Guest User

Untitled

a guest
Aug 13th, 2017
462
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 29.78 KB | None | 0 0
  1. Microsoft (R) Windows Debugger Version 10.0.14321.1024 X86
  2. Copyright (c) Microsoft Corporation. All rights reserved.
  3.  
  4. Auto Dump Analyzer by gardenman
  5. Time to debug file(s): 00 hours and 01 minutes and 13 seconds
  6.  
  7. ============================= SYSTEM INFO ==============================
  8. VERSION: 1.0
  9. PRODUCT_NAME: MS-7A63
  10. MANUFACTURER: MSI
  11.  
  12. =========================== BRIEF BIOS INFO ============================
  13. DATE: 06/27/2017
  14. VERSION: 1.50
  15. VENDOR: American Megatrends Inc.
  16.  
  17. =========================== MOTHERBOARD INFO ===========================
  18. VERSION: 1.0
  19. PRODUCT: Z270 GAMING PRO CARBON (MS-7A63)
  20. MANUFACTURER: MSI
  21.  
  22. =============================== CPU INFO ===============================
  23. Processor Version: Intel(R) Core(TM) i7-7700K CPU @ 4.20GHz
  24. MICROCODE: 6,9e,9,0 (F,M,S,R) SIG: 5E'00000000 (cache) 5E'00000000 (init)
  25. STEPPING: 9
  26. MODEL: 9e
  27. FAMILY: 6
  28. VENDOR: GenuineIntel
  29. MHZ: 4200
  30. COUNT: 8
  31.  
  32. =============================== OS INFO ================================
  33. BUILDOSVER: 10.0.15063.0
  34. BUILDLAB: WinBuild
  35. BUILDDATESTAMP: 160101.0800
  36. BUILD_TIMESTAMP: 2017-03-18 00:40:44
  37. EDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  38. NAME: Windows 10
  39. PLATFORM_TYPE: x64
  40. SERVICEPACK: 0
  41. BUILD: 15063
  42. BUILD_VERSION: 10.0.15063.0 (WinBuild.160101.0800)
  43. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  44.  
  45. ========================================================================
  46. ==================== Dump File: 081317-2359-01.dmp =====================
  47. ========================================================================
  48. Mini Kernel Dump File: Only registers and stack trace are available
  49. Windows 10 Kernel Version 15063 MP (8 procs) Free x64
  50. Kernel base = 0xfffff801`0f09b000 PsLoadedModuleList = 0xfffff801`0f3e75a0
  51. Debug session time: Sun Aug 13 13:20:32.702 2017 (UTC - 4:00)
  52. System Uptime: 0 days 0:20:46.463
  53.  
  54. BugCheck F7, {7600711f83c0, bdafbde7e409, ffff425042181bf6, 0}
  55. Probably caused by : ntkrnlmp.exe ( nt!_report_gsfailure+25 )
  56. Followup: MachineOwner
  57.  
  58. DRIVER_OVERRAN_STACK_BUFFER (f7)
  59. A driver has overrun a stack-based buffer. This overrun could potentially
  60. allow a malicious user to gain control of this machine.
  61. DESCRIPTION
  62. A driver overran a stack-based buffer (or local variable) in a way that would
  63. have overwritten the function's return address and jumped back to an arbitrary
  64. address when the function returned. This is the classic "buffer overrun"
  65. hacking attack and the system has been brought down to prevent a malicious user
  66. from gaining complete control of it.
  67. Do a kb to get a stack backtrace -- the last routine on the stack before the
  68. buffer overrun handlers and bugcheck call is the one that overran its local
  69. variable(s).
  70.  
  71. Arguments:
  72. Arg1: 00007600711f83c0, Actual security check cookie from the stack
  73. Arg2: 0000bdafbde7e409, Expected security check cookie
  74. Arg3: ffff425042181bf6, Complement of the expected security check cookie
  75. Arg4: 0000000000000000, zero
  76.  
  77. Debugging Details:
  78. DUMP_CLASS: 1
  79. DUMP_QUALIFIER: 400
  80. DUMP_TYPE: 2
  81. DUMP_FILE_ATTRIBUTES: 0x8
  82. Kernel Generated Triage Dump
  83. SECURITY_COOKIE: Expected 0000bdafbde7e409 found 00007600711f83c0
  84. CUSTOMER_CRASH_COUNT: 1
  85. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  86. BUGCHECK_STR: 0xF7
  87.  
  88. PROCESS_NAME: svchost.exe
  89.  
  90. CURRENT_IRQL: 2
  91. LAST_CONTROL_TRANSFER: from fffff8010f2756c5 to fffff8010f206fd0
  92. STACK_TEXT:
  93. ffff9a80`72939f08 fffff801`0f2756c5 : 00000000`000000f7 00007600`711f83c0 0000bdaf`bde7e409 ffff4250`42181bf6 : nt!KeBugCheckEx
  94. ffff9a80`72939f10 fffff801`0f0e56a0 : ffffc702`41550000 ffff9a80`72939f90 00000000`00000000 ffff9555`00000000 : nt!_report_gsfailure+0x25
  95. ffff9a80`72939f50 fffff801`0f0e554e : 00000000`00000100 ffffc702`415518c0 00000000`00000000 ffff9a80`7293a118 : nt!MiIdentifyPfn+0x100
  96. ffff9a80`7293a020 fffff801`0f50fa7a : 00000000`00000000 ffffc702`41551158 ffffc702`41550000 00000000`00000000 : nt!MiIdentifyPfnWrapper+0x3e
  97. ffff9a80`7293a050 fffff801`0f50f58f : ffffb089`c71cfac0 00000000`00000001 ffff9a80`7293a234 ffffc702`41550000 : nt!PfpPfnPrioRequest+0xca
  98. ffff9a80`7293a0d0 fffff801`0f50d7ee : 00000000`0000004f ffff957d`46080000 00000086`5fe7a008 00000000`00000000 : nt!PfQuerySuperfetchInformation+0x2bf
  99. ffff9a80`7293a200 fffff801`0f50d49b : 00000000`00079795 00000086`5fe7a060 00000000`00000000 00000000`00000008 : nt!ExpQuerySystemInformation+0x22e
  100. ffff9a80`7293aa40 fffff801`0f211f13 : ffffc702`420e8080 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtQuerySystemInformation+0x2b
  101. ffff9a80`7293aa80 00007ff8`2fd35a74 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
  102. 00000086`5fe79f08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`2fd35a74
  103. STACK_COMMAND: kb
  104. THREAD_SHA1_HASH_MOD_FUNC: 0621696229749f19418dfeecf88f4c3d2bd5058e
  105. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 1e0bc3642c40aa307336c381675ee4a94c42db8e
  106. THREAD_SHA1_HASH_MOD: 9f457f347057f10e1df248e166a3e95e6570ecfe
  107. FOLLOWUP_IP:
  108. nt!_report_gsfailure+25
  109. fffff801`0f2756c5 cc int 3
  110. FAULT_INSTR_CODE: cccccccc
  111. SYMBOL_STACK_INDEX: 1
  112. SYMBOL_NAME: nt!_report_gsfailure+25
  113. FOLLOWUP_NAME: MachineOwner
  114. MODULE_NAME: nt
  115.  
  116. IMAGE_NAME: ntkrnlmp.exe
  117.  
  118. DEBUG_FLR_IMAGE_TIMESTAMP: 58ccba4c
  119. IMAGE_VERSION: 10.0.15063.0
  120. BUCKET_ID_FUNC_OFFSET: 25
  121. FAILURE_BUCKET_ID: 0xF7_MISSING_GSFRAME_nt!_report_gsfailure
  122. BUCKET_ID: 0xF7_MISSING_GSFRAME_nt!_report_gsfailure
  123. PRIMARY_PROBLEM_CLASS: 0xF7_MISSING_GSFRAME_nt!_report_gsfailure
  124. TARGET_TIME: 2017-08-13T17:20:32.000Z
  125. SUITE_MASK: 784
  126. PRODUCT_TYPE: 1
  127. USER_LCID: 0
  128. FAILURE_ID_HASH_STRING: km:0xf7_missing_gsframe_nt!_report_gsfailure
  129. FAILURE_ID_HASH: {82d2c1b5-b0cb-60a5-9a5d-78c8c4284f84}
  130. Followup: MachineOwner
  131.  
  132. ========================================================================
  133. ========================== 3RD PARTY DRIVERS ===========================
  134. ========================================================================
  135. Image path: IntcDAud.sys
  136. Image name: IntcDAud.sys
  137. Info Link : http://www.carrona.org/drivers/driver.php?id=IntcDAud.sys
  138. ADA Info : IntelĀ® Display Audio Driver http://www.intel.com/
  139. Timestamp : Thu Dec 1 2016
  140.  
  141. Image path: e1d65x64.sys
  142. Image name: e1d65x64.sys
  143. Info Link : http://www.carrona.org/drivers/driver.php?id=e1d65x64.sys
  144. ADA Info : Intel(R) Gigabit Adapter NDIS 6.x driver https://downloadcenter.intel.com/
  145. Timestamp : Sun Mar 19 2017
  146.  
  147. Image path: RTKVHD64.sys
  148. Image name: RTKVHD64.sys
  149. Info Link : http://www.carrona.org/drivers/driver.php?id=RTKVHD64.sys
  150. ADA Info : Realtek Audio Driver system driver http://www.realtek.com.tw
  151. Timestamp : Wed Jul 19 2017
  152.  
  153. Image path: igdkmd64.sys
  154. Image name: igdkmd64.sys
  155. Info Link : http://www.carrona.org/drivers/driver.php?id=igdkmd64.sys
  156. ADA Info : Intel HD graphics driver
  157. Timestamp : Sat Dec 10 2016
  158.  
  159. Image path: TeeDriverW8x64.sys
  160. Image name: TeeDriverW8x64.sys
  161. Info Link : http://www.carrona.org/drivers/driver.php?id=TeeDriverW8x64.sys
  162. ADA Info : IntelĀ® Management Engine Interface
  163. Timestamp : Sun Feb 12 2017
  164.  
  165. ========================================================================
  166. ========================== MICROSOFT DRIVERS ===========================
  167. ========================================================================
  168. ACPI.sys ACPI Driver for NT (Microsoft)
  169. acpiex.sys ACPIEx Driver (Microsoft)
  170. acpipagr.sys ACPI Processor Aggregator Device Driver
  171. afd.sys Ancillary Function Driver for WinSock (Microsoft)
  172. ahcache.sys Application Compatibility Cache (Microsoft)
  173. BasicDisplay.sys Basic Display Driver (Microsoft)
  174. BasicRender.sys Basic Render Driver (Microsoft)
  175. Beep.SYS BEEP Driver (Microsoft)
  176. BOOTVID.dll VGA Boot Driver (Microsoft)
  177. bowser.sys NT Lan Manager Datagram Receiver Driver (Microsoft)
  178. cdd.dll Canonical Display Driver (Microsoft)
  179. cdrom.sys SCSI CD-ROM Driver (Microsoft)
  180. CEA.sys Event Aggregation Kernal Mode Library (Microsoft)
  181. CI.dll Code Integrity Module (Microsoft)
  182. CLASSPNP.SYS SCSI Class System Dll (Microsoft)
  183. CLFS.SYS Common Log File System Driver (Microsoft)
  184. clipsp.sys CLIP Service (Microsoft)
  185. cmimcext.sys Kernal Configuration Manager Initial Con. Driver (Microsoft)
  186. cng.sys Kernal Cryptography, Next Generation Driver (Microsoft)
  187. CompositeBus.sys Multi-Transport Composite Bus Enumerator (Microsoft)
  188. condrv.sys Console Driver (Microsoft)
  189. crashdmp.sys Crash Dump Driver
  190. dfsc.sys DFS Namespace Client Driver (Microsoft)
  191. disk.sys PnP Disk Driver (Microsoft)
  192. drmk.sys Digital Rights Management (DRM) driver (Microsoft)
  193. dump_dumpfve.sys Bitlocker Drive Encryption Crashdump Filter
  194. dump_stornvme.sys Microsoft NVM Express Storport Miniport Driver
  195. dump_storport.sys Provides disk access during crash dump file generation (Microsoft)
  196. dxgkrnl.sys DirectX Graphics Kernal (Microsoft)
  197. dxgmms2.sys DirectX Graphics MMS
  198. EhStorClass.sys Enhanced Storage Class driver for IEEE... (Microsoft)
  199. fastfat.SYS Fast FAT File System Driver (Microsoft)
  200. filecrypt.sys Windows sandboxing and encryption filter (Microsoft)
  201. fileinfo.sys FileInfo Filter Driver (Microsoft)
  202. FLTMGR.SYS Filesystem Filter Manager (Microsoft)
  203. Fs_Rec.sys File System Recognizer Driver (Microsoft)
  204. fvevol.sys BitLocker Driver Encryption Driver (Microsoft)
  205. fwpkclnt.sys FWP/IPsec Kernal-Mode API (Microsoft)
  206. gpuenergydrv.sys GPU Energy Kernal Driver (Microsoft)
  207. hal.dll Hardware Abstraction Layer DLL (Microsoft)
  208. HDAudBus.sys High Definition Audio Bus Driver (Microsoft)
  209. HIDCLASS.SYS Hid Class Library
  210. HIDPARSE.SYS Hid Parsing Library (Microsoft)
  211. hidusb.sys USB Miniport Driver for Input Devices (Microsoft)
  212. HTTP.sys HTTP Protocol Stack (Microsoft)
  213. intelpep.sys Intel Power Engine Plugin (Microsoft)
  214. intelppm.sys Processor Device Driver (Microsoft)
  215. iorate.sys I/O rate control Filter (Microsoft)
  216. kbdclass.sys Keyboard Class Driver (Microsoft)
  217. kbdhid.sys HID Mouse Filter Driver or HID Keyboard Filter Driver (Microsoft)
  218. kdcom.dll Kernel Debugger HW Extension DLL (Microsoft)
  219. kdnic.sys Microsoft Kernel Debugger Network Miniport (Microsoft)
  220. ks.sys Kernal CSA Library (Microsoft)
  221. ksecdd.sys Kernel Security Support Provider Interface (Microsoft)
  222. ksecpkg.sys Kernel Security Support Provider Interface Packages (Microsoft)
  223. ksthunk.sys Kernal Streaming WOW Thunk Service (Microsoft)
  224. lltdio.sys Link-Layer Topology Mapper I/O Driver (Microsoft)
  225. luafv.sys LUA File Virtualization Filter Driver (Microsoft)
  226. mcupdate.dll Media Center Update (Microsoft)
  227. mmcss.sys MMCSS Driver (Microsoft)
  228. monitor.sys Monitor Driver (Microsoft)
  229. mouclass.sys Mouse Class Driver (Microsoft)
  230. mouhid.sys HID Mouse Filter Driver (Microsoft)
  231. mountmgr.sys Mount Point Manager (Microsoft)
  232. mpsdrv.sys Microsoft Protection Service Driver (Microsoft)
  233. mrxsmb.sys SMB MiniRedirector Wrapper and Engine (Microsoft)
  234. mrxsmb10.sys Longhorn SMB Downlevel SubRdr (Microsoft)
  235. mrxsmb20.sys Longhorn SMB 2.0 Redirector (Microsoft)
  236. Msfs.SYS Mailslot driver (Microsoft)
  237. msisadrv.sys ISA Driver (Microsoft)
  238. mslldp.sys Microsoft Link-Layer Discovery Protocol... (Microsoft)
  239. msrpc.sys Kernel Remote Procedure Call Provider (Microsoft)
  240. mssmbios.sys System Management BIOS driver (Microsoft)
  241. mup.sys Multiple UNC Provider driver (Microsoft)
  242. ndis.sys Network Driver Interface Specification (NDIS) driver (Microsoft)
  243. NdisVirtualBus.sys Virtual Network Adapter Enumerator (Microsoft)
  244. Ndu.sys Network Data Usage Monitoring driver (Microsoft)
  245. netbios.sys NetBIOS Interface driver (Microsoft)
  246. netbt.sys MBT Transport driver (Microsoft)
  247. NETIO.SYS Network I/O Subsystem (Microsoft)
  248. Npfs.SYS NPFS driver (Microsoft)
  249. npsvctrig.sys Named pipe service triggers (Microsoft)
  250. nsiproxy.sys NSI Proxy driver (Microsoft)
  251. NTFS.sys NT File System Driver (Microsoft)
  252. ntkrnlmp.exe Windows NT operating system kernel (Microsoft)
  253. ntosext.sys NTOS extension host driver
  254. Null.SYS NULL Driver (Microsoft)
  255. pacer.sys QoS Packet Scheduler (Microsoft)
  256. partmgr.sys Partition driver
  257. pci.sys NT Plug and Play PCI Enumerator
  258. pcw.sys Performance Counter Driver (Microsoft)
  259. pdc.sys Power Dependency Coordinator Driver
  260. peauth.sys Protected Environment Authentication and Authorization Export Driver (Microsoft)
  261. portcls.sys Port Class (Class Driver for Port/Miniport Devices)
  262. PSHED.dll Platform Specific Hardware Error Driver
  263. rdbss.sys Redirected Drive Buffering SubSystem Driver
  264. rdpbus.sys Microsoft RDP Bus Device driver
  265. rdyboost.sys ReadyBoost Driver (Microsoft)
  266. registry.sys Registry Containment Driver
  267. rspndr.sys Link-Layer Topology Responder Driver for NDIS 6
  268. SleepStudyHelper.sys Sleep Study Helper
  269. spaceport.sys Storage Spaces Driver
  270. srv.sys Server driver
  271. srv2.sys Smb 2.0 Server driver
  272. srvnet.sys Server Network driver
  273. storahci.sys MS AHCI Storport Miniport Driver
  274. stornvme.sys Microsoft NVM Express Storport Miniport Driver
  275. storport.sys Microsoft Storage Port Driver
  276. storqosflt.sys Storage QoS Filter
  277. swenum.sys Plug and Play Software Device Enumerator
  278. tbs.sys Export driver for kernel mode TPM API
  279. tcpip.sys TCP/IP Driver
  280. tcpipreg.sys TCP/IP Registry Compatibility Driver
  281. TDI.SYS TDI Wrapper driver (Microsoft)
  282. tdx.sys NetIO Legacy TDI x-bit Support Driver (Microsoft)
  283. tm.sys Kernel Transaction Manager Driver
  284. TSDDD.dll Framebuffer Display Driver (Microsoft)
  285. ucx01000.sys USB Controller Extension
  286. UEFI.sys UEFI Driver for NT
  287. umbus.sys User-Mode Bus Enumerator (Microsoft)
  288. usbccgp.sys USB Common Class Generic Parent Driver (Microsoft)
  289. USBD.SYS Universal Serial Bus Driver (Microsoft)
  290. UsbHub3.sys USB3 HUB Driver
  291. USBXHCI.SYS USB XHCI Driver
  292. vdrvroot.sys Virtual Drive Root Enumerator (Microsoft)
  293. vmbkmclr.sys Hyper-V VMBus Root KMCL (Microsoft)
  294. volmgr.sys Volume Manager Driver (Microsoft)
  295. volmgrx.sys Volume Manager Extension Driver (Microsoft)
  296. volsnap.sys Volume Shadow Copy driver (Microsoft)
  297. volume.sys Volume driver (Microsoft)
  298. vwififlt.sys Virtual WiFi Filter Driver (Microsoft)
  299. wanarp.sys MS Remote Access and Routing ARP driver (Microsoft)
  300. watchdog.sys Watchdog driver (Microsoft)
  301. wcifs.sys Windows Container Isolation FS Filter driver (Microsoft)
  302. Wdf01000.sys Kernel Mode Driver Framework Runtime (Microsoft)
  303. WdFilter.sys Microsoft Anti-malware file system filter driver (Microsoft)
  304. WDFLDR.SYS Kernel Mode Driver Framework Loader (Microsoft)
  305. WdNisDrv.sys Microsoft Network Realtime Inspection driver (Microsoft)
  306. werkernel.sys Windows Error Reporting Kernel driver (Microsoft)
  307. wfplwfs.sys WPF NDIS Lightweight Filter driver (Microsoft)
  308. win32k.sys Full/Desktop Multi-User Win32 driver (Microsoft)
  309. win32kbase.sys Base Win32k Kernel Driver (Microsoft)
  310. win32kfull.sys Full/Desktop Win32k Kernel Driver (Microsoft)
  311. WindowsTrustedRT.sys Windows Trusted Runtime Interface driver (Microsoft)
  312. WindowsTrustedRTProxy.sys Windows Trusted Runtime Service Proxy driver (Microsoft)
  313. wmiacpi.sys Windows Management Interface for ACPI (Microsoft)
  314. WMILIB.SYS WMILIB WMI support library DLL (Microsoft)
  315. Wof.sys Windows Overlay Filter (Microsoft)
  316. WppRecorder.sys WPP Trace Recorder (Microsoft)
  317.  
  318. Unloaded modules:
  319. fffff809`aa5c0000 fffff809`aa5c7000 NTIOLib_X64.
  320. fffff809`a8d80000 fffff809`a8d8b000 cldflt.sys
  321. fffff809`a99a0000 fffff809`a99c2000 i8042prt.sys
  322. fffff809`a6a10000 fffff809`a6a1f000 dump_storpor
  323. fffff809`a6a40000 fffff809`a6a5c000 dump_stornvm
  324. fffff809`a6a80000 fffff809`a6a9d000 dump_dumpfve
  325. fffff809`a70d0000 fffff809`a70f0000 dam.sys
  326. fffff809`a5c70000 fffff809`a5c7f000 WdBoot.sys
  327. fffff809`a6920000 fffff809`a692f000 hwpolicy.sys
  328.  
  329. ========================================================================
  330. ============================== BIOS INFO ===============================
  331. ========================================================================
  332. [SMBIOS Data Tables v3.0]
  333. [DMI Version - 0]
  334. [2.0 Calling Convention - No]
  335. [Table Size - 4158 bytes]
  336. [BIOS Information (Type 0) - Length 24 - Handle 0000h]
  337. Vendor American Megatrends Inc.
  338. BIOS Version 1.50
  339. BIOS Starting Address Segment f000
  340. BIOS Release Date 06/27/2017
  341. BIOS ROM Size 1000000
  342. BIOS Characteristics
  343. 07: - PCI Supported
  344. 11: - Upgradeable FLASH BIOS
  345. 12: - BIOS Shadowing Supported
  346. 15: - CD-Boot Supported
  347. 16: - Selectable Boot Supported
  348. 17: - BIOS ROM Socketed
  349. 19: - EDD Supported
  350. 23: - 1.2MB Floppy Supported
  351. 24: - 720KB Floppy Supported
  352. 25: - 2.88MB Floppy Supported
  353. 26: - Print Screen Device Supported
  354. 27: - Keyboard Services Supported
  355. 28: - Serial Services Supported
  356. 29: - Printer Services Supported
  357. 32: - BIOS Vendor Reserved
  358. BIOS Characteristic Extensions
  359. 00: - ACPI Supported
  360. 01: - USB Legacy Supported
  361. 08: - BIOS Boot Specification Supported
  362. 10: - Specification Reserved
  363. 11: - Specification Reserved
  364. BIOS Major Revision 5
  365. BIOS Minor Revision 12
  366. EC Firmware Major Revision 255
  367. EC Firmware Minor Revision 255
  368. [System Information (Type 1) - Length 27 - Handle 0001h]
  369. Manufacturer MSI
  370. Product Name MS-7A63
  371. Version 1.0
  372. UUID 00000000-0000-0000-0000-000000000000
  373. Wakeup Type Power Switch
  374. SKUNumber Default string
  375. Family Default string
  376. [BaseBoard Information (Type 2) - Length 15 - Handle 0002h]
  377. Manufacturer MSI
  378. Product Z270 GAMING PRO CARBON (MS-7A63)
  379. Version 1.0
  380. Feature Flags 09h
  381. Chassis Handle 0003h
  382. Board Type 0ah - Processor/Memory Module
  383. Number of Child Handles 0
  384. [System Enclosure (Type 3) - Length 22 - Handle 0003h]
  385. Manufacturer MSI
  386. Chassis Type Desktop
  387. Version 1.0
  388. Bootup State Safe
  389. Power Supply State Safe
  390. Thermal State Safe
  391. Security Status None
  392. OEM Defined 0
  393. Height 0U
  394. Number of Power Cords 1
  395. Number of Contained Elements 0
  396. Contained Element Size 3
  397. [OEM Strings (Type 11) - Length 5 - Handle 0021h]
  398. Number of Strings 1
  399. 1 Default string
  400. [System Configuration Options (Type 12) - Length 5 - Handle 0022h]
  401. [Physical Memory Array (Type 16) - Length 23 - Handle 003ch]
  402. Location 03h - SystemBoard/Motherboard
  403. Use 03h - System Memory
  404. Memory Error Correction 03h - None
  405. Maximum Capacity 67108864KB
  406. Number of Memory Devices 4
  407. [Memory Device (Type 17) - Length 40 - Handle 003dh]
  408. Physical Memory Array Handle 003ch
  409. Total Width 0 bits
  410. Data Width 0 bits
  411. Form Factor 02h - Unknown
  412. Device Locator ChannelA-DIMM0
  413. Bank Locator BANK 0
  414. Memory Type 02h - Unknown
  415. Type Detail 0000h -
  416. Speed 0MHz
  417. [Memory Device (Type 17) - Length 40 - Handle 003eh]
  418. Physical Memory Array Handle 003ch
  419. Total Width 64 bits
  420. Data Width 64 bits
  421. Size 8192MB
  422. Form Factor 09h - DIMM
  423. Device Locator ChannelA-DIMM1
  424. Bank Locator BANK 1
  425. Memory Type 1ah - Specification Reserved
  426. Type Detail 4080h - Synchronous
  427. Speed 2133MHz
  428. Manufacturer 04CD
  429. Part Number F4-3000C15-8GVKB
  430. [Memory Device (Type 17) - Length 40 - Handle 003fh]
  431. Physical Memory Array Handle 003ch
  432. Total Width 0 bits
  433. Data Width 0 bits
  434. Form Factor 02h - Unknown
  435. Device Locator ChannelB-DIMM0
  436. Bank Locator BANK 2
  437. Memory Type 02h - Unknown
  438. Type Detail 0000h -
  439. Speed 0MHz
  440. [Memory Device (Type 17) - Length 40 - Handle 0040h]
  441. Physical Memory Array Handle 003ch
  442. Total Width 64 bits
  443. Data Width 64 bits
  444. Size 8192MB
  445. Form Factor 09h - DIMM
  446. Device Locator ChannelB-DIMM1
  447. Bank Locator BANK 3
  448. Memory Type 1ah - Specification Reserved
  449. Type Detail 4080h - Synchronous
  450. Speed 2133MHz
  451. Manufacturer 04CD
  452. Part Number F4-3000C15-8GVKB
  453. [Memory Array Mapped Address (Type 19) - Length 31 - Handle 0041h]
  454. Starting Address 00000000h
  455. Ending Address 00ffffffh
  456. Memory Array Handle 003ch
  457. Partition Width 02
  458. [Cache Information (Type 7) - Length 19 - Handle 0042h]
  459. Socket Designation L1 Cache
  460. Cache Configuration 0180h - WB Enabled Int NonSocketed L1
  461. Maximum Cache Size 0100h - 256K
  462. Installed Size 0100h - 256K
  463. Supported SRAM Type 0020h - Synchronous
  464. Current SRAM Type 0020h - Synchronous
  465. Cache Speed 0ns
  466. Error Correction Type ParitySingle-Bit ECC
  467. System Cache Type Unified
  468. Associativity 8-way Set-Associative
  469. [Cache Information (Type 7) - Length 19 - Handle 0043h]
  470. Socket Designation L2 Cache
  471. Cache Configuration 0181h - WB Enabled Int NonSocketed L2
  472. Maximum Cache Size 0400h - 1024K
  473. Installed Size 0400h - 1024K
  474. Supported SRAM Type 0020h - Synchronous
  475. Current SRAM Type 0020h - Synchronous
  476. Cache Speed 0ns
  477. Error Correction Type Multi-Bit ECC
  478. System Cache Type Unified
  479. Associativity 4-way Set-Associative
  480. [Cache Information (Type 7) - Length 19 - Handle 0044h]
  481. Socket Designation L3 Cache
  482. Cache Configuration 0182h - WB Enabled Int NonSocketed L3
  483. Maximum Cache Size 2000h - 8192K
  484. Installed Size 2000h - 8192K
  485. Supported SRAM Type 0020h - Synchronous
  486. Current SRAM Type 0020h - Synchronous
  487. Cache Speed 0ns
  488. Error Correction Type Specification Reserved
  489. System Cache Type Unified
  490. Associativity 16-way Set-Associative
  491. [Processor Information (Type 4) - Length 48 - Handle 0045h]
  492. Socket Designation U3E1
  493. Processor Type Central Processor
  494. Processor Family c6h - Specification Reserved
  495. Processor Manufacturer Intel(R) Corporation
  496. Processor ID e9060900fffbebbf
  497. Processor Version Intel(R) Core(TM) i7-7700K CPU @ 4.20GHz
  498. Processor Voltage 8ch - 1.2V
  499. External Clock 100MHz
  500. Max Speed 8300MHz
  501. Current Speed 4200MHz
  502. Status Enabled Populated
  503. Processor Upgrade Other
  504. L1 Cache Handle 0042h
  505. L2 Cache Handle 0043h
  506. L3 Cache Handle 0044h
  507. [Memory Device Mapped Address (Type 20) - Length 35 - Handle 0046h]
  508. Starting Address 00000000h
  509. Ending Address 007fffffh
  510. Memory Device Handle 003eh
  511. Mem Array Mapped Adr Handle 0041h
  512. Interleave Position 01
  513. Interleave Data Depth 02
  514. [Memory Device Mapped Address (Type 20) - Length 35 - Handle 0047h]
  515. Starting Address 00800000h
  516. Ending Address 00ffffffh
  517. Memory Device Handle 0040h
  518. Mem Array Mapped Adr Handle 0041h
  519. Interleave Position 02
  520. Interleave Data Depth 02
  521.  
  522. ========================================================================
  523. ==================== Dump File: 081317-2125-01.dmp =====================
  524. ========================================================================
  525. Mini Kernel Dump File: Only registers and stack trace are available
  526. Windows 10 Kernel Version 15063 MP (8 procs) Free x64
  527. Kernel base = 0xfffff801`ad21f000 PsLoadedModuleList = 0xfffff801`ad56b5a0
  528. Debug session time: Sun Aug 13 13:22:35.343 2017 (UTC - 4:00)
  529. System Uptime: 0 days 0:00:43.107
  530.  
  531. BugCheck BE, {ffffafffffcfff28, 8a00000003a00121, ffff9a00983bcdc0, a}
  532. Probably caused by : memory_corruption ( nt!MiRaisedIrqlFault+aa4bb )
  533. Followup: MachineOwner
  534.  
  535. ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
  536. An attempt was made to write to readonly memory. The guilty driver is on the
  537. stack trace (and is typically the current instruction pointer).
  538. When possible, the guilty driver's name (Unicode string) is printed on
  539. the bugcheck screen and saved in KiBugCheckDriver.
  540.  
  541. Arguments:
  542. Arg1: ffffafffffcfff28, Virtual address for the attempted write.
  543. Arg2: 8a00000003a00121, PTE contents.
  544. Arg3: ffff9a00983bcdc0, (reserved)
  545. Arg4: 000000000000000a, (reserved)
  546.  
  547. Debugging Details:
  548. DUMP_CLASS: 1
  549. DUMP_QUALIFIER: 400
  550. DUMP_TYPE: 2
  551. DUMP_FILE_ATTRIBUTES: 0x8
  552. Kernel Generated Triage Dump
  553. CUSTOMER_CRASH_COUNT: 1
  554. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  555. BUGCHECK_STR: 0xBE
  556.  
  557. PROCESS_NAME: svchost.exe
  558.  
  559. CURRENT_IRQL: 2
  560. TRAP_FRAME: ffff9a00983bcdc0 -- (.trap 0xffff9a00983bcdc0)
  561. NOTE: The trap frame does not contain all registers.
  562. Some register values may be zeroed or incorrect.
  563. rax=0000000000000000 rbx=0000000000000000 rcx=ffffad0009acf828
  564. rdx=0000000000339a80 rsi=0000000000000000 rdi=0000000000000000
  565. rip=fffff801ad2699d4 rsp=ffff9a00983bcf50 rbp=ffff9a00983bcfb9
  566. r8=0000000000000000 r9=0000000000000000 r10=fffb000000000003
  567. r11=00007ffffffeffff r12=0000000000000000 r13=0000000000000000
  568. r14=0000000000000000 r15=0000000000000000
  569. iopl=0 nv up ei ng nz na pe nc
  570. nt!MiIdentifyPfn+0x434:
  571. fffff801`ad2699d4 f0480fba6e183f lock bts qword ptr [rsi+18h],3Fh ds:00000000`00000018=????????????????
  572. Resetting default scope
  573. LAST_CONTROL_TRANSFER: from fffff801ad3e8ce3 to fffff801ad38afd0
  574. STACK_TEXT:
  575. ffff9a00`983bcb78 fffff801`ad3e8ce3 : 00000000`000000be ffffafff`ffcfff28 8a000000`03a00121 ffff9a00`983bcdc0 : nt!KeBugCheckEx
  576. ffff9a00`983bcb80 fffff801`ad28ddc6 : ffff9600`00000000 ffff9a00`983bccd0 00000000`00000003 ffffad00`09acf800 : nt!MiRaisedIrqlFault+0xaa4bb
  577. ffff9a00`983bcbd0 fffff801`ad394872 : ffffb000`000078e0 fffff801`ad26ae12 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x1146
  578. ffff9a00`983bcdc0 fffff801`ad2699d4 : ffffbb8c`36fe6000 ffff9a00`983bcf90 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x132
  579. ffff9a00`983bcf50 fffff801`ad26954e : 00000000`00000100 ffffbb8c`36fe78c0 00000000`00000000 ffff9a00`983bd118 : nt!MiIdentifyPfn+0x434
  580. ffff9a00`983bd020 fffff801`ad693a7a : 00000000`00000000 ffffbb8c`36fe6e58 ffffbb8c`36fe6000 fffff801`ad264215 : nt!MiIdentifyPfnWrapper+0x3e
  581. ffff9a00`983bd050 fffff801`ad69358f : ffffe50c`0aa00ac0 00000000`00000001 ffff9a00`983bd234 ffffbb8c`36fe6000 : nt!PfpPfnPrioRequest+0xca
  582. ffff9a00`983bd0d0 fffff801`ad6917ee : 00000000`0000004f 00000000`42506650 00000003`202fa408 00000000`00000200 : nt!PfQuerySuperfetchInformation+0x2bf
  583. ffff9a00`983bd200 fffff801`ad69149b : 00000000`00000000 fffff801`ad38fe7f 00000000`00000008 00000003`00000000 : nt!ExpQuerySystemInformation+0x22e
  584. ffff9a00`983bda40 fffff801`ad395f13 : ffffbb8c`360e5080 00000000`00000000 00000000`00000000 00007ff8`67b13020 : nt!NtQuerySystemInformation+0x2b
  585. ffff9a00`983bda80 00007ff8`77bd5a74 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
  586. 00000003`202fa2f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`77bd5a74
  587. STACK_COMMAND: kb
  588. THREAD_SHA1_HASH_MOD_FUNC: 9395ad867c043b64a9b3fcc3cf587af48e902acb
  589. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 8aa4320b3e75f29a96d2636e56b381fb2500b583
  590. THREAD_SHA1_HASH_MOD: b28610981796779b4ac02f58898fde25728a775c
  591. FOLLOWUP_IP:
  592. nt!MiRaisedIrqlFault+aa4bb
  593. fffff801`ad3e8ce3 cc int 3
  594. FAULT_INSTR_CODE: 3c8348cc
  595. SYMBOL_STACK_INDEX: 1
  596. SYMBOL_NAME: nt!MiRaisedIrqlFault+aa4bb
  597. FOLLOWUP_NAME: MachineOwner
  598. MODULE_NAME: nt
  599. DEBUG_FLR_IMAGE_TIMESTAMP: 58ccba4c
  600. IMAGE_VERSION: 10.0.15063.0
  601.  
  602. IMAGE_NAME: memory_corruption
  603.  
  604. BUCKET_ID_FUNC_OFFSET: aa4bb
  605. FAILURE_BUCKET_ID: 0xBE_nt!MiRaisedIrqlFault
  606. BUCKET_ID: 0xBE_nt!MiRaisedIrqlFault
  607. PRIMARY_PROBLEM_CLASS: 0xBE_nt!MiRaisedIrqlFault
  608. TARGET_TIME: 2017-08-13T17:22:35.000Z
  609. SUITE_MASK: 784
  610. PRODUCT_TYPE: 1
  611. USER_LCID: 0
  612. FAILURE_ID_HASH_STRING: km:0xbe_nt!miraisedirqlfault
  613. FAILURE_ID_HASH: {1c5b4d11-09e0-def3-d2d0-70a11d69b92d}
  614. Followup: MachineOwner
Advertisement
Add Comment
Please, Sign In to add comment