Advertisement
Guest User

Untitled

a guest
Jul 21st, 2017
130
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 31.71 KB | None | 0 0
  1. Microsoft (R) Windows Debugger Version 10.0.14321.1024 X86
  2. Copyright (c) Microsoft Corporation. All rights reserved.
  3.  
  4. ========================================================================
  5. =================== Dump File: 072117-9687-01.dmp ====================
  6. ========================================================================
  7. Mini Kernel Dump File: Only registers and stack trace are available
  8. Windows 10 Kernel Version 15063 MP (4 procs) Free x64
  9. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  10. Built by: 15063.0.amd64fre.rs2_release.170317-1834
  11. Kernel base = 0xfffff803`79614000 PsLoadedModuleList = 0xfffff803`799605e0
  12. Debug session time: Fri Jul 21 18:48:57.553 2017 (UTC - 4:00)
  13. System Uptime: 0 days 6:28:21.306
  14.  
  15. BugCheck 4E, {2, 3bacee, 41ffff, 1}
  16. Probably caused by : memory_corruption
  17. Followup: memory_corruption
  18.  
  19. PFN_LIST_CORRUPT (4e)
  20. Typically caused by drivers passing bad memory descriptor lists (ie: calling
  21. MmUnlockPages twice with the same list, etc). If a kernel debugger is
  22. available get the stack trace.
  23.  
  24. Arguments:
  25. Arg1: 0000000000000002, A list entry was corrupt
  26. Arg2: 00000000003bacee, entry in list being removed
  27. Arg3: 000000000041ffff, highest physical page number
  28. Arg4: 0000000000000001, reference count of entry being removed
  29.  
  30. Debugging Details:
  31. DUMP_CLASS: 1
  32. DUMP_QUALIFIER: 400
  33. BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
  34. SYSTEM_MANUFACTURER: HP-Pavilion
  35. SYSTEM_PRODUCT_NAME: AY614AAR-ABA p6347c
  36. SYSTEM_SKU: AY614AAR#ABA
  37. BIOS_VENDOR: American Megatrends Inc.
  38. BIOS_VERSION: 5.12
  39. BIOS_DATE: 05/21/2010
  40. BASEBOARD_MANUFACTURER: FOXCONN
  41. BASEBOARD_PRODUCT: ALOE
  42. BASEBOARD_VERSION: 1.01
  43. DUMP_TYPE: 2
  44. BUGCHECK_STR: 0x4E_2
  45. CPU_COUNT: 4
  46. CPU_MHZ: af0
  47. CPU_VENDOR: AuthenticAMD
  48. CPU_FAMILY: 10
  49. CPU_MODEL: 5
  50. CPU_STEPPING: 2
  51. CUSTOMER_CRASH_COUNT: 1
  52. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  53.  
  54. PROCESS_NAME: firefox.exe
  55.  
  56. CURRENT_IRQL: 2
  57. TRAP_FRAME: ffff94018133e8e0 -- (.trap 0xffff94018133e8e0)
  58. NOTE: The trap frame does not contain all registers.
  59. Some register values may be zeroed or incorrect.
  60. rax=ffffe08995a067f0 rbx=0000000000000000 rcx=ffffe0898f4188b0
  61. rdx=ffffe08990086960 rsi=0000000000000000 rdi=0000000000000000
  62. rip=fffff8044cef9bfe rsp=ffff94018133ea70 rbp=ffff94018133eb70
  63. r8=ffffcb8ae7aa50d8 r9=0000000000000000 r10=ffffcb8ae7aa50d8
  64. r11=ffff94018133ec48 r12=0000000000000000 r13=0000000000000000
  65. r14=0000000000000000 r15=0000000000000000
  66. iopl=0 nv up ei ng nz na po nc
  67. dxgkrnl!DXGDEVICE::DestroyDeferredAllocations+0x7ee:
  68. fffff804`4cef9bfe 488b5840 mov rbx,qword ptr [rax+40h] ds:ffffe089`95a06830=0000000000000000
  69. Resetting default scope
  70. LAST_CONTROL_TRANSFER: from fffff803797ba49b to fffff803797804c0
  71. STACK_TEXT:
  72. ffff9401`8133ea70 fffff804`4cedb16c : 00000000`00000000 ffffcb8a`d5bc7b70 ffffcb8a`d5bc7b70 ffffcb8a`d5bc7b70 : dxgkrnl!DXGDEVICE::DestroyDeferredAllocations+0x7ee
  73. ffff9401`8133ec50 fffff803`79651ca8 : 00000000`00000300 ffffcb8a`e7aa5040 fffff804`4cedb000 ffffcb8a`d5bc7f10 : dxgkrnl!DxgkpDeferredDestructionWork+0x16c
  74. ffff9401`8133ecc0 fffff803`796f0ac7 : 00000000`00000100 00000000`00000080 ffffcb8a`d32b9040 ffffcb8a`e7aa5040 : nt!ExpWorkerThread+0xd8
  75. ffff9401`8133ed50 fffff803`79785946 : fffff803`78760180 ffffcb8a`e7aa5040 fffff803`796f0a80 ffff8241`208fff20 : nt!PspSystemThreadStartup+0x47
  76. ffff9401`8133eda0 00000000`00000000 : ffff9401`8133f000 ffff9401`81339000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
  77. STACK_COMMAND: .trap 0xffff94018133e8e0 ; kb
  78. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  79. fffff803796a2ac7-fffff803796a2ac8 2 bytes - nt!MiDispatchFault+d17
  80. [ 80 fa:00 f1 ]
  81. fffff803796ad119-fffff803796ad11a 2 bytes - nt!MiResolveTransitionFault+259 (+0xa652)
  82. [ 80 f6:00 82 ]
  83. fffff80379894383-fffff80379894385 3 bytes - nt!ExFreePoolWithTag+363
  84. [ 40 fb f6:00 41 82 ]
  85. fffff803798946b6-fffff803798946b7 2 bytes - nt!ExFreePoolWithTag+696 (+0x333)
  86. [ 80 f6:00 82 ]
  87. 9 errors : !nt (fffff803796a2ac7-fffff803798946b7)
  88. MODULE_NAME: memory_corruption
  89.  
  90. IMAGE_NAME: memory_corruption
  91.  
  92. FOLLOWUP_NAME: memory_corruption
  93. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  94. MEMORY_CORRUPTOR: LARGE
  95. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  96. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  97. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  98. TARGET_TIME: 2017-07-21T22:48:57.000Z
  99. OSBUILD: 15063
  100. OSSERVICEPACK: 483
  101. SERVICEPACK_NUMBER: 0
  102. OS_REVISION: 0
  103. SUITE_MASK: 784
  104. PRODUCT_TYPE: 1
  105. OSPLATFORM_TYPE: x64
  106. OSNAME: Windows 10
  107. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  108. USER_LCID: 0
  109. OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
  110. BUILDDATESTAMP_STR: 160101.0800
  111. BUILDLAB_STR: WinBuild
  112. BUILDOSVER_STR: 10.0.15063.483
  113. ANALYSIS_SESSION_ELAPSED_TIME: 2b8b
  114. ANALYSIS_SOURCE: KM
  115. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  116. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  117. Followup: memory_corruption
  118.  
  119. =============================== Drivers ================================
  120. fffff716`891c0000 fffff716`891ca000 TSDDD (deferred)
  121. Image path: \SystemRoot\System32\TSDDD.dll
  122. Image name: TSDDD.dll
  123. Timestamp: unavailable (00000000)
  124. fffff804`4bb80000 fffff804`4bb8e000 MpKsl15a31c6b (deferred)
  125. Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{8FDFD769-9728-4356-B9E3-A6598CBA6CE1}\MpKsl15a31c6b.sys
  126. Image name: MpKsl15a31c6b.sys
  127. Timestamp: Tue May 19 21:50:37 2015 (555BE86D)
  128. fffff804`4bb90000 fffff804`4bbac000 mcupdate_AuthenticAMD (deferred)
  129. Image path: \SystemRoot\system32\mcupdate_AuthenticAMD.dll
  130. Image name: mcupdate_AuthenticAMD.dll
  131. Timestamp: Tue Jan 31 06:16:29 1978 (0F346A8D)
  132. fffff804`4bc00000 fffff804`4bc0e000 MpKsla1911328 (deferred)
  133. Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{58DF769D-C35A-4939-8909-B2F42BE2163A}\MpKsla1911328.sys
  134. Image name: MpKsla1911328.sys
  135. Timestamp: Tue May 19 21:50:37 2015 (555BE86D)
  136. fffff804`4bc10000 fffff804`4bc1e000 MpKsl5ab50aff (deferred)
  137. Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{567CFB22-4587-4745-9756-43E6DF3F4DE4}\MpKsl5ab50aff.sys
  138. Image name: MpKsl5ab50aff.sys
  139. Timestamp: Tue May 19 21:50:37 2015 (555BE86D)
  140. fffff804`4bc20000 fffff804`4bc2e000 MpKsl50b1e12e (deferred)
  141. Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{392B2332-4A57-4C09-9A1D-762914B6D646}\MpKsl50b1e12e.sys
  142. Image name: MpKsl50b1e12e.sys
  143. Timestamp: Tue May 19 21:50:37 2015 (555BE86D)
  144. fffff804`4bc30000 fffff804`4bc3e000 MpKsl4633795b (deferred)
  145. Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{8FDFD769-9728-4356-B9E3-A6598CBA6CE1}\MpKsl4633795b.sys
  146. Image name: MpKsl4633795b.sys
  147. Timestamp: Tue May 19 21:50:37 2015 (555BE86D)
  148. fffff804`4bc40000 fffff804`4bc4e000 MpKsl20d2fb22 (deferred)
  149. Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{F85C5305-1F53-4842-BD5A-6CF64FC01C82}\MpKsl20d2fb22.sys
  150. Image name: MpKsl20d2fb22.sys
  151. Timestamp: Tue May 19 21:50:37 2015 (555BE86D)
  152. fffff804`4bdb0000 fffff804`4bdbe000 MpKsled2e402c (deferred)
  153. Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{169092EE-1439-4C3C-808A-6C965F9ED1F7}\MpKsled2e402c.sys
  154. Image name: MpKsled2e402c.sys
  155. Timestamp: Tue May 19 21:50:37 2015 (555BE86D)
  156. fffff804`4bdc0000 fffff804`4bdce000 MpKsldaaa8b1f (deferred)
  157. Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{077C5A6B-D9ED-4051-B5C4-A0BE8869DEEB}\MpKsldaaa8b1f.sys
  158. Image name: MpKsldaaa8b1f.sys
  159. Timestamp: Tue May 19 21:50:37 2015 (555BE86D)
  160. fffff804`4bdd0000 fffff804`4bdde000 MpKslbb0407e9 (deferred)
  161. Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{195B3084-1C56-46DE-B3D1-6AA393D5F3A0}\MpKslbb0407e9.sys
  162. Image name: MpKslbb0407e9.sys
  163. Timestamp: Tue May 19 21:50:37 2015 (555BE86D)
  164. fffff804`4bde0000 fffff804`4bdee000 MpKslba214679 (deferred)
  165. Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{6B0F939C-1767-46DF-B2B8-91B3E0940F17}\MpKslba214679.sys
  166. Image name: MpKslba214679.sys
  167. Timestamp: Tue May 19 21:50:37 2015 (555BE86D)
  168. fffff804`4bdf0000 fffff804`4bdfe000 MpKslb0c8cfeb (deferred)
  169. Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{D48EEE93-BF6F-433A-BDF3-BE4D9BE6A867}\MpKslb0c8cfeb.sys
  170. Image name: MpKslb0c8cfeb.sys
  171. Timestamp: Tue May 19 21:50:37 2015 (555BE86D)
  172. fffff804`4bed0000 fffff804`4bede000 MpKslf27c42fa (deferred)
  173. Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{01B80F9B-85D2-4DB0-990A-36D7C35449F7}\MpKslf27c42fa.sys
  174. Image name: MpKslf27c42fa.sys
  175. Timestamp: Tue May 19 21:50:37 2015 (555BE86D)
  176. fffff804`4c270000 fffff804`4c27be00 PxHlpa64 (deferred)
  177. Image path: \SystemRoot\System32\Drivers\PxHlpa64.sys
  178. Image name: PxHlpa64.sys
  179. Timestamp: Tue Jun 23 19:16:35 2009 (4A416253)
  180. fffff804`4cb70000 fffff804`4cbdf000 ahcix64s (deferred)
  181. Image path: \SystemRoot\System32\drivers\ahcix64s.sys
  182. Image name: ahcix64s.sys
  183. Timestamp: Fri Apr 4 03:56:04 2008 (47F5DF14)
  184. fffff804`4ccb0000 fffff804`4cd1f000 dump_ahcix64s (deferred)
  185. Image path: \SystemRoot\System32\Drivers\dump_ahcix64s.sys
  186. Image name: dump_ahcix64s.sys
  187. Timestamp: Fri Apr 4 03:56:04 2008 (47F5DF14)
  188. fffff804`4d140000 fffff804`4d154000 fortknoxfw (deferred)
  189. Image path: \SystemRoot\system32\drivers\fortknoxfw.sys
  190. Image name: fortknoxfw.sys
  191. Timestamp: Tue Dec 23 10:01:38 2014 (549983D2)
  192. fffff804`4d350000 fffff804`4d35a000 SASKUTIL64 (deferred)
  193. Image path: \??\C:\Program Files\SUPERAntiSpyware\SASKUTIL64.SYS
  194. Image name: SASKUTIL64.SYS
  195. Timestamp: Tue Jul 12 17:00:01 2011 (4E1CB5D1)
  196. fffff804`4d360000 fffff804`4d36a000 SASDIFSV64 (deferred)
  197. Image path: \??\C:\Program Files\SUPERAntiSpyware\SASDIFSV64.SYS
  198. Image name: SASDIFSV64.SYS
  199. Timestamp: Thu Jul 21 19:03:00 2011 (4E28B024)
  200. fffff804`4d800000 fffff804`4d85f000 atikmpag (deferred)
  201. Image path: \SystemRoot\system32\DRIVERS\atikmpag.sys
  202. Image name: atikmpag.sys
  203. Timestamp: Tue Jan 13 11:20:43 2015 (54B545DB)
  204. fffff804`4d9e0000 fffff804`4d9ee000 MpKslb1b81fad (deferred)
  205. Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{53A580A5-2AE5-4198-B092-9A9076B8CCC2}\MpKslb1b81fad.sys
  206. Image name: MpKslb1b81fad.sys
  207. Timestamp: Tue May 19 21:50:37 2015 (555BE86D)
  208. fffff804`4dc00000 fffff804`4dcc6000 peauth (deferred)
  209. Image path: \SystemRoot\system32\drivers\peauth.sys
  210. Image name: peauth.sys
  211. Timestamp: Sat Dec 9 21:03:08 1989 (2581B95C)
  212. fffff804`4ee00000 fffff804`4ee98000 rt640x64 (deferred)
  213. Image path: \SystemRoot\System32\drivers\rt640x64.sys
  214. Image name: rt640x64.sys
  215. Timestamp: Wed Oct 5 09:32:55 2016 (57F50107)
  216. fffff804`4efe0000 fffff804`4f001000 drmk (deferred)
  217. Image path: \SystemRoot\System32\drivers\drmk.sys
  218. Image name: drmk.sys
  219. Timestamp: ***** Invalid (A01C1986)
  220. fffff804`4f1a0000 fffff804`4f57ed80 RTKVHD64 (deferred)
  221. Image path: \SystemRoot\system32\drivers\RTKVHD64.sys
  222. Image name: RTKVHD64.sys
  223. Timestamp: Tue Jun 19 04:50:56 2012 (4FE03D70)
  224. fffff804`4f7d0000 fffff804`50383000 atikmdag (deferred)
  225. Image path: \SystemRoot\system32\DRIVERS\atikmdag.sys
  226. Image name: atikmdag.sys
  227. Timestamp: Tue Jan 13 11:48:21 2015 (54B54C55)
  228. Unloaded modules:
  229. fffff804`4de50000 fffff804`4de73000 WdNisDrv.sys
  230. Timestamp: unavailable (00000000)
  231. Checksum: 00000000
  232. ImageSize: 00023000
  233. fffff804`4de50000 fffff804`4de73000 WdNisDrv.sys
  234. Timestamp: unavailable (00000000)
  235. Checksum: 00000000
  236. ImageSize: 00023000
  237. fffff804`4de50000 fffff804`4de73000 WdNisDrv.sys
  238. Timestamp: unavailable (00000000)
  239. Checksum: 00000000
  240. ImageSize: 00023000
  241. fffff804`4de50000 fffff804`4de73000 WdNisDrv.sys
  242. Timestamp: unavailable (00000000)
  243. Checksum: 00000000
  244. ImageSize: 00023000
  245. fffff804`4de50000 fffff804`4de73000 WdNisDrv.sys
  246. Timestamp: unavailable (00000000)
  247. Checksum: 00000000
  248. ImageSize: 00023000
  249. fffff804`4de50000 fffff804`4de73000 WdNisDrv.sys
  250. Timestamp: unavailable (00000000)
  251. Checksum: 00000000
  252. ImageSize: 00023000
  253. fffff804`4de00000 fffff804`4de0e000 MpKsl38515eb
  254. Timestamp: unavailable (00000000)
  255. Checksum: 00000000
  256. ImageSize: 0000E000
  257. fffff804`4da30000 fffff804`4da4c000 EhStorClass.
  258. Timestamp: unavailable (00000000)
  259. Checksum: 00000000
  260. ImageSize: 0001C000
  261. fffff804`4d9b0000 fffff804`4d9ed000 WUDFRd.sys
  262. Timestamp: unavailable (00000000)
  263. Checksum: 00000000
  264. ImageSize: 0003D000
  265. fffff804`4d970000 fffff804`4d9ad000 WUDFRd.sys
  266. Timestamp: unavailable (00000000)
  267. Checksum: 00000000
  268. ImageSize: 0003D000
  269. fffff804`4deb0000 fffff804`4decc000 EhStorClass.
  270. Timestamp: unavailable (00000000)
  271. Checksum: 00000000
  272. ImageSize: 0001C000
  273. fffff804`4de90000 fffff804`4deac000 EhStorClass.
  274. Timestamp: unavailable (00000000)
  275. Checksum: 00000000
  276. ImageSize: 0001C000
  277. fffff804`4de70000 fffff804`4de8c000 EhStorClass.
  278. Timestamp: unavailable (00000000)
  279. Checksum: 00000000
  280. ImageSize: 0001C000
  281. fffff804`4de50000 fffff804`4de6c000 EhStorClass.
  282. Timestamp: unavailable (00000000)
  283. Checksum: 00000000
  284. ImageSize: 0001C000
  285. fffff804`4f7a0000 fffff804`4f7ab000 cldflt.sys
  286. Timestamp: unavailable (00000000)
  287. Checksum: 00000000
  288. ImageSize: 0000B000
  289. fffff804`4cc50000 fffff804`4cc5f000 dump_storpor
  290. Timestamp: unavailable (00000000)
  291. Checksum: 00000000
  292. ImageSize: 0000F000
  293. fffff804`4ccd0000 fffff804`4cd3f000 dump_ahcix64
  294. Timestamp: unavailable (00000000)
  295. Checksum: 00000000
  296. ImageSize: 0006F000
  297. fffff804`4cd60000 fffff804`4cd7d000 dump_dumpfve
  298. Timestamp: unavailable (00000000)
  299. Checksum: 00000000
  300. ImageSize: 0001D000
  301. fffff804`4f5d0000 fffff804`4f5ec000 EhStorClass.
  302. Timestamp: unavailable (00000000)
  303. Checksum: 00000000
  304. ImageSize: 0001C000
  305. fffff804`4c1a0000 fffff804`4c1bc000 EhStorClass.
  306. Timestamp: unavailable (00000000)
  307. Checksum: 00000000
  308. ImageSize: 0001C000
  309. fffff804`4e790000 fffff804`4e7b0000 dam.sys
  310. Timestamp: unavailable (00000000)
  311. Checksum: 00000000
  312. ImageSize: 00020000
  313. fffff804`4bed0000 fffff804`4bedf000 WdBoot.sys
  314. Timestamp: unavailable (00000000)
  315. Checksum: 00000000
  316. ImageSize: 0000F000
  317. fffff804`4d550000 fffff804`4d55f000 hwpolicy.sys
  318. Timestamp: unavailable (00000000)
  319. Checksum: 00000000
  320. ImageSize: 0000F000
  321.  
  322. ============================= BIOS INFO ================================
  323. [SMBIOS Data Tables v2.6]
  324. [DMI Version - 0]
  325. [2.0 Calling Convention - No]
  326. [Table Size - 3291 bytes]
  327. [BIOS Information (Type 0) - Length 24 - Handle 0000h]
  328. Vendor American Megatrends Inc.
  329. BIOS Version 5.12
  330. BIOS Starting Address Segment f000
  331. BIOS Release Date 05/21/2010
  332. BIOS ROM Size 100000
  333. BIOS Characteristics
  334. 04: - ISA Supported
  335. 07: - PCI Supported
  336. 09: - Plug and Play Supported
  337. 11: - Upgradeable FLASH BIOS
  338. 12: - BIOS Shadowing Supported
  339. 14: - ESCD Supported
  340. 15: - CD-Boot Supported
  341. 16: - Selectable Boot Supported
  342. 17: - BIOS ROM Socketed
  343. 19: - EDD Supported
  344. 23: - 1.2MB Floppy Supported
  345. 24: - 720KB Floppy Supported
  346. 25: - 2.88MB Floppy Supported
  347. 26: - Print Screen Device Supported
  348. 27: - Keyboard Services Supported
  349. 28: - Serial Services Supported
  350. 29: - Printer Services Supported
  351. 30: - CGA/Mono Services Supported
  352. 32: - BIOS Vendor Reserved
  353. 48: - System Vendor Reserved
  354. BIOS Characteristic Extensions
  355. 00: - ACPI Supported
  356. 01: - USB Legacy Supported
  357. 04: - LS120-Boot Supported
  358. 05: - ATAPI ZIP-Boot Supported
  359. 08: - BIOS Boot Specification Supported
  360. 09: - Fn-Key NET-Boot Supported
  361. 10: - Specification Reserved
  362. BIOS Major Revision 5
  363. BIOS Minor Revision 18
  364. EC Firmware Major Revision 255
  365. EC Firmware Minor Revision 255
  366. [System Information (Type 1) - Length 27 - Handle 0001h]
  367. Manufacturer HP-Pavilion
  368. Product Name AY614AAR-ABA p6347c
  369. Version
  370. UUID 00000000-0000-0000-0000-000000000000
  371. Wakeup Type Power Switch
  372. SKUNumber AY614AAR#ABA
  373. Family 103C_53316J
  374. [BaseBoard Information (Type 2) - Length 15 - Handle 0002h]
  375. Manufacturer FOXCONN
  376. Product ALOE
  377. Version 1.01
  378. Feature Flags 09h
  379. 1744183816: - ?ÿU?ì?ì¡H. h3Å?Eü3ÀW?}?Eô?Eø?ÿu
  380. ¸@
  381. 1744183856: - ?ÿU?ì?ì¡H. h3Å?Eü3ÀW?}?Eô?Eø?ÿu
  382. ¸@
  383. Location
  384. Chassis Handle 0003h
  385. Board Type 0ah - Processor/Memory Module
  386. Number of Child Handles 0
  387. [System Enclosure (Type 3) - Length 21 - Handle 0003h]
  388. Manufacturer Hewlett-Packard
  389. Chassis Type Desktop
  390. Version
  391. Bootup State Safe
  392. Power Supply State Safe
  393. Thermal State Safe
  394. Security Status None
  395. OEM Defined 0
  396. Height 0U
  397. Number of Power Cords 1
  398. Number of Contained Elements 0
  399. Contained Element Size 0
  400. [Processor Information (Type 4) - Length 42 - Handle 0004h]
  401. Socket Designation CPU 1
  402. Processor Type Central Processor
  403. Processor Family edh - Specification Reserved
  404. Processor Manufacturer AMD
  405. Processor ID 520f1000fffb8b17
  406. Processor Version AMD Athlon(tm) II X4 630 Processor
  407. Processor Voltage 8fh - 1.5V
  408. External Clock 200MHz
  409. Max Speed 2800MHz
  410. Current Speed 2800MHz
  411. Status Enabled Populated
  412. Processor Upgrade Other
  413. L1 Cache Handle 0005h
  414. L2 Cache Handle 0006h
  415. L3 Cache Handle 0007h
  416. Part Number
  417. [Cache Information (Type 7) - Length 19 - Handle 0005h]
  418. Socket Designation L1-Cache
  419. Cache Configuration 0280h - Varies Enabled Int NonSocketed L1
  420. Maximum Cache Size 0200h - 512K
  421. Installed Size 0200h - 512K
  422. Supported SRAM Type 0010h - Pipeline-Burst
  423. Current SRAM Type 0010h - Pipeline-Burst
  424. Cache Speed 0ns
  425. Error Correction Type Multi-Bit ECC
  426. System Cache Type Specification Reserved
  427. Associativity 4-way Set-Associative
  428. [Cache Information (Type 7) - Length 19 - Handle 0006h]
  429. Socket Designation L2-Cache
  430. Cache Configuration 0281h - Varies Enabled Int NonSocketed L2
  431. Maximum Cache Size 0800h - 2048K
  432. Installed Size 0800h - 2048K
  433. Supported SRAM Type 0010h - Pipeline-Burst
  434. Current SRAM Type 0010h - Pipeline-Burst
  435. Cache Speed 0ns
  436. Error Correction Type Multi-Bit ECC
  437. System Cache Type Specification Reserved
  438. Associativity 4-way Set-Associative
  439. [Cache Information (Type 7) - Length 19 - Handle 0007h]
  440. Socket Designation L3-Cache
  441. Cache Configuration 0302h - Unknown Disabled Int NonSocketed L3
  442. Maximum Cache Size 0000h - 0K
  443. Installed Size 0000h - 0K
  444. Supported SRAM Type 0002h - Unknown
  445. Current SRAM Type 0002h - Unknown
  446. Cache Speed 0ns
  447. Error Correction Type Unknown
  448. System Cache Type Unknown
  449. Associativity Unknown
  450. [OEM Strings (Type 11) - Length 5 - Handle 000dh]
  451. Number of Strings 32
  452. 1 bid=A1NAv6PrA3;PROD_MSWORKS;SFCHK;DLED;IS.N60d;ACPwrFail=Off;Cha
  453. 2 n=Refurb;CPUFan=On;DVDRW;LegacyFloppy=No;TVout=NTSC;PCBRAND=Pavi
  454. 3 lion;OS=MSV;LScribe;DVDP_STD;Vos.P;PROD_MSOFFHST;FPA=HM;C_VEN2;C
  455. 4 DS_D;SW_Main;.B2;##HPCPC=00000000<900000060200000004200002535141
  456. 5 30040000010001000;5;:0665<;85>18>1<2=1:<55>?4;;=?=19:<8494;>:801
  457. 6 1<=31953=?76?>378139;594701:=;34:;55;9128<7937==0<722<:<1:2489>:
  458. 7 088=6:?1;2>8=8>12691>>286:9?;4454>3<3>89909>=738375;02951<;>=??2
  459. 8 ?70>75;04<815:33<20846?312127;?24876>7488457<0;0?39>9;?407;8;8;0
  460. 9 9>=;==>231>;?456:100000006;00000000002000840515?454=435<49434=23
  461. 10 405347594>444?47535021000200000000000000000000000000000000000176
  462. 11 0:<4;1?6??6:=:30393:=<:8>0733583=1;7=7:?6417;:83==335:93?179=82=
  463. 12 3<6<7:36018=:=05>2<7:76>9><?3=?3326<44;;515?5:05223?9=731563>:5>
  464. 13 :>:3?;752183168?<4641;15?1?:6;<46:36<39?682>03534:144>:?44867648
  465. 14 =32?5=6=56:3246?<8338;8?=?=<2:3?3<237?=6>8;=91=3;>??;>?0;<37=
  466. 15
  467. 16
  468. 17
  469. 18
  470. 19
  471. 20
  472. 21
  473. 22
  474. 23
  475. 24
  476. 25
  477. 26
  478. 27
  479. 28
  480. 29
  481. 30
  482. 31
  483. 32
  484. [Physical Memory Array (Type 16) - Length 15 - Handle 0010h]
  485. Location 03h - SystemBoard/Motherboard
  486. Use 03h - System Memory
  487. Memory Error Correction 03h - None
  488. Maximum Capacity 16777216KB
  489. Number of Memory Devices 4
  490. [Memory Array Mapped Address (Type 19) - Length 15 - Handle 0011h]
  491. Starting Address 00000000h
  492. Ending Address 0103ffffh
  493. Memory Array Handle 0010h
  494. Partition Width 01
  495. [Memory Device (Type 17) - Length 28 - Handle 0012h]
  496. Physical Memory Array Handle 0010h
  497. Total Width 64 bits
  498. Data Width 64 bits
  499. Size 4096MB
  500. Form Factor 09h - DIMM
  501. Device Locator DIMM1
  502. Bank Locator BANK0
  503. Memory Type 18h - Specification Reserved
  504. Type Detail 0080h - Synchronous
  505. Speed 1066MHz
  506. Manufacturer Manufacturer00
  507. Part Number CT51264BD160B.C16F
  508. [Memory Device (Type 17) - Length 28 - Handle 0013h]
  509. Physical Memory Array Handle 0010h
  510. Total Width 64 bits
  511. Data Width 64 bits
  512. Size 4096MB
  513. Form Factor 09h - DIMM
  514. Device Locator DIMM2
  515. Bank Locator BANK1
  516. Memory Type 18h - Specification Reserved
  517. Type Detail 0080h - Synchronous
  518. Speed 1066MHz
  519. Manufacturer Manufacturer01
  520. Part Number CT51264BD160B.C16F
  521. [Memory Device (Type 17) - Length 28 - Handle 0014h]
  522. Physical Memory Array Handle 0010h
  523. Total Width 64 bits
  524. Data Width 64 bits
  525. Size 4096MB
  526. Form Factor 09h - DIMM
  527. Device Locator DIMM3
  528. Bank Locator BANK2
  529. Memory Type 18h - Specification Reserved
  530. Type Detail 0080h - Synchronous
  531. Speed 1066MHz
  532. Manufacturer Manufacturer02
  533. Part Number CT51264BD160B.C16F
  534. [Memory Device (Type 17) - Length 28 - Handle 0015h]
  535. Physical Memory Array Handle 0010h
  536. Total Width 64 bits
  537. Data Width 64 bits
  538. Size 4096MB
  539. Form Factor 09h - DIMM
  540. Device Locator DIMM4
  541. Bank Locator BANK3
  542. Memory Type 18h - Specification Reserved
  543. Type Detail 0080h - Synchronous
  544. Speed 1066MHz
  545. Manufacturer Manufacturer03
  546. Part Number CT51264BD160B.C16F
  547.  
  548. ========================================================================
  549. =================== Dump File: 072117-10765-01.dmp ===================
  550. ========================================================================
  551. Mini Kernel Dump File: Only registers and stack trace are available
  552. Windows 10 Kernel Version 15063 MP (4 procs) Free x64
  553. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  554. Built by: 15063.0.amd64fre.rs2_release.170317-1834
  555. Kernel base = 0xfffff800`d9c11000 PsLoadedModuleList = 0xfffff800`d9f5d5e0
  556. Debug session time: Fri Jul 21 19:05:56.087 2017 (UTC - 4:00)
  557. System Uptime: 0 days 0:15:21.839
  558.  
  559. BugCheck 50, {ffffa0046e79d91c, 2, fffff803577244b0, 2}
  560. Could not read faulting driver name
  561. Probably caused by : memory_corruption
  562. Followup: memory_corruption
  563.  
  564. PAGE_FAULT_IN_NONPAGED_AREA (50)
  565. Invalid system memory was referenced. This cannot be protected by try-except.
  566. Typically the address is just plain bad or it is pointing at freed memory.
  567.  
  568. Arguments:
  569. Arg1: ffffa0046e79d91c, memory referenced.
  570. Arg2: 0000000000000002, value 0 = read operation, 1 = write operation.
  571. Arg3: fffff803577244b0, If non-zero, the instruction address which referenced the bad memory
  572. address.
  573. Arg4: 0000000000000002, (reserved)
  574.  
  575. Debugging Details:
  576. Could not read faulting driver name
  577. DUMP_CLASS: 1
  578. DUMP_QUALIFIER: 400
  579. BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
  580. SYSTEM_MANUFACTURER: HP-Pavilion
  581. SYSTEM_PRODUCT_NAME: AY614AAR-ABA p6347c
  582. SYSTEM_SKU: AY614AAR#ABA
  583. BIOS_VENDOR: American Megatrends Inc.
  584. BIOS_VERSION: 5.12
  585. BIOS_DATE: 05/21/2010
  586. BASEBOARD_MANUFACTURER: FOXCONN
  587. BASEBOARD_PRODUCT: ALOE
  588. BASEBOARD_VERSION: 1.01
  589. DUMP_TYPE: 2
  590. READ_ADDRESS: fffff800d9ff2358: Unable to get MiVisibleState
  591. ffffa0046e79d91c
  592. FAULTING_IP:
  593. FLTMGR!FltpFreeIrpCtrl+0
  594. fffff803`577244b0 48895c2408 mov qword ptr [rsp+8],rbx
  595. MM_INTERNAL_CODE: 2
  596. CPU_COUNT: 4
  597. CPU_MHZ: af0
  598. CPU_VENDOR: AuthenticAMD
  599. CPU_FAMILY: 10
  600. CPU_MODEL: 5
  601. CPU_STEPPING: 2
  602. CUSTOMER_CRASH_COUNT: 1
  603. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  604. BUGCHECK_STR: AV
  605.  
  606. PROCESS_NAME: FortKnox.exe
  607.  
  608. CURRENT_IRQL: 0
  609. TRAP_FRAME: ffff8980dcd58890 -- (.trap 0xffff8980dcd58890)
  610. NOTE: The trap frame does not contain all registers.
  611. Some register values may be zeroed or incorrect.
  612. rax=0000000000000001 rbx=0000000000000000 rcx=ffffa0042671b4c0
  613. rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
  614. rip=fffff803577244b0 rsp=ffff8980dcd58a28 rbp=ffff8980dcd58aa0
  615. r8=ffffa004212f3980 r9=ffffffffffff2666 r10=fffff80357720000
  616. r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
  617. r14=0000000000000000 r15=0000000000000000
  618. iopl=0 nv up ei pl zr na po nc
  619. FLTMGR!FltpFreeIrpCtrl:
  620. fffff803`577244b0 48895c2408 mov qword ptr [rsp+8],rbx ss:0018:ffff8980`dcd58a30=ffffa0041fea0080
  621. Resetting default scope
  622. LAST_CONTROL_TRANSFER: from fffff800d9db2fb4 to fffff800d9d7d4c0
  623. STACK_TEXT:
  624. ffff8980`dcd585f8 fffff800`d9db2fb4 : 00000000`00000050 ffffa004`6e79d91c 00000000`00000002 ffff8980`dcd58890 : nt!KeBugCheckEx
  625. ffff8980`dcd58600 fffff800`d9c9e2d6 : 00000000`00000002 ffffa004`6e79d91c ffff8980`dcd58890 ffffa004`22efb7c0 : nt!MiSystemFault+0x116e84
  626. ffff8980`dcd586a0 fffff800`d9d86d72 : ffff8980`dcd58950 ffffa004`2671b640 ffffa004`21300840 fffff803`57f61ee2 : nt!MmAccessFault+0xae6
  627. ffff8980`dcd58890 fffff803`577244b0 : fffff803`57755dce ffffa004`1fea0080 00000000`00000001 00000000`00000000 : nt!KiPageFault+0x132
  628. ffff8980`dcd58a28 fffff803`57755dce : ffffa004`1fea0080 00000000`00000001 00000000`00000000 00000000`00000000 : FLTMGR!FltpFreeIrpCtrl
  629. ffff8980`dcd58a30 fffff800`da0a61fd : ffffa004`239d7080 ffffa004`1fea0000 ffffa004`2126bdf0 ffffa004`239d7080 : FLTMGR!FltpFastIoRead+0x17e
  630. ffff8980`dcd58ad0 fffff800`d9d88413 : 00000000`00000234 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x43d
  631. ffff8980`dcd58bd0 00007fff`85675464 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
  632. 00000000`01849ba8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`85675464
  633. STACK_COMMAND: kb
  634. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  635. fffff800d9c9e3af-fffff800d9c9e3b0 2 bytes - nt!MmAccessFault+bbf
  636. [ 80 f6:00 9a ]
  637. fffff800d9d072f3-fffff800d9d072f4 2 bytes - nt!MiClearNonPagedPtes+53 (+0x68f44)
  638. [ 80 f6:00 9a ]
  639. fffff800d9db2fd8-fffff800d9db2fd9 2 bytes - nt!MiValidFault+1160f8 (+0xabce5)
  640. [ ff f6:7f 9a ]
  641. fffff800d9e91383-fffff800d9e91385 3 bytes - nt!ExFreePoolWithTag+363
  642. [ 40 fb f6:00 4d 9a ]
  643. 9 errors : !nt (fffff800d9c9e3af-fffff800d9e91385)
  644. MODULE_NAME: memory_corruption
  645.  
  646. IMAGE_NAME: memory_corruption
  647.  
  648. FOLLOWUP_NAME: memory_corruption
  649. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  650. MEMORY_CORRUPTOR: LARGE
  651. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  652. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  653. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  654. TARGET_TIME: 2017-07-21T23:05:56.000Z
  655. OSBUILD: 15063
  656. OSSERVICEPACK: 483
  657. SERVICEPACK_NUMBER: 0
  658. OS_REVISION: 0
  659. SUITE_MASK: 784
  660. PRODUCT_TYPE: 1
  661. OSPLATFORM_TYPE: x64
  662. OSNAME: Windows 10
  663. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  664. USER_LCID: 0
  665. OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
  666. BUILDDATESTAMP_STR: 160101.0800
  667. BUILDLAB_STR: WinBuild
  668. BUILDOSVER_STR: 10.0.15063.483
  669. ANALYSIS_SESSION_ELAPSED_TIME: 2c09
  670. ANALYSIS_SOURCE: KM
  671. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  672. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  673. Followup: memory_corruption
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement