Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 10.0.14321.1024 X86
- Copyright (c) Microsoft Corporation. All rights reserved.
- Auto Dump Analyzer by gardenman
- Time to debug file(s): 00 hours and 07 minutes and 10 seconds
- ========================================================================
- =================== Dump File: 080217-6718-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Kernel base = 0xfffff800`9f001000 PsLoadedModuleList = 0xfffff800`9f34d5e0
- Debug session time: Wed Aug 2 07:48:52.042 2017 (UTC - 4:00)
- System Uptime: 0 days 0:56:24.715
- BugCheck 12B, {ffffffffc00002c4, d6b, 1ed6c1b0, ffffbb810028d000}
- *** WARNING: Unable to verify timestamp for win32k.sys
- *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
- Probably caused by : memory_corruption
- Followup: memory_corruption
- FAULTY_HARDWARE_CORRUPTED_PAGE (12b)
- This bugcheck indicates that a single bit error was found in this page. This is a hardware memory error.
- Arguments:
- Arg1: ffffffffc00002c4, virtual address mapping the corrupted page
- Arg2: 0000000000000d6b, physical page number
- Arg3: 000000001ed6c1b0, zero
- Arg4: ffffbb810028d000, zero
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: P2.60
- BIOS_DATE: 12/11/2015
- BASEBOARD_MANUFACTURER: ASRock
- BASEBOARD_PRODUCT: FM2A88X+ Killer
- BASEBOARD_VERSION:
- DUMP_TYPE: 2
- BUGCHECK_STR: 0x12B_c00002c4_StCtDecompressFailed
- CPU_COUNT: 4
- CPU_MHZ: f99
- CPU_VENDOR: AuthenticAMD
- CPU_FAMILY: 15
- CPU_MODEL: 30
- CPU_STEPPING: 1
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- PROCESS_NAME: MemCompression
- CURRENT_IRQL: 0
- LAST_CONTROL_TRANSFER: from fffff8009f249b87 to fffff8009f16d4c0
- STACK_TEXT:
- ffffbb80`fe0f2208 fffff800`9f249b87 : 00000000`0000012b ffffffff`c00002c4 00000000`00000d6b 00000000`1ed6c1b0 : nt!KeBugCheckEx
- ffffbb80`fe0f2210 fffff800`9f1b879d : 00000000`00000200 00000000`00000003 00000000`1ed6c1b0 ffffbb81`0028d000 : nt!ST_STORE<SM_TRAITS>::StDmPageError+0x117
- ffffbb80`fe0f2260 fffff800`9f0da84f : 00000000`00000000 ffffbb80`fe0f2478 00000000`00000000 00000000`00000f08 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0xddf19
- ffffbb80`fe0f2340 fffff800`9f0da23b : 00000000`00000001 00000000`0001c1b0 00000000`0001c1b0 00000000`00002000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0x7b
- ffffbb80`fe0f2390 fffff800`9f0da05e : ffffbb80`ffffffff ffffe30d`6b6fc000 ffffbb80`fe0f2478 ffffe30d`6a760060 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x183
- ffffbb80`fe0f2430 fffff800`9f0dbc7f : ffffe30d`6a760060 fffff800`00000000 00000000`00000001 ffffe30d`6a760060 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0xea
- ffffbb80`fe0f24f0 fffff800`9f12af81 : ffffe30d`5f258000 ffffbb80`fe0f2600 fffff800`9f12af60 ffffbb80`fe0f2600 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x6f
- ffffbb80`fe0f2540 fffff800`9f01720b : ffffe30d`6897f7c0 ffffbb80`fe0f2600 00000000`00000002 fffff800`9f0d26d0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21
- ffffbb80`fe0f2570 fffff800`9f0d2625 : 00000000`00000003 ffffe30d`6b6fc000 ffffe30d`5f258000 ffffe30d`6a760060 : nt!KeExpandKernelStackAndCalloutInternal+0x8b
- ffffbb80`fe0f25c0 fffff800`9f0c8cc2 : ffffbb80`fe0f26c0 fffff800`9f3f7a00 00000000`00000000 fffff800`9f0dcdc0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xad
- ffffbb80`fe0f2690 fffff800`9f0c8522 : 00000000`00000000 00000000`00000000 ffffbb80`fe0f2740 ffffe30d`6a760060 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x1ae
- ffffbb80`fe0f26e0 fffff800`9f0dcafa : 00000000`0000000c 00000000`00000002 ffffe30d`6a760060 ffffe30d`675755e0 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0xce
- ffffbb80`fe0f2760 fffff800`9f1196ea : ffffe30d`00000002 ffffe30d`67575690 ffff9801`00000000 ffffe30d`5f258000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x16a
- ffffbb80`fe0f27d0 fffff800`9f0a2fa9 : 00000000`00000004 ffffe30d`67575590 00000000`00000000 ffff9300`00f7f0e0 : nt!SmPageRead+0x2e
- ffffbb80`fe0f2820 fffff800`9f0a2970 : 00000000`00000002 ffffbb80`fe0f28b0 00000000`00000000 ffffe30d`67575590 : nt!MiIssueHardFaultIo+0x11d
- ffffbb80`fe0f2870 fffff800`9f08e486 : 00000000`c0033333 ffffbb80`fe0f2b00 00000000`00000000 0000026c`00000000 : nt!MiIssueHardFault+0x190
- ffffbb80`fe0f2910 fffff800`9f176d72 : ffffe30d`6897f7c0 ffffbb80`fe0f2b80 ffffffff`ffff3cb0 00007ff8`26f60000 : nt!MmAccessFault+0xc96
- ffffbb80`fe0f2b00 00007ff8`270125dd : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x132
- 00000073`ed04f820 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`270125dd
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff8009f08e54c-fffff8009f08e54d 2 bytes - nt!MmAccessFault+d5c
- [ ff f6:7f 98 ]
- fffff8009f0a2a12-fffff8009f0a2a13 2 bytes - nt!MiIssueHardFault+232 (+0x144c6)
- [ 80 f6:00 98 ]
- 4 errors : !nt (fffff8009f08e54c-fffff8009f0a2a13)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-08-02T11:48:52.000Z
- OSBUILD: 15063
- OSSERVICEPACK: 483
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.15063.483
- ANALYSIS_SESSION_ELAPSED_TIME: 2a02
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- ========================================================================
- ============================== Drivers ===============================
- ========================================================================
- Image path: \??\C:\Program Files (x86)\Common Files\BattlEye\BEDaisy.sys
- Image name: BEDaisy.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=BEDaisy.sys
- Timestamp: Tue Jan 10 2017
- Image path: \SystemRoot\system32\mcupdate_AuthenticAMD.dll
- Image name: mcupdate_AuthenticAMD.dll
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=mcupdate_AuthenticAMD.dll
- Timestamp: Tue Jan 31 1978
- Image path: \SystemRoot\System32\DriverStore\FileRepository\c0316467.inf_amd64_3d8fbd78102e53d7\atikmpag.sys
- Image name: atikmpag.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=atikmpag.sys
- Timestamp: Thu Jul 20 2017
- Image path: \SystemRoot\System32\Drivers\SmartDefragDriver.sys
- Image name: SmartDefragDriver.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=SmartDefragDriver.sys
- Timestamp: Mon Dec 23 2013
- Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{FF7E1326-8A6D-4BD3-8B38-AB56BEB0C921}\MpKslfacc0225.sys
- Image name: MpKslfacc0225.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=MpKslfacc0225.sys
- Timestamp: Tue May 19 2015
- Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{6D8E6A8E-546E-44D4-BFE6-16195EBA654E}\MpKsleac2ef90.sys
- Image name: MpKsleac2ef90.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=MpKsleac2ef90.sys
- Timestamp: Tue May 19 2015
- Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{FF7E1326-8A6D-4BD3-8B38-AB56BEB0C921}\MpKsl8d63bc79.sys
- Image name: MpKsl8d63bc79.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=MpKsl8d63bc79.sys
- Timestamp: Tue May 19 2015
- Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{E62B9E7A-0916-480A-B2E1-AAFC6A9882E9}\MpKsl7c2a0a9c.sys
- Image name: MpKsl7c2a0a9c.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=MpKsl7c2a0a9c.sys
- Timestamp: Tue May 19 2015
- Image path: \??\C:\Windows\SysWOW64\drivers\HWiNFO64A.SYS
- Image name: HWiNFO64A.SYS
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=HWiNFO64A.SYS
- Timestamp: Tue Mar 31 2015
- Image path: \SystemRoot\system32\DRIVERS\AsrAppCharger.sys
- Image name: AsrAppCharger.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=AsrAppCharger.sys
- Timestamp: Tue May 10 2011
- Image path: \SystemRoot\System32\drivers\rtwlanu.sys
- Image name: rtwlanu.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=rtwlanu.sys
- Timestamp: Wed Apr 5 2017
- Image path: \??\C:\WINDOWS\SysWOW64\Drivers\AsrAutoChkUpdDrv.sys
- Image name: AsrAutoChkUpdDrv.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=AsrAutoChkUpdDrv.sys
- Timestamp: Mon Mar 10 2014
- Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{D595AE9D-5FB5-4BD7-9F24-D556ED09E50D}\MpKsl8ba4c6ed.sys
- Image name: MpKsl8ba4c6ed.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=MpKsl8ba4c6ed.sys
- Timestamp: Tue May 19 2015
- Image path: \??\C:\Windows\system32\drivers\rzpmgrk.sys
- Image name: rzpmgrk.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=rzpmgrk.sys
- Timestamp: Thu Sep 17 2015
- Image path: \??\C:\Windows\system32\drivers\rzpnk.sys
- Image name: rzpnk.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=rzpnk.sys
- Possible Driver Info: Razer Overlay Support https://www.razerzone.com/
- Timestamp: Wed Sep 16 2015
- Image path: \??\C:\WINDOWS\SysWOW64\Drivers\AsrDrv101.sys
- Image name: AsrDrv101.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=AsrDrv101.sys
- Timestamp: Tue Jan 15 2013
- Image path: \SystemRoot\System32\drivers\rzendpt.sys
- Image name: rzendpt.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=rzendpt.sys
- Timestamp: Tue Aug 11 2015
- Image path: \SystemRoot\System32\drivers\rzmpos.sys
- Image name: rzmpos.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=rzmpos.sys
- Timestamp: Tue Aug 11 2015
- Image path: \SystemRoot\System32\drivers\rzudd.sys
- Image name: rzudd.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=rzudd.sys
- Timestamp: Tue Aug 11 2015
- Image path: \SystemRoot\system32\drivers\RTKVHD64.sys
- Image name: RTKVHD64.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=RTKVHD64.sys
- Timestamp: Thu Jan 5 2017
- Image path: \SystemRoot\System32\drivers\asmthub3.sys
- Image name: asmthub3.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=asmthub3.sys
- Timestamp: Fri Oct 7 2016
- Image path: \SystemRoot\system32\DRIVERS\asmtxhci.sys
- Image name: asmtxhci.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=asmtxhci.sys
- Timestamp: Fri Oct 7 2016
- Image path: \SystemRoot\System32\drivers\e2xw10x64.sys
- Image name: e2xw10x64.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=e2xw10x64.sys
- Timestamp: Wed Sep 14 2016
- Image path: \SystemRoot\system32\drivers\AtihdWT6.sys
- Image name: AtihdWT6.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=AtihdWT6.sys
- Timestamp: Thu Dec 8 2016
- Image path: \SystemRoot\System32\DriverStore\FileRepository\c0316467.inf_amd64_3d8fbd78102e53d7\atikmdag.sys
- Image name: atikmdag.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=atikmdag.sys
- Timestamp: Thu Jul 20 2017
- Image path: \SystemRoot\System32\win32kfull.sys
- Image name: win32kfull.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=win32kfull.sys
- Timestamp: unavailable (00000000)
- Image path: \SystemRoot\System32\win32kbase.sys
- Image name: win32kbase.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=win32kbase.sys
- Timestamp: unavailable (00000000)
- Unloaded modules:
- fffff802`e61b0000 fffff802`e61bb000 cldflt.sys
- fffff802`e46e0000 fffff802`e46ef000 dump_ataport
- fffff802`e4700000 fffff802`e470c000 dump_atapi.s
- fffff802`e4730000 fffff802`e474d000 dump_dumpfve
- fffff802`e7b30000 fffff802`e7b3a000 amdkmafd.sys
- fffff802`ea5e0000 fffff802`ea5ea000 amdkmafd.sys
- fffff802`e4dd0000 fffff802`e4df0000 dam.sys
- fffff802`e3820000 fffff802`e382f000 WdBoot.sys
- fffff802`e45f0000 fffff802`e45ff000 hwpolicy.sys
- ========================================================================
- ============================== BIOS INFO =============================
- ========================================================================
- [SMBIOS Data Tables v2.8]
- [DMI Version - 0]
- [2.0 Calling Convention - No]
- [Table Size - 1524 bytes]
- [BIOS Information (Type 0) - Length 24 - Handle 0000h]
- Vendor American Megatrends Inc.
- BIOS Version P2.60
- BIOS Starting Address Segment f000
- BIOS Release Date 12/11/2015
- BIOS ROM Size 800000
- BIOS Characteristics
- 07: - PCI Supported
- 11: - Upgradeable FLASH BIOS
- 12: - BIOS Shadowing Supported
- 15: - CD-Boot Supported
- 16: - Selectable Boot Supported
- 17: - BIOS ROM Socketed
- 19: - EDD Supported
- 23: - 1.2MB Floppy Supported
- 24: - 720KB Floppy Supported
- 25: - 2.88MB Floppy Supported
- 26: - Print Screen Device Supported
- 27: - Keyboard Services Supported
- 28: - Serial Services Supported
- 29: - Printer Services Supported
- 32: - BIOS Vendor Reserved
- BIOS Characteristic Extensions
- 00: - ACPI Supported
- 01: - USB Legacy Supported
- 08: - BIOS Boot Specification Supported
- 10: - Specification Reserved
- 11: - Specification Reserved
- BIOS Major Revision 4
- BIOS Minor Revision 6
- EC Firmware Major Revision 255
- EC Firmware Minor Revision 255
- [System Information (Type 1) - Length 27 - Handle 0001h]
- UUID 00000000-0000-0000-0000-000000000000
- Wakeup Type Power Switch
- [BaseBoard Information (Type 2) - Length 15 - Handle 0002h]
- Manufacturer ASRock
- Product FM2A88X+ Killer
- Version
- Feature Flags 09h
- 1591878152: - ?ÿU?ì?ì¡H.õ^3Å?Eü3ÀW?}?Eô?Eø?ÿu
- ¸@
- 1591878192: - ?ÿU?ì?ì¡H.õ^3Å?Eü3ÀW?}?Eô?Eø?ÿu
- ¸@
- Location
- Chassis Handle 0003h
- Board Type 0ah - Processor/Memory Module
- Number of Child Handles 0
- [System Enclosure (Type 3) - Length 22 - Handle 0003h]
- Chassis Type Desktop
- Bootup State Safe
- Power Supply State Safe
- Thermal State Safe
- Security Status None
- OEM Defined 0
- Height 0U
- Number of Power Cords 1
- Number of Contained Elements 0
- Contained Element Size 3
- [OEM Strings (Type 11) - Length 5 - Handle 000bh]
- Number of Strings 1
- [Cache Information (Type 7) - Length 19 - Handle 000ch]
- Socket Designation L1 CACHE
- Cache Configuration 0180h - WB Enabled Int NonSocketed L1
- Maximum Cache Size 0100h - 256K
- Installed Size 0100h - 256K
- Supported SRAM Type 0010h - Pipeline-Burst
- Current SRAM Type 0010h - Pipeline-Burst
- Cache Speed 1ns
- Error Correction Type Specification Reserved
- System Cache Type Unified
- Associativity 2-way Set-Associative
- [Cache Information (Type 7) - Length 19 - Handle 000dh]
- Socket Designation L2 CACHE
- Cache Configuration 0181h - WB Enabled Int NonSocketed L2
- Maximum Cache Size 1000h - 4096K
- Installed Size 1000h - 4096K
- Supported SRAM Type 0010h - Pipeline-Burst
- Current SRAM Type 0010h - Pipeline-Burst
- Cache Speed 1ns
- Error Correction Type Specification Reserved
- System Cache Type Unified
- Associativity 16-way Set-Associative
- [Physical Memory Array (Type 16) - Length 23 - Handle 0018h]
- Location 03h - SystemBoard/Motherboard
- Use 03h - System Memory
- Memory Error Correction 03h - None
- Maximum Capacity 8388608KB
- Number of Memory Devices 4
- [Memory Array Mapped Address (Type 19) - Length 31 - Handle 0019h]
- Starting Address 00000000h
- Ending Address 007fffffh
- Memory Array Handle 0018h
- Partition Width 255
- [Memory Device (Type 17) - Length 40 - Handle 001ah]
- Physical Memory Array Handle 0018h
- Total Width 64 bits
- Data Width 64 bits
- Form Factor 0dh - SODIMM
- Device Locator DIMM 0
- Bank Locator CHANNEL A
- Memory Type 18h - Specification Reserved
- Type Detail 0000h -
- Speed 0MHz
- Manufacturer A1_Manufacturer0
- Part Number A1_PartNum0
- [Memory Device (Type 17) - Length 40 - Handle 001bh]
- Physical Memory Array Handle 0018h
- Total Width 64 bits
- Data Width 64 bits
- Size 4096MB
- Form Factor 09h - DIMM
- Device Locator DIMM 1
- Bank Locator CHANNEL A
- Memory Type 18h - Specification Reserved
- Type Detail 4080h - Synchronous
- Speed 1600MHz
- Manufacturer [String Not Found]
- [Memory Device (Type 17) - Length 40 - Handle 001ch]
- Physical Memory Array Handle 0018h
- Total Width 64 bits
- Data Width 64 bits
- Form Factor 0dh - SODIMM
- Device Locator DIMM 0
- Bank Locator CHANNEL B
- Memory Type 18h - Specification Reserved
- Type Detail 0000h -
- Speed 0MHz
- Manufacturer A1_Manufacturer2
- Part Number A1_PartNum2
- [Memory Device (Type 17) - Length 40 - Handle 001dh]
- Physical Memory Array Handle 0018h
- Total Width 64 bits
- Data Width 64 bits
- Size 4096MB
- Form Factor 09h - DIMM
- Device Locator DIMM 1
- Bank Locator CHANNEL B
- Memory Type 18h - Specification Reserved
- Type Detail 4080h - Synchronous
- Speed 1600MHz
- Manufacturer [String Not Found]
- [Memory Device Mapped Address (Type 20) - Length 35 - Handle 001eh]
- Starting Address 00000000h
- Ending Address 00000000h
- Memory Device Handle 0000h
- Mem Array Mapped Adr Handle 0000h
- Partition Row Position [Reserved]
- Interleave Position [None]
- Interleave Data Depth [None]
- [Memory Device Mapped Address (Type 20) - Length 35 - Handle 001fh]
- Starting Address 00000000h
- Ending Address 003fffffh
- Memory Device Handle 001bh
- Mem Array Mapped Adr Handle 0019h
- [Memory Device Mapped Address (Type 20) - Length 35 - Handle 0020h]
- Starting Address 00000000h
- Ending Address 00000000h
- Memory Device Handle 0000h
- Mem Array Mapped Adr Handle 0000h
- Partition Row Position [Reserved]
- Interleave Position [None]
- Interleave Data Depth [None]
- [Memory Device Mapped Address (Type 20) - Length 35 - Handle 0021h]
- Starting Address 00400000h
- Ending Address 007fffffh
- Memory Device Handle 001bh
- Mem Array Mapped Adr Handle 0019h
- [Processor Information (Type 4) - Length 42 - Handle 0024h]
- Socket Designation CPUSocket
- Processor Type Central Processor
- Processor Family 48h - Specification Reserved
- Processor Manufacturer AMD
- Processor ID 010f6300fffb8b17
- Processor Version AMD A10-7850K Radeon R7, 12 Compute Cores 4C+8G
- Processor Voltage 8eh - 1.4V
- External Clock 100MHz
- Max Speed 4000MHz
- Current Speed 4000MHz
- Status Enabled Populated
- Processor Upgrade Specification Reserved
- L1 Cache Handle 000ch
- L2 Cache Handle 000dh
- L3 Cache Handle [Not Present]
- ========================================================================
- =================== Dump File: 080217-6906-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Kernel base = 0xfffff803`65a09000 PsLoadedModuleList = 0xfffff803`65d555e0
- Debug session time: Wed Aug 2 04:14:56.422 2017 (UTC - 4:00)
- System Uptime: 0 days 3:13:06.096
- BugCheck 1E, {ffffffffc0000005, fffff805d42819e5, 0, ffffffffffffffff}
- *** WARNING: Unable to verify timestamp for rtwlanu.sys
- *** ERROR: Module load completed but symbols could not be loaded for rtwlanu.sys
- *** WARNING: Unable to verify timestamp for win32k.sys
- *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
- Probably caused by : memory_corruption
- Followup: memory_corruption
- KMODE_EXCEPTION_NOT_HANDLED (1e)
- This is a very common bugcheck. Usually the exception address pinpoints
- the driver/function that caused the problem. Always note this address
- as well as the link date of the driver/image that contains this address.
- Arguments:
- Arg1: ffffffffc0000005, The exception code that was not handled
- Arg2: fffff805d42819e5, The address that the exception occurred at
- Arg3: 0000000000000000, Parameter 0 of the exception
- Arg4: ffffffffffffffff, Parameter 1 of the exception
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: P2.60
- BIOS_DATE: 12/11/2015
- BASEBOARD_MANUFACTURER: ASRock
- BASEBOARD_PRODUCT: FM2A88X+ Killer
- BASEBOARD_VERSION:
- DUMP_TYPE: 2
- READ_ADDRESS: fffff80365dea358: Unable to get MiVisibleState
- ffffffffffffffff
- EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- FAULTING_IP:
- Wdf01000!FxRequestContext::ReleaseAndRestore+55
- fffff805`d42819e5 488b01 mov rax,qword ptr [rcx]
- EXCEPTION_PARAMETER2: ffffffffffffffff
- BUGCHECK_STR: 0x1E_c0000005_R
- CPU_COUNT: 4
- CPU_MHZ: f99
- CPU_VENDOR: AuthenticAMD
- CPU_FAMILY: 15
- CPU_MODEL: 30
- CPU_STEPPING: 1
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- PROCESS_NAME: System
- CURRENT_IRQL: 2
- DPC_STACK_BASE: FFFFF80367862FB0
- EXCEPTION_RECORD: 0000000000000200 -- (.exr 0x200)
- Cannot read Exception record @ 0000000000000200
- LAST_CONTROL_TRANSFER: from fffff80365c040b6 to fffff80365b754c0
- STACK_TEXT:
- fffff803`67861048 fffff803`65c040b6 : 00000000`0000001e ffffffff`c0000005 fffff805`d42819e5 00000000`00000000 : nt!KeBugCheckEx
- fffff803`67861050 fffff803`65b7b99d : fffff803`65d93000 fffff803`65a09000 00053694`00889000 00000000`00000000 : nt!KiFatalExceptionHandler+0x22
- fffff803`67861090 fffff803`65a34d94 : 00000000`00000000 fffff803`678611c0 00000000`00000000 fffff805`d8eda7ca : nt!RtlpExecuteHandlerForException+0xd
- fffff803`678610c0 fffff803`65a33b36 : fffff803`67861f98 fffff803`67861ce0 fffff803`67861f98 fffff803`67861f98 : nt!RtlDispatchException+0x404
- fffff803`678617b0 fffff803`65b8098e : 00000000`00000200 ffff9700`00007a20 fffff803`67861f6c 00000000`00000008 : nt!KiDispatchException+0x1f6
- fffff803`67861e60 fffff803`65b7ec34 : ffff9f00`00000103 ffff9f04`4efc2940 00000000`00000000 00000000`00000102 : nt!KiExceptionDispatch+0xce
- fffff803`67862040 fffff805`d42819e5 : 00000000`00000002 ffff9f04`46fbfa18 ffff9f04`47a00000 00000000`00000001 : nt!KiGeneralProtectionFault+0xf4
- fffff803`678621d0 fffff805`d42a6453 : ffff9f04`4794d530 ffff9f04`47846e20 ffff9f04`47846e20 ffff9f04`47308018 : Wdf01000!FxRequestContext::ReleaseAndRestore+0x55
- fffff803`67862210 fffff805`d4255311 : ffff9f04`4602fc50 ffff9f04`4602fc50 00000000`0000002b fffff805`d4278f48 : Wdf01000!FxRequestBase::ValidateTarget+0x44c93
- fffff803`67862260 fffff805`d428cf00 : ffff9f04`4602fc50 fffff803`67862330 000060fb`b86b2908 00000000`00000000 : Wdf01000!FxFormatUrbRequest+0x2d
- fffff803`678622b0 fffff805`dc131fae : ffff9f04`4794d758 ffff9f04`47862850 ffff9f04`4794d770 ffff9f04`47862850 : Wdf01000!imp_WdfUsbTargetPipeFormatRequestForUrb+0x180
- fffff803`67862360 ffff9f04`4794d758 : ffff9f04`47862850 ffff9f04`4794d770 ffff9f04`47862850 00000000`00000000 : rtwlanu+0x41fae
- fffff803`67862368 ffff9f04`47862850 : ffff9f04`4794d770 ffff9f04`47862850 00000000`00000000 fffff805`dc407ddd : 0xffff9f04`4794d758
- fffff803`67862370 ffff9f04`4794d770 : ffff9f04`47862850 00000000`00000000 fffff805`dc407ddd 00000000`00000000 : 0xffff9f04`47862850
- fffff803`67862378 ffff9f04`47862850 : 00000000`00000000 fffff805`dc407ddd 00000000`00000000 ffff9f04`48350140 : 0xffff9f04`4794d770
- fffff803`67862380 00000000`00000000 : fffff805`dc407ddd 00000000`00000000 ffff9f04`48350140 00000000`00000000 : 0xffff9f04`47862850
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff80365c89383-fffff80365c89385 3 bytes - nt!ExFreePoolWithTag+363
- [ 40 fb f6:c0 d7 af ]
- 3 errors : !nt (fffff80365c89383-fffff80365c89385)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-08-02T08:14:56.000Z
- OSBUILD: 15063
- OSSERVICEPACK: 483
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.15063.483
- ANALYSIS_SESSION_ELAPSED_TIME: 2aaa
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- ========================================================================
- =================== Dump File: 080217-7015-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Kernel base = 0xfffff802`b5a8a000 PsLoadedModuleList = 0xfffff802`b5dd65e0
- Debug session time: Wed Aug 2 05:14:00.176 2017 (UTC - 4:00)
- System Uptime: 0 days 0:58:36.849
- BugCheck 1A, {41792, ffffcd00f2040d20, 8800000000000000, 0}
- Probably caused by : memory_corruption
- Followup: memory_corruption
- MEMORY_MANAGEMENT (1a)
- # Any other values for parameter 1 must be individually examined.
- Arguments:
- Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
- the PTE. Parameters 3/4 contain the low/high parts of the PTE.
- Arg2: ffffcd00f2040d20
- Arg3: 8800000000000000
- Arg4: 0000000000000000
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: P2.60
- BIOS_DATE: 12/11/2015
- BASEBOARD_MANUFACTURER: ASRock
- BASEBOARD_PRODUCT: FM2A88X+ Killer
- BASEBOARD_VERSION:
- DUMP_TYPE: 2
- BUGCHECK_STR: 0x1a_41792
- CPU_COUNT: 4
- CPU_MHZ: f99
- CPU_VENDOR: AuthenticAMD
- CPU_FAMILY: 15
- CPU_MODEL: 30
- CPU_STEPPING: 1
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- PROCESS_NAME: svchost.exe
- CURRENT_IRQL: 2
- LAST_CONTROL_TRANSFER: from fffff802b5c29cb0 to fffff802b5bf64c0
- STACK_TEXT:
- ffffb980`f6183238 fffff802`b5c29cb0 : 00000000`0000001a 00000000`00041792 ffffcd00`f2040d20 88000000`00000000 : nt!KeBugCheckEx
- ffffb980`f6183240 fffff802`b5b095bd : ffff8c8b`387fed88 ffff8c8b`3a97f7c0 ffff8c8b`387fed88 ffff8c8b`387fe7c0 : nt!MiDeleteVirtualAddresses+0x11b960
- ffffb980`f61834f0 fffff802`b608f3fd : ffffe306`8daf7b88 ffffe306`8daf7b88 00000000`c0000045 00000000`00000000 : nt!MiDeleteVad+0x3ad
- ffffb980`f6183670 fffff802`b5f3cabd : ffff8c8b`3bd078d0 ffff8c8b`387fe7c0 ffffb980`f6183a30 ffffb980`f6183a40 : nt!MiMapViewOfDataSection+0x15272d
- ffffb980`f61837a0 fffff802`b5f18c69 : ffff8c8b`387fe7c0 ffffb980`f6183a50 ffff8c8b`34f30b50 fffff802`b5d0f888 : nt!MiMapViewOfSection+0x25d
- ffffb980`f6183920 fffff802`b5f19028 : ffffe306`93aee7f0 ffffe306`8e135410 ffff8c8b`3a97fb40 fffff802`b5aed059 : nt!MmMapSecureViewOfSection+0x65
- ffffb980`f6183990 fffff802`b5fa9863 : 00000000`00000000 00000000`00009000 00000000`00000000 ffff8c8b`34f30cb0 : nt!AlpcpCreateView+0x128
- ffffb980`f6183a30 fffff802`b5fa9350 : 00000000`00000000 ffffb980`f6183b80 00007fff`b3e54401 ffffb980`f6183b80 : nt!AlpcpCreateSectionView+0x87
- ffffb980`f6183a80 fffff802`b5c01413 : ffff8c8b`3a97f7c0 00007fff`b3e544b4 000001e4`07f1e790 00000000`00000000 : nt!NtAlpcCreateSectionView+0x130
- ffffb980`f6183b00 00007fff`b51f62f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
- 00000035`d74fe648 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`b51f62f4
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff802b5b120ee-fffff802b5b120ef 2 bytes - nt!MiGetNextPageTable+19e
- [ 80 f6:00 cd ]
- fffff802b5b12121-fffff802b5b12122 2 bytes - nt!MiGetNextPageTable+1d1 (+0x33)
- [ 80 f6:00 cd ]
- 4 errors : !nt (fffff802b5b120ee-fffff802b5b12122)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-08-02T09:14:00.000Z
- OSBUILD: 15063
- OSSERVICEPACK: 483
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.15063.483
- ANALYSIS_SESSION_ELAPSED_TIME: 32cf
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- ========================================================================
- =================== Dump File: 080217-7140-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Kernel base = 0xfffff802`1d090000 PsLoadedModuleList = 0xfffff802`1d3dc5e0
- Debug session time: Wed Aug 2 01:01:23.933 2017 (UTC - 4:00)
- System Uptime: 0 days 0:17:08.399
- BugCheck 1A, {41792, ffffd70000385d08, 1000000000000000, 0}
- Probably caused by : memory_corruption
- Followup: memory_corruption
- MEMORY_MANAGEMENT (1a)
- # Any other values for parameter 1 must be individually examined.
- Arguments:
- Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
- the PTE. Parameters 3/4 contain the low/high parts of the PTE.
- Arg2: ffffd70000385d08
- Arg3: 1000000000000000
- Arg4: 0000000000000000
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: P2.60
- BIOS_DATE: 12/11/2015
- BASEBOARD_MANUFACTURER: ASRock
- BASEBOARD_PRODUCT: FM2A88X+ Killer
- BASEBOARD_VERSION:
- DUMP_TYPE: 2
- MEMORY_CORRUPTOR: LARGE
- BUGCHECK_STR: 0x1a_41792
- CPU_COUNT: 4
- CPU_MHZ: f99
- CPU_VENDOR: AuthenticAMD
- CPU_FAMILY: 15
- CPU_MODEL: 30
- CPU_STEPPING: 1
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- PROCESS_NAME: GameScannerService.exe
- CURRENT_IRQL: 2
- STACK_TEXT:
- ffffaf80`a96f0218 fffff802`1d22fcb0 : 00000000`0000001a 00000000`00041792 ffffd700`00385d08 10000000`00000000 : nt!KeBugCheckEx
- ffffaf80`a96f0220 fffff802`1d10f5bd : ffff9f86`f3c3cd88 ffff9f86`ea7a67c0 ffff9f86`f3c3cd88 ffff9f86`f3c3c7c0 : nt!MiDeleteVirtualAddresses+0x11b960
- ffffaf80`a96f04d0 fffff802`1d51c217 : ffff9f86`ea7a67c0 ffff9f86`f4195c50 ffff9f86`f4195c50 ffff9f86`ea7a67c0 : nt!MiDeleteVad+0x3ad
- ffffaf80`a96f0650 fffff802`1d51c6fe : 00000000`00000000 ffff9f86`f4547f70 ffff9f86`f4195c50 ffff9f86`f3c3c7c0 : nt!MiCleanVad+0x27
- ffffaf80`a96f0680 fffff802`1d55a54f : 00000000`00040000 00000000`00000000 ffff9f86`f3c3c7c0 ffff9f86`00000000 : nt!MmCleanProcessAddressSpace+0x13e
- ffffaf80`a96f0700 fffff802`1d4ca8b1 : ffff9f86`f3c3c7c0 ffffc68c`1e0c2a70 ffffaf80`a96f0910 00000000`00000000 : nt!PspRundownSingleProcess+0x11f
- ffffaf80`a96f0780 fffff802`1d5ca313 : 00000000`c0000005 00000000`00000001 00000000`00fcf000 ffffaf80`a96f0b80 : nt!PspExitThread+0x57d
- ffffaf80`a96f0880 fffff802`1d0c55d3 : 00000000`00000000 00000000`00000000 ffffaf80`a96f0a60 fffff802`00000001 : nt!KiSchedulerApcTerminate+0x33
- ffffaf80`a96f08c0 fffff802`1d1ffb60 : 00000000`0129dcf0 00000000`00000000 00000000`0454ecc8 ffffaf80`00000000 : nt!KiDeliverApc+0x313
- ffffaf80`a96f0950 fffff802`1d2074ba : ffff9f86`ea7a67c0 00000000`0454ecc8 ffffaf80`a96f0aa8 00000000`00000001 : nt!KiInitiateUserApc+0x70
- ffffaf80`a96f0a90 00000000`6df621cc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
- 00000000`0454eca8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x6df621cc
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff8021d310383-fffff8021d310385 3 bytes - nt!ExFreePoolWithTag+363
- [ 40 fb f6:80 6b d7 ]
- 3 errors : !nt (fffff8021d310383-fffff8021d310385)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-08-02T05:01:23.000Z
- OSBUILD: 15063
- OSSERVICEPACK: 483
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.15063.483
- ANALYSIS_SESSION_ELAPSED_TIME: 2b8f
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- ========================================================================
- =================== Dump File: 073017-7312-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Kernel base = 0xfffff802`68a9b000 PsLoadedModuleList = 0xfffff802`68de75e0
- Debug session time: Sat Jul 29 15:00:30.043 2017 (UTC - 4:00)
- System Uptime: 0 days 5:56:21.730
- BugCheck EF, {ffffdd8fd11ec7c0, 0, 0, 0}
- errfg" bg="errbg">ETW minidump data unavailable
- Probably caused by : ntkrnlmp.exe ( nt!PspCatchCriticalBreak+c9 )
- Followup: MachineOwner
- CRITICAL_PROCESS_DIED (ef)
- A critical system process died
- Arguments:
- Arg1: ffffdd8fd11ec7c0, Process object or thread object
- Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
- Arg3: 0000000000000000
- Arg4: 0000000000000000
- Debugging Details:
- ETW minidump data unavailable
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: P2.60
- BIOS_DATE: 12/11/2015
- BASEBOARD_MANUFACTURER: ASRock
- BASEBOARD_PRODUCT: FM2A88X+ Killer
- BASEBOARD_VERSION:
- DUMP_TYPE: 2
- PROCESS_NAME: svchost.exe
- CRITICAL_PROCESS: svchost.exe
- EXCEPTION_CODE: (NTSTATUS) 0xd360e080 - <Unable to get error code text>
- ERROR_CODE: (NTSTATUS) 0xd360e080 - <Unable to get error code text>
- CPU_COUNT: 4
- CPU_MHZ: f99
- CPU_VENDOR: AuthenticAMD
- CPU_FAMILY: 15
- CPU_MODEL: 30
- CPU_STEPPING: 1
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- BUGCHECK_STR: 0xEF
- CURRENT_IRQL: 0
- LAST_CONTROL_TRANSFER: from fffff8026917b071 to fffff80268c074c0
- STACK_TEXT:
- ffffbb00`25757988 fffff802`6917b071 : 00000000`000000ef ffffdd8f`d11ec7c0 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
- ffffbb00`25757990 fffff802`690b6c47 : ffffdd8f`d11ec7c0 00000000`00000000 ffffdd8f`d11ec7c0 ffffdd8f`d11ec7c0 : nt!PspCatchCriticalBreak+0xc9
- ffffbb00`257579e0 fffff802`68f96186 : ffffdd8f`00000000 ffffdd8f`d11ec7c0 00000000`00000000 ffffdd8f`d11ec7c0 : nt!PspTerminateAllThreads+0x1209bb
- ffffbb00`25757a50 fffff802`68f95f47 : ffffffff`ffffffff ffffdd8f`d11ec7c0 ffffdd8f`d11ec7c0 00000000`00000001 : nt!PspTerminateProcess+0xde
- ffffbb00`25757a90 fffff802`68c12413 : ffffdd8f`d11ec7c0 ffffdd8f`d360e080 ffffbb00`25757b80 00000034`b18ff600 : nt!NtTerminateProcess+0xa7
- ffffbb00`25757b00 00007ff9`9aa45924 : 00007ff9`9aaa5d3f 00000034`b18fd6e0 00007ff9`9aad6598 00000034`b18ff600 : nt!KiSystemServiceCopyEnd+0x13
- 00000034`b18fd5a8 00007ff9`9aaa5d3f : 00000034`b18fd6e0 00007ff9`9aad6598 00000034`b18ff600 00000008`00000000 : 0x00007ff9`9aa45924
- 00000034`b18fd5b0 00000034`b18fd6e0 : 00007ff9`9aad6598 00000034`b18ff600 00000008`00000000 00000000`00000006 : 0x00007ff9`9aaa5d3f
- 00000034`b18fd5b8 00007ff9`9aad6598 : 00000034`b18ff600 00000008`00000000 00000000`00000006 00007ff9`9aa4cf9d : 0x00000034`b18fd6e0
- 00000034`b18fd5c0 00000034`b18ff600 : 00000008`00000000 00000000`00000006 00007ff9`9aa4cf9d 00007ff9`9aad6598 : 0x00007ff9`9aad6598
- 00000034`b18fd5c8 00000008`00000000 : 00000000`00000006 00007ff9`9aa4cf9d 00007ff9`9aad6598 00000000`00000003 : 0x00000034`b18ff600
- 00000034`b18fd5d0 00000000`00000006 : 00007ff9`9aa4cf9d 00007ff9`9aad6598 00000000`00000003 00000000`00000000 : 0x00000008`00000000
- 00000034`b18fd5d8 00007ff9`9aa4cf9d : 00007ff9`9aad6598 00000000`00000003 00000000`00000000 00007ff9`9a4a1256 : 0x6
- 00000034`b18fd5e0 00007ff9`9aad6598 : 00000000`00000003 00000000`00000000 00007ff9`9a4a1256 00007ff9`9a55d480 : 0x00007ff9`9aa4cf9d
- 00000034`b18fd5e8 00000000`00000003 : 00000000`00000000 00007ff9`9a4a1256 00007ff9`9a55d480 00007ff9`9a460000 : 0x00007ff9`9aad6598
- 00000034`b18fd5f0 00000000`00000000 : 00007ff9`9a4a1256 00007ff9`9a55d480 00007ff9`9a460000 00000000`000416b6 : 0x3
- STACK_COMMAND: kb
- THREAD_SHA1_HASH_MOD_FUNC: 042a2b51772309c39e12d732cc93cacf0af3064e
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: fc10ecd29a9db0f986cc1d740175a75d350c5136
- THREAD_SHA1_HASH_MOD: ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693
- FOLLOWUP_IP:
- nt!PspCatchCriticalBreak+c9
- fffff802`6917b071 cc int 3
- FAULT_INSTR_CODE: ff8440cc
- SYMBOL_STACK_INDEX: 1
- SYMBOL_NAME: nt!PspCatchCriticalBreak+c9
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- DEBUG_FLR_IMAGE_TIMESTAMP: 595f24eb
- IMAGE_VERSION: 10.0.15063.483
- BUCKET_ID_FUNC_OFFSET: c9
- FAILURE_BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_d360e080_nt!PspCatchCriticalBreak
- BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_d360e080_nt!PspCatchCriticalBreak
- PRIMARY_PROBLEM_CLASS: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_d360e080_nt!PspCatchCriticalBreak
- TARGET_TIME: 2017-07-29T19:00:30.000Z
- OSBUILD: 15063
- OSSERVICEPACK: 483
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.15063.483
- ANALYSIS_SESSION_ELAPSED_TIME: dc4
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:0xef_svchost.exe_bugcheck_critical_process_d360e080_nt!pspcatchcriticalbreak
- FAILURE_ID_HASH: {a0cce699-5522-299b-48e8-ce2e8105bd0c}
- Followup: MachineOwner
- ========================================================================
- =================== Dump File: 073117-25546-01.dmp ===================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Kernel base = 0xfffff802`21a89000 PsLoadedModuleList = 0xfffff802`21dd55e0
- Debug session time: Sun Jul 30 14:03:58.720 2017 (UTC - 4:00)
- System Uptime: 0 days 11:05:00.396
- BugCheck 1C7, {0, ffffbe8e6ba26000, 949ca35a, 3cd9656a}
- *** WARNING: Unable to verify timestamp for win32k.sys
- *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
- Probably caused by : memory_corruption
- Followup: memory_corruption
- Unknown bugcheck code (1c7)
- Unknown bugcheck description
- Arguments:
- Arg1: 0000000000000000
- Arg2: ffffbe8e6ba26000
- Arg3: 00000000949ca35a
- Arg4: 000000003cd9656a
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: P2.60
- BIOS_DATE: 12/11/2015
- BASEBOARD_MANUFACTURER: ASRock
- BASEBOARD_PRODUCT: FM2A88X+ Killer
- BASEBOARD_VERSION:
- DUMP_TYPE: 2
- CPU_COUNT: 4
- CPU_MHZ: e6d
- CPU_VENDOR: AuthenticAMD
- CPU_FAMILY: 15
- CPU_MODEL: 30
- CPU_STEPPING: 1
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- BUGCHECK_STR: 0x1C7
- PROCESS_NAME: MemCompression
- CURRENT_IRQL: 0
- LAST_CONTROL_TRANSFER: from fffff80221c3ce35 to fffff80221bf54c0
- STACK_TEXT:
- ffffcf80`0923e978 fffff802`21c3ce35 : 00000000`000001c7 00000000`00000000 ffffbe8e`6ba26000 00000000`949ca35a : nt!KeBugCheckEx
- ffffcf80`0923e980 fffff802`21b566d9 : 6cecbe06`3cd9656a ffffbe8e`69d63050 ffffcf80`0923ea69 ffffbe8e`69d63050 : nt!SmHpBufferProtect+0xe6675
- ffffcf80`0923e9d0 fffff802`21b5815b : 00000000`20121266 ffffcf80`0923ea69 ffffbe8e`69d63050 00000000`201212c1 : nt!ST_STORE<SM_TRAITS>::StDmPageRecordUnprotect+0x15
- ffffcf80`0923ea00 fffff802`21b51946 : 00000000`00045279 ffffbe8e`6b0f46b0 00000000`00000000 fffff802`00000000 : nt!ST_STORE<SM_TRAITS>::StDmPageRemove+0x12f
- ffffcf80`0923ead0 fffff802`21b5106f : ffffbe8e`69d63000 ffffcf80`0923eb98 00000000`00000000 ffffbe8e`69d607c0 : nt!ST_STORE<SM_TRAITS>::StWorkItemProcess+0xbe
- ffffcf80`0923eb20 fffff802`21ba3fe1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SMKM_STORE<SM_TRAITS>::SmStWorker+0x2e7
- ffffcf80`0923ebe0 fffff802`21b65ac7 : ffffbe8e`69d63000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkerThread+0x11
- ffffcf80`0923ec10 fffff802`21bfa946 : fffff802`20630180 ffffbe8e`69d607c0 fffff802`21b65a80 00000000`00000000 : nt!PspSystemThreadStartup+0x47
- ffffcf80`0923ec60 00000000`00000000 : ffffcf80`0923f000 ffffcf80`09239000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff80221b2ef4a-fffff80221b2ef4b 2 bytes - nt!MmSetPfnListPriorities+13a
- [ 80 fa:00 97 ]
- 2 errors : !nt (fffff80221b2ef4a-fffff80221b2ef4b)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-07-30T18:03:58.000Z
- OSBUILD: 15063
- OSSERVICEPACK: 483
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.15063.483
- ANALYSIS_SESSION_ELAPSED_TIME: 2a05
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement