5f0 00000000`00000000 : 00007ff9`9a4a1256 00007ff9`9a55d480 00007ff9`9a460000 00000000`000416b6 : 0x3
  845. STACK_COMMAND: kb
  846. THREAD_SHA1_HASH_MOD_FUNC: 042a2b51772309c39e12d732cc93cacf0af3064e
  847. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: fc10ecd29a9db0f986cc1d740175a75d350c5136
  848. THREAD_SHA1_HASH_MOD: ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693
  849. FOLLOWUP_IP:
  850. nt!PspCatchCriticalBreak+c9
  851. fffff802`6917b071 cc int 3
  852. FAULT_INSTR_CODE: ff8440cc
  853. SYMBOL_STACK_INDEX: 1
  854. SYMBOL_NAME: nt!PspCatchCriticalBreak+c9
  855. FOLLOWUP_NAME: MachineOwner
  856. MODULE_NAME: nt
  857.  
  858. IMAGE_NAME: ntkrnlmp.exe
  859.  
  860. DEBUG_FLR_IMAGE_TIMESTAMP: 595f24eb
  861. IMAGE_VERSION: 10.0.15063.483
  862. BUCKET_ID_FUNC_OFFSET: c9
  863. FAILURE_BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_d360e080_nt!PspCatchCriticalBreak
  864. BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_d360e080_nt!PspCatchCriticalBreak
  865. PRIMARY_PROBLEM_CLASS: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_d360e080_nt!PspCatchCriticalBreak
  866. TARGET_TIME: 2017-07-29T19:00:30.000Z
  867. OSBUILD: 15063
  868. OSSERVICEPACK: 483
  869. SERVICEPACK_NUMBER: 0
  870. OS_REVISION: 0
  871. SUITE_MASK: 784
  872. PRODUCT_TYPE: 1
  873. OSPLATFORM_TYPE: x64
  874. OSNAME: Windows 10
  875. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  876. USER_LCID: 0
  877. OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
  878. BUILDDATESTAMP_STR: 160101.0800
  879. BUILDLAB_STR: WinBuild
  880. BUILDOSVER_STR: 10.0.15063.483
  881. ANALYSIS_SESSION_ELAPSED_TIME: dc4
  882. ANALYSIS_SOURCE: KM
  883. FAILURE_ID_HASH_STRING: km:0xef_svchost.exe_bugcheck_critical_process_d360e080_nt!pspcatchcriticalbreak
  884. FAILURE_ID_HASH: {a0cce699-5522-299b-48e8-ce2e8105bd0c}
  885. Followup: MachineOwner
  886.  
  887. ========================================================================
  888. =================== Dump File: 073117-25546-01.dmp ===================
  889. ========================================================================
  890. Mini Kernel Dump File: Only registers and stack trace are available
  891. Windows 10 Kernel Version 15063 MP (4 procs) Free x64
  892. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  893. Built by: 15063.0.amd64fre.rs2_release.170317-1834
  894. Kernel base = 0xfffff802`21a89000 PsLoadedModuleList = 0xfffff802`21dd55e0
  895. Debug session time: Sun Jul 30 14:03:58.720 2017 (UTC - 4:00)
  896. System Uptime: 0 days 11:05:00.396
  897.  
  898. BugCheck 1C7, {0, ffffbe8e6ba26000, 949ca35a, 3cd9656a}
  899. *** WARNING: Unable to verify timestamp for win32k.sys
  900. *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
  901. Probably caused by : memory_corruption
  902. Followup: memory_corruption
  903.  
  904. Unknown bugcheck code (1c7)
  905. Unknown bugcheck description
  906.  
  907. Arguments:
  908. Arg1: 0000000000000000
  909. Arg2: ffffbe8e6ba26000
  910. Arg3: 00000000949ca35a
  911. Arg4: 000000003cd9656a
  912.  
  913. Debugging Details:
  914. DUMP_CLASS: 1
  915. DUMP_QUALIFIER: 400
  916. BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
  917. BIOS_VENDOR: American Megatrends Inc.
  918. BIOS_VERSION: P2.60
  919. BIOS_DATE: 12/11/2015
  920. BASEBOARD_MANUFACTURER: ASRock
  921. BASEBOARD_PRODUCT: FM2A88X+ Killer
  922. BASEBOARD_VERSION:
  923. DUMP_TYPE: 2
  924. CPU_COUNT: 4
  925. CPU_MHZ: e6d
  926. CPU_VENDOR: AuthenticAMD
  927. CPU_FAMILY: 15
  928. CPU_MODEL: 30
  929. CPU_STEPPING: 1
  930. CUSTOMER_CRASH_COUNT: 1
  931. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  932. BUGCHECK_STR: 0x1C7
  933.  
  934. PROCESS_NAME: MemCompression
  935.  
  936. CURRENT_IRQL: 0
  937. LAST_CONTROL_TRANSFER: from fffff80221c3ce35 to fffff80221bf54c0
  938. STACK_TEXT:
  939. ffffcf80`0923e978 fffff802`21c3ce35 : 00000000`000001c7 00000000`00000000 ffffbe8e`6ba26000 00000000`949ca35a : nt!KeBugCheckEx
  940. ffffcf80`0923e980 fffff802`21b566d9 : 6cecbe06`3cd9656a ffffbe8e`69d63050 ffffcf80`0923ea69 ffffbe8e`69d63050 : nt!SmHpBufferProtect+0xe6675
  941. ffffcf80`0923e9d0 fffff802`21b5815b : 00000000`20121266 ffffcf80`0923ea69 ffffbe8e`69d63050 00000000`201212c1 : nt!ST_STORE<SM_TRAITS>::StDmPageRecordUnprotect+0x15
  942. ffffcf80`0923ea00 fffff802`21b51946 : 00000000`00045279 ffffbe8e`6b0f46b0 00000000`00000000 fffff802`00000000 : nt!ST_STORE<SM_TRAITS>::StDmPageRemove+0x12f
  943. ffffcf80`0923ead0 fffff802`21b5106f : ffffbe8e`69d63000 ffffcf80`0923eb98 00000000`00000000 ffffbe8e`69d607c0 : nt!ST_STORE<SM_TRAITS>::StWorkItemProcess+0xbe
  944. ffffcf80`0923eb20 fffff802`21ba3fe1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SMKM_STORE<SM_TRAITS>::SmStWorker+0x2e7
  945. ffffcf80`0923ebe0 fffff802`21b65ac7 : ffffbe8e`69d63000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkerThread+0x11
  946. ffffcf80`0923ec10 fffff802`21bfa946 : fffff802`20630180 ffffbe8e`69d607c0 fffff802`21b65a80 00000000`00000000 : nt!PspSystemThreadStartup+0x47
  947. ffffcf80`0923ec60 00000000`00000000 : ffffcf80`0923f000 ffffcf80`09239000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
  948. STACK_COMMAND: kb
  949. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  950. fffff80221b2ef4a-fffff80221b2ef4b 2 bytes - nt!MmSetPfnListPriorities+13a
  951. [ 80 fa:00 97 ]
  952. 2 errors : !nt (fffff80221b2ef4a-fffff80221b2ef4b)
  953. MODULE_NAME: memory_corruption
  954.  
  955. IMAGE_NAME: memory_corruption
  956.  
  957. FOLLOWUP_NAME: memory_corruption
  958. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  959. MEMORY_CORRUPTOR: LARGE
  960. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  961. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  962. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  963. TARGET_TIME: 2017-07-30T18:03:58.000Z
  964. OSBUILD: 15063
  965. OSSERVICEPACK: 483
  966. SERVICEPACK_NUMBER: 0
  967. OS_REVISION: 0
  968. SUITE_MASK: 784
  969. PRODUCT_TYPE: 1
  970. OSPLATFORM_TYPE: x64
  971. OSNAME: Windows 10
  972. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  973. USER_LCID: 0
  974. OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
  975. BUILDDATESTAMP_STR: 160101.0800
  976. BUILDLAB_STR: WinBuild
  977. BUILDOSVER_STR: 10.0.15063.483
  978. ANALYSIS_SESSION_ELAPSED_TIME: 2a05
  979. ANALYSIS_SOURCE: KM
  980. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  981. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  982. Followup: memory_corruption
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement