Advertisement
Guest User

Untitled

a guest
Jan 18th, 2018
495
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 52.77 KB | None | 0 0
  1. ========================== AUTO DUMP ANALYZER ==========================
  2. Auto Dump Analyzer
  3. Version: 0.6
  4. Created by: gardenman
  5. Time to analyze file(s): 00 hours and 06 minutes and 25 seconds
  6.  
  7. ================================ SYSTEM ================================
  8. MANUFACTURER: MSI
  9. PRODUCT_NAME: MS-7250
  10. VERSION: 2.0
  11.  
  12. ================================= BIOS =================================
  13. VENDOR: MS-7250
  14. VERSION: V3.9
  15. DATE: 10/04/2007
  16.  
  17. ============================= MOTHERBOARD ==============================
  18. MANUFACTURER: MSI
  19. PRODUCT: MS-7250
  20. VERSION: 2.0
  21.  
  22. ================================= RAM ==================================
  23. Size Speed Manufacturer Part No.
  24. -------------- -------------- ------------------- ----------------------
  25. 1024MB 0MHz Manufacturer0 PartNum0
  26. 1024MB 0MHz Manufacturer1 PartNum1
  27. 1024MB 0MHz Manufacturer2 PartNum2
  28. 1024MB 0MHz Manufacturer3 PartNum3
  29.  
  30. ================================= CPU ==================================
  31. Processor Version: AMD Athlon(tm) 64 X2 Dual Core Processor 6000+
  32. COUNT: 2
  33. MHZ: 3000
  34. VENDOR: AuthenticAMD
  35. FAMILY: f
  36. MODEL: 43
  37. STEPPING: 3
  38.  
  39. ================================== OS ==================================
  40. Product: WinNt, suite: TerminalServer SingleUserTS
  41. Built by: 14393.1613.amd64fre.rs1_release_d.170807-1806
  42. BUILD_VERSION: 10.0.14393.1613 (rs1_release_d.170807-1806)
  43. BUILD: 14393
  44. SERVICEPACK: 1613
  45. PLATFORM_TYPE: x64
  46. NAME: Windows 10
  47. EDITION: Windows 10 WinNt TerminalServer SingleUserTS
  48. BUILD_TIMESTAMP: 2017-08-08 00:56:59
  49. BUILDDATESTAMP: 170807-1806
  50. BUILDLAB: rs1_release_d
  51. BUILDOSVER: 10.0.14393.1613
  52.  
  53. =============================== DEBUGGER ===============================
  54. Microsoft (R) Windows Debugger Version 10.0.14321.1024 X86
  55. Copyright (c) Microsoft Corporation. All rights reserved.
  56.  
  57. =============================== COMMENTS ===============================
  58. * Information gathered from different dump files may be different. If
  59. Windows updates between two dump files, two or more OS versions may
  60. be shown above.
  61. * If the user updates the BIOS between dump files, two or more versions
  62. and dates may be shown above.
  63. * More RAM information can be found below in the full BIOS section.
  64.  
  65.  
  66.  
  67. ========================================================================
  68. ==================== Dump File: 010818-23187-01.dmp ====================
  69. ========================================================================
  70. Mini Kernel Dump File: Only registers and stack trace are available
  71. Windows 10 Kernel Version 14393 MP (2 procs) Free x64
  72. Kernel base = 0xfffff802`06017000 PsLoadedModuleList = 0xfffff802`06315040
  73. Debug session time: Sun Jan 7 16:17:07.765 2018 (UTC - 5:00)
  74. System Uptime: 0 days 0:11:12.622
  75.  
  76. BugCheck A, {ffff898789e8d2b8, d, 0, fffff8020602ac58}
  77. Probably caused by : ntkrnlmp.exe ( nt!KiCallInterruptServiceRoutine+138 )
  78. Followup: MachineOwner
  79.  
  80. IRQL_NOT_LESS_OR_EQUAL (a)
  81. An attempt was made to access a pageable (or completely invalid) address at an
  82. interrupt request level (IRQL) that is too high. This is usually
  83. caused by drivers using improper addresses.
  84. If a kernel debugger is available get the stack backtrace.
  85.  
  86. Arguments:
  87. Arg1: ffff898789e8d2b8, memory referenced
  88. Arg2: 000000000000000d, IRQL
  89. Arg3: 0000000000000000, bitfield :
  90. bit 0 : value 0 = read operation, 1 = write operation
  91. bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
  92. Arg4: fffff8020602ac58, address which referenced memory
  93.  
  94. Debugging Details:
  95. DUMP_CLASS: 1
  96. DUMP_QUALIFIER: 400
  97. DUMP_TYPE: 2
  98. READ_ADDRESS: fffff802063b6338: Unable to get MiVisibleState
  99. ffff898789e8d2b8
  100. CURRENT_IRQL: d
  101. FAULTING_IP:
  102. nt!KiCallInterruptServiceRoutine+138
  103. fffff802`0602ac58 482b8bb8000000 sub rcx,qword ptr [rbx+0B8h]
  104. CUSTOMER_CRASH_COUNT: 1
  105. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  106. BUGCHECK_STR: AV
  107.  
  108. PROCESS_NAME: System
  109.  
  110. TRAP_FRAME: ffffa9878b7b27d0 -- (.trap 0xffffa9878b7b27d0)
  111. Unable to read trap frame at ffffa987`8b7b27d0
  112. EXCEPTION_RECORD: fffff80072f53f10 -- (.exr 0xfffff80072f53f10)
  113. ExceptionAddress: ccccccccccc3c032
  114. ExceptionCode: 8348c033
  115. ExceptionFlags: ccc328c4
  116. NumberParameters: -858993460
  117. Parameter[0]: cccccc0000285be9
  118. Parameter[1]: cccccccccccccccc
  119. Parameter[2]: ffde33e828ec8348
  120. Parameter[3]: 283ee928c48348ff
  121. Parameter[4]: cccccccccccc0000
  122. Parameter[5]: cccccccccccccccc
  123. Parameter[6]: 83485708245c8948
  124. Parameter[7]: 87d98b48c03320ec
  125. Parameter[8]: 01f88300005bf705
  126. Parameter[9]: 005bbb0d8d484b75
  127. Parameter[10]: fdbfffffddf6e800
  128. Parameter[11]: 5baa0d8d48ffffff
  129. Parameter[12]: d08b48c723480000
  130. Parameter[13]: 3d8348ffffde33e8
  131. Parameter[14]: 481e740000005ba7
  132. LAST_CONTROL_TRANSFER: from fffff80206171a29 to fffff802061668a0
  133. STACK_TEXT:
  134. ffff9481`ccffac98 fffff802`06171a29 : 00000000`0000000a ffff8987`89e8d2b8 00000000`0000000d 00000000`00000000 : nt!KeBugCheckEx
  135. ffff9481`ccffaca0 fffff802`06170007 : ffff9481`cc9e7180 fffff802`06037c9c 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
  136. ffff9481`ccffade0 fffff802`0602ac58 : ffff9481`ccffaf01 00000000`00000000 ffffa128`d05bd8d5 00000000`00000000 : nt!KiPageFault+0x247
  137. ffff9481`ccffaf70 fffff802`06167f1a : ffff9481`cc9fc880 ffffa987`8b7b27d0 00000003`ea508b44 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0x138
  138. ffff9481`ccffafb0 fffff802`06168367 : 00000000`00000000 fffff800`710bbc28 00000000`00000000 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xea
  139. ffff9481`cc9fc800 fffff800`72f56792 : fffff800`72f53f10 00000003`ea508b44 ffffa987`8b7b27d0 ffff9481`cc9e7180 : nt!KiInterruptDispatchNoLockNoEtw+0x37
  140. ffff9481`cc9fc998 fffff800`72f53f10 : 00000003`ea508b44 ffffa987`8b7b27d0 ffff9481`cc9e7180 ffffa987`8ab87370 : amdk8!C1Halt+0x2
  141. ffff9481`cc9fc9a0 fffff802`06038d63 : 00000000`00000000 00000000`017d7840 ffffa987`8ab87370 00000000`000003ad : amdk8!AcpiCStateIdleExecute+0x20
  142. ffff9481`cc9fc9d0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PpmIdleExecuteTransition+0x643
  143. STACK_COMMAND: kb
  144. THREAD_SHA1_HASH_MOD_FUNC: a5922086b08a6aa89a264f0ecb4b95751619afb4
  145. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 589a51c4c2f194286b11b63f010f110409c046e6
  146. THREAD_SHA1_HASH_MOD: 41c5e8c353b9837f2d758e7d2417002883880d1e
  147. FOLLOWUP_IP:
  148. nt!KiCallInterruptServiceRoutine+138
  149. fffff802`0602ac58 482b8bb8000000 sub rcx,qword ptr [rbx+0B8h]
  150. FAULT_INSTR_CODE: b88b2b48
  151. SYMBOL_STACK_INDEX: 3
  152. SYMBOL_NAME: nt!KiCallInterruptServiceRoutine+138
  153. FOLLOWUP_NAME: MachineOwner
  154. MODULE_NAME: nt
  155.  
  156. IMAGE_NAME: ntkrnlmp.exe
  157.  
  158. DEBUG_FLR_IMAGE_TIMESTAMP: 5989449b
  159. IMAGE_VERSION: 10.0.14393.1613
  160. BUCKET_ID_FUNC_OFFSET: 138
  161. FAILURE_BUCKET_ID: AV_nt!KiCallInterruptServiceRoutine
  162. BUCKET_ID: AV_nt!KiCallInterruptServiceRoutine
  163. PRIMARY_PROBLEM_CLASS: AV_nt!KiCallInterruptServiceRoutine
  164. TARGET_TIME: 2018-01-07T21:17:07.000Z
  165. SUITE_MASK: 272
  166. PRODUCT_TYPE: 1
  167. USER_LCID: 0
  168. FAILURE_ID_HASH_STRING: km:av_nt!kicallinterruptserviceroutine
  169. FAILURE_ID_HASH: {49ead8ee-52e2-d680-57c5-6664c364ad42}
  170. Followup: MachineOwner
  171.  
  172. ========================================================================
  173. ===================== 3RD PARTY DRIVER QUICK LIST ======================
  174. ========================================================================
  175. Apr 20 2011 - nvmf6264.sys - NVidia NForce Network driver
  176. Aug 08 2011 - BazisVirtualCDBus.sys - WinCDEmu Virtual CD-ROM driver (Bazis Inc) http://wincdemu.sysprogs.org/
  177. Apr 21 2014 - dump_nvstor.sys - (Generic Description) dump_*.sys drivers usually provide disk access during a crash to write dump files.
  178. Apr 21 2014 - nvstor.sys - Nvidia SATA driver http://www.nvidia.com/
  179. Jul 06 2015 - eamonm.sys - ESET Anti-virus monitor https://www.eset.com/
  180. Jul 06 2015 - edevmon.sys - ESET Smart Security https://www.eset.com/
  181. Jul 06 2015 - ehdrv.sys - ESET Helper driver https://www.eset.com/
  182. Jul 06 2015 - epfwwfpr.sys - ESET Smart Security - Personal Firewall driver https://www.eset.com/
  183. Aug 10 2015 - nvvad64v.sys - Nvidia Virtual Audio Driver http://www.nvidia.com/
  184. Sep 18 2015 - NvStreamKms.sys - Nvidia Streaming Kernel Service http://www.nvidia.com/
  185. May 19 2016 - idmwfp.sys - Internet Download Manager WFP driver (Tonec Inc.)
  186. May 16 2017 - nvhda64v.sys - Nvidia HDMI Audio Device http://www.nvidia.com/
  187. Jul 18 2017 - nvlddmkm.sys - Nvidia Graphics Card driver http://www.nvidia.com/
  188.  
  189. ========================================================================
  190. ========================== 3RD PARTY DRIVERS ===========================
  191. ========================================================================
  192. Image path: \SystemRoot\System32\drivers\nvmf6264.sys
  193. Image name: nvmf6264.sys
  194. Search : https://www.google.com/search?q=nvmf6264.sys
  195. ADA Info : NVidia NForce Network driver
  196. Timestamp : Wed Apr 20 2011
  197.  
  198. Image path: \SystemRoot\System32\drivers\BazisVirtualCDBus.sys
  199. Image name: BazisVirtualCDBus.sys
  200. Search : https://www.google.com/search?q=BazisVirtualCDBus.sys
  201. ADA Info : WinCDEmu Virtual CD-ROM driver (Bazis Inc) http://wincdemu.sysprogs.org/
  202. Timestamp : Mon Aug 8 2011
  203.  
  204. Image path: \SystemRoot\System32\Drivers\dump_nvstor.sys
  205. Image name: dump_nvstor.sys
  206. Search : https://www.google.com/search?q=dump_nvstor.sys
  207. ADA Info : (Generic Description) dump_*.sys drivers usually provide disk access during a crash to write dump files.
  208. Timestamp : Mon Apr 21 2014
  209.  
  210. Image path: \SystemRoot\System32\drivers\nvstor.sys
  211. Image name: nvstor.sys
  212. Search : https://www.google.com/search?q=nvstor.sys
  213. ADA Info : Nvidia SATA driver http://www.nvidia.com/
  214. Timestamp : Mon Apr 21 2014
  215.  
  216. Image path: \SystemRoot\system32\DRIVERS\eamonm.sys
  217. Image name: eamonm.sys
  218. Search : https://www.google.com/search?q=eamonm.sys
  219. ADA Info : ESET Anti-virus monitor https://www.eset.com/
  220. Timestamp : Mon Jul 6 2015
  221.  
  222. Image path: \SystemRoot\system32\DRIVERS\edevmon.sys
  223. Image name: edevmon.sys
  224. Search : https://www.google.com/search?q=edevmon.sys
  225. ADA Info : ESET Smart Security https://www.eset.com/
  226. Timestamp : Mon Jul 6 2015
  227.  
  228. Image path: \SystemRoot\system32\DRIVERS\ehdrv.sys
  229. Image name: ehdrv.sys
  230. Search : https://www.google.com/search?q=ehdrv.sys
  231. ADA Info : ESET Helper driver https://www.eset.com/
  232. Timestamp : Mon Jul 6 2015
  233.  
  234. Image path: \SystemRoot\system32\DRIVERS\epfwwfpr.sys
  235. Image name: epfwwfpr.sys
  236. Search : https://www.google.com/search?q=epfwwfpr.sys
  237. ADA Info : ESET Smart Security - Personal Firewall driver https://www.eset.com/
  238. Timestamp : Mon Jul 6 2015
  239.  
  240. Image path: \SystemRoot\system32\drivers\nvvad64v.sys
  241. Image name: nvvad64v.sys
  242. Search : https://www.google.com/search?q=nvvad64v.sys
  243. ADA Info : Nvidia Virtual Audio Driver http://www.nvidia.com/
  244. Timestamp : Mon Aug 10 2015
  245.  
  246. Image path: \??\C:\Program Files\NVIDIA Corporation\NvStreamSrv\NvStreamKms.sys
  247. Image name: NvStreamKms.sys
  248. Search : https://www.google.com/search?q=NvStreamKms.sys
  249. ADA Info : Nvidia Streaming Kernel Service http://www.nvidia.com/
  250. Timestamp : Fri Sep 18 2015
  251.  
  252. Image path: \SystemRoot\system32\DRIVERS\idmwfp.sys
  253. Image name: idmwfp.sys
  254. Search : https://www.google.com/search?q=idmwfp.sys
  255. ADA Info : Internet Download Manager WFP driver (Tonec Inc.)
  256. Timestamp : Thu May 19 2016
  257.  
  258. Image path: \SystemRoot\system32\drivers\nvhda64v.sys
  259. Image name: nvhda64v.sys
  260. Search : https://www.google.com/search?q=nvhda64v.sys
  261. ADA Info : Nvidia HDMI Audio Device http://www.nvidia.com/
  262. Timestamp : Tue May 16 2017
  263.  
  264. Image path: \SystemRoot\System32\DriverStore\FileRepository\nvaki.inf_amd64_1d1a6251221e8555\nvlddmkm.sys
  265. Image name: nvlddmkm.sys
  266. Search : https://www.google.com/search?q=nvlddmkm.sys
  267. ADA Info : Nvidia Graphics Card driver http://www.nvidia.com/
  268. Timestamp : Tue Jul 18 2017
  269.  
  270. If any of the above drivers are from Microsoft then please let me know.
  271. I will have them moved to the Microsoft list on the next update.
  272.  
  273. ========================================================================
  274. ========================== MICROSOFT DRIVERS ===========================
  275. ========================================================================
  276. ACPI.sys ACPI Driver for NT (Microsoft)
  277. acpiex.sys ACPIEx Driver (Microsoft)
  278. afd.sys Ancillary Function Driver for WinSock (Microsoft)
  279. ahcache.sys Application Compatibility Cache (Microsoft)
  280. amdk8.sys Processor Device Driver
  281. atapi.sys ATAPI IDE MiniPort driver (Microsoft)
  282. ataport.SYS ATAPI Driver Extension (Microsoft)
  283. BasicDisplay.sys Basic Display driver (Microsoft)
  284. BasicRender.sys Basic Render driver (Microsoft)
  285. Beep.SYS BEEP driver (Microsoft)
  286. BOOTVID.dll VGA Boot Driver (Microsoft)
  287. bowser.sys NT Lan Manager Datagram Receiver Driver (Microsoft)
  288. cdd.dll Canonical Display Driver (Microsoft)
  289. cdrom.sys SCSI CD-ROM Driver (Microsoft)
  290. CEA.sys Event Aggregation Kernal Mode Library (Microsoft)
  291. CI.dll Code Integrity Module (Microsoft)
  292. CLASSPNP.SYS SCSI Class System Dll (Microsoft)
  293. CLFS.SYS Common Log File System Driver (Microsoft)
  294. clipsp.sys CLIP Service (Microsoft)
  295. cmimcext.sys Kernal Configuration Manager Initial Con. Driver (Microsoft)
  296. cng.sys Kernal Cryptography, Next Generation Driver (Microsoft)
  297. CompositeBus.sys Multi-Transport Composite Bus Enumerator (Microsoft)
  298. condrv.sys Console Driver (Microsoft)
  299. crashdmp.sys Crash Dump driver (Microsoft)
  300. csc.sys Windows Client Side Caching driver (Microsoft)
  301. dfsc.sys DFS Namespace Client Driver (Microsoft)
  302. disk.sys PnP Disk Driver (Microsoft)
  303. drmk.sys Digital Rights Management (DRM) driver (Microsoft)
  304. dump_diskdump.sys Crash Dump Disk Driver
  305. dump_dumpfve.sys Bitlocker Drive Encryption Crashdump Filter
  306. dxgkrnl.sys DirectX Graphics Kernal (Microsoft)
  307. dxgmms2.sys DirectX Graphics MMS
  308. filecrypt.sys Windows sandboxing and encryption filter (Microsoft)
  309. fileinfo.sys FileInfo Filter Driver (Microsoft)
  310. FLTMGR.SYS Filesystem Filter Manager (Microsoft)
  311. Fs_Rec.sys File System Recognizer Driver (Microsoft)
  312. fvevol.sys BitLocker Driver Encryption Driver (Microsoft)
  313. fwpkclnt.sys FWP/IPsec Kernal-Mode API (Microsoft)
  314. gpuenergydrv.sys GPU Energy Kernal Driver (Microsoft)
  315. hal.dll Hardware Abstraction Layer DLL (Microsoft)
  316. HDAudBus.sys High Definition Audio Bus Driver (Microsoft)
  317. HdAudio.sys High Definition Audio Function driver (Microsoft)
  318. HIDCLASS.SYS Hid Class Library (Microsoft)
  319. HIDPARSE.SYS Hid Parsing Library (Microsoft)
  320. hidusb.sys USB Miniport Driver for Input Devices (Microsoft)
  321. HTTP.sys HTTP Protocol Stack (Microsoft)
  322. intelpep.sys Intel Power Engine Plugin (Microsoft)
  323. iorate.sys I/O rate control Filter (Microsoft)
  324. kbdclass.sys Keyboard Class Driver (Microsoft)
  325. kbdhid.sys HID Mouse Filter Driver or HID Keyboard Filter Driver (Microsoft)
  326. kd.dll Local Kernal Debugger (Microsoft)
  327. kdnic.sys Microsoft Kernel Debugger Network Miniport (Microsoft)
  328. ks.sys Kernal CSA Library (Microsoft)
  329. ksecdd.sys Kernel Security Support Provider Interface (Microsoft)
  330. ksecpkg.sys Kernel Security Support Provider Interface Packages (Microsoft)
  331. ksthunk.sys Kernal Streaming WOW Thunk Service (Microsoft)
  332. lltdio.sys Link-Layer Topology Mapper I/O Driver (Microsoft)
  333. luafv.sys LUA File Virtualization Filter Driver (Microsoft)
  334. mcupdate_AuthenticAMD.dll AMD Microcode Update Library (Microsoft)
  335. mmcss.sys MMCSS Driver (Microsoft)
  336. monitor.sys Monitor Driver (Microsoft)
  337. mouclass.sys Mouse Class Driver (Microsoft)
  338. mouhid.sys HID Mouse Filter Driver (Microsoft)
  339. mountmgr.sys Mount Point Manager (Microsoft)
  340. mpsdrv.sys Microsoft Protection Service Driver (Microsoft)
  341. mrxsmb.sys SMB MiniRedirector Wrapper and Engine (Microsoft)
  342. mrxsmb10.sys Longhorn SMB Downlevel SubRdr (Microsoft)
  343. mrxsmb20.sys Longhorn SMB 2.0 Redirector (Microsoft)
  344. Msfs.SYS Mailslot driver (Microsoft)
  345. msisadrv.sys ISA Driver (Microsoft)
  346. mslldp.sys Microsoft Link-Layer Discovery Protocol... (Microsoft)
  347. msrpc.sys Kernel Remote Procedure Call Provider (Microsoft)
  348. mssmbios.sys System Management BIOS driver (Microsoft)
  349. mup.sys Multiple UNC Provider driver (Microsoft)
  350. ndis.sys Network Driver Interface Specification (NDIS) driver (Microsoft)
  351. NdisVirtualBus.sys Virtual Network Adapter Enumerator (Microsoft)
  352. Ndu.sys Network Data Usage Monitoring driver (Microsoft)
  353. netbios.sys NetBIOS Interface driver (Microsoft)
  354. netbt.sys MBT Transport driver (Microsoft)
  355. NETIO.SYS Network I/O Subsystem (Microsoft)
  356. Npfs.SYS NPFS driver (Microsoft)
  357. npsvctrig.sys Named pipe service triggers (Microsoft)
  358. nsiproxy.sys NSI Proxy driver (Microsoft)
  359. NTFS.sys NT File System Driver (Microsoft)
  360. ntkrnlmp.exe Windows NT operating system kernel (Microsoft)
  361. ntosext.sys NTOS Extension Host driver (Microsoft)
  362. Null.SYS NULL Driver (Microsoft)
  363. pacer.sys QoS Packet Scheduler (Microsoft)
  364. parport.sys Parallel Port Driver (Microsoft)
  365. partmgr.sys Partition driver (Microsoft)
  366. pci.sys NT Plug and Play PCI Enumerator (Microsoft)
  367. pciide.sys Generic PCI IDE Bus Driver (Microsoft)
  368. PCIIDEX.SYS PCI IDE Bus driver file (Microsoft)
  369. pcw.sys Performance Counter Driver (Microsoft)
  370. pdc.sys Power Dependency Coordinator Driver (Microsoft)
  371. peauth.sys Protected Environment Authentication and Authorization Export Driver (Microsoft)
  372. portcls.sys Class Driver for Port/Miniport Devices system driver (Microsoft)
  373. PSHED.dll Platform Specific Hardware Error driver (Microsoft)
  374. rdbss.sys Redirected Drive Buffering SubSystem driver (Microsoft)
  375. rdpbus.sys Microsoft RDP Bus Device driver (Microsoft)
  376. rdyboost.sys ReadyBoost Driver (Microsoft)
  377. registry.sys Registry Container driver (Microsoft)
  378. rspndr.sys Link-Layer Topology Responder driver (Microsoft)
  379. serenum.sys Serial Port Enumerator (Microsoft)
  380. serial.sys Serial Device Driver
  381. spaceport.sys Storage Spaces driver (Microsoft)
  382. srv.sys Server driver (Microsoft)
  383. srv2.sys Smb 2.0 Server driver (Microsoft)
  384. srvnet.sys Server Network driver (Microsoft)
  385. storport.sys Storage port driver for use with high-performance buses such as fibre channel buses and RAID adapters. (Microsoft)
  386. storqosflt.sys Storage QoS Filter driver (Microsoft)
  387. swenum.sys Plug and Play Software Device Enumerator (Microsoft)
  388. tbs.sys Export driver for kernel mode TPM API (Microsoft)
  389. tcpip.sys TCP/IP Protocol driver (Microsoft)
  390. tcpipreg.sys Microsoft Windows TCP/IP Registry Compatibility driver (Microsoft)
  391. TDI.SYS TDI Wrapper driver (Microsoft)
  392. tdx.sys NetIO Legacy TDI x-bit Support Driver (Microsoft)
  393. tm.sys Kernel Transaction Manager driver (Microsoft)
  394. TSDDD.dll Framebuffer Display Driver (Microsoft)
  395. umbus.sys User-Mode Bus Enumerator (Microsoft)
  396. usbccgp.sys USB Common Class Generic Parent Driver (Microsoft)
  397. USBD.SYS Universal Serial Bus Driver (Microsoft)
  398. usbehci.sys EHCI eUSB Miniport Driver (Microsoft)
  399. usbhub.sys Default Hub Driver for USB (Microsoft)
  400. usbohci.sys OHCI USB Miniport Driver (Microsoft)
  401. USBPORT.SYS USB 1.1 & 2.0 Port Driver (Microsoft)
  402. USBSTOR.SYS USB Mass Storage Class driver (Microsoft)
  403. vdrvroot.sys Virtual Drive Root Enumerator (Microsoft)
  404. volmgr.sys Volume Manager Driver (Microsoft)
  405. volmgrx.sys Volume Manager Extension Driver (Microsoft)
  406. volsnap.sys Volume Shadow Copy driver (Microsoft)
  407. volume.sys Volume driver (Microsoft)
  408. vwififlt.sys Virtual WiFi Filter Driver (Microsoft)
  409. watchdog.sys Watchdog driver (Microsoft)
  410. wcifs.sys Windows Container Isolation FS Filter driver (Microsoft)
  411. Wdf01000.sys Kernel Mode Driver Framework Runtime (Microsoft)
  412. WDFLDR.SYS Kernel Mode Driver Framework Loader (Microsoft)
  413. werkernel.sys Windows Error Reporting Kernel driver (Microsoft)
  414. wfplwfs.sys WPF NDIS Lightweight Filter driver (Microsoft)
  415. win32k.sys Full/Desktop Multi-User Win32 driver (Microsoft)
  416. win32kbase.sys Base Win32k Kernel Driver (Microsoft)
  417. win32kfull.sys Full/Desktop Win32k Kernel Driver (Microsoft)
  418. WindowsTrustedRT.sys Windows Trusted Runtime Interface driver (Microsoft)
  419. WindowsTrustedRTProxy.sys Windows Trusted Runtime Service Proxy driver (Microsoft)
  420. WMILIB.SYS WMILIB WMI support library DLL (Microsoft)
  421. Wof.sys Windows Overlay Filter (Microsoft)
  422. WpdUpFltr.sys Portable Device Upper Class Filter driver (Microsoft)
  423. WppRecorder.sys WPP Trace Recorder (Microsoft)
  424. WudfPf.sys Windows Driver Foundation - User-mode Driver Framework Platform driver (Microsoft)
  425. WUDFRd.sys Windows Driver Foundation - User-mode Driver Framework Reflector driver (Microsoft)
  426.  
  427. Unloaded modules:
  428. fffff800`75da0000 fffff800`75dbc000 EhStorClass.
  429. fffff800`739c0000 fffff800`739fc000 WUDFRd.sys
  430. fffff800`739c0000 fffff800`739fc000 WUDFRd.sys
  431. fffff800`73490000 fffff800`734ac000 EhStorClass.
  432. fffff800`716e0000 fffff800`716fc000 EhStorClass.
  433. fffff800`72240000 fffff800`7224f000 dump_storpor
  434. fffff800`72280000 fffff800`722aa000 dump_nvstor.
  435. fffff800`722d0000 fffff800`722ed000 dump_dumpfve
  436. fffff800`72fd0000 fffff800`72ff2000 i8042prt.sys
  437. fffff800`72ea0000 fffff800`72eb4000 dam.sys
  438. fffff800`72150000 fffff800`7215f000 hwpolicy.sys
  439.  
  440. ========================================================================
  441. ============================== BIOS INFO ===============================
  442. ========================================================================
  443. [SMBIOS Data Tables v2.5]
  444. [DMI Version - 0]
  445. [2.0 Calling Convention - No]
  446. [Table Size - 1973 bytes]
  447. [BIOS Information (Type 0) - Length 24 - Handle 0000h]
  448. Vendor MS-7250
  449. BIOS Version V3.9
  450. BIOS Starting Address Segment f000
  451. BIOS Release Date 10/04/2007
  452. BIOS ROM Size 80000
  453. BIOS Characteristics
  454. 04: - ISA Supported
  455. 07: - PCI Supported
  456. 09: - Plug and Play Supported
  457. 10: - APM Supported
  458. 11: - Upgradeable FLASH BIOS
  459. 12: - BIOS Shadowing Supported
  460. 14: - ESCD Supported
  461. 15: - CD-Boot Supported
  462. 16: - Selectable Boot Supported
  463. 17: - BIOS ROM Socketed
  464. 19: - EDD Supported
  465. 23: - 1.2MB Floppy Supported
  466. 24: - 720KB Floppy Supported
  467. 25: - 2.88MB Floppy Supported
  468. 26: - Print Screen Device Supported
  469. 27: - Keyboard Services Supported
  470. 28: - Serial Services Supported
  471. 29: - Printer Services Supported
  472. 30: - CGA/Mono Services Supported
  473. 32: - BIOS Vendor Reserved
  474. BIOS Characteristic Extensions
  475. 00: - ACPI Supported
  476. 01: - USB Legacy Supported
  477. 04: - LS120-Boot Supported
  478. 05: - ATAPI ZIP-Boot Supported
  479. 08: - BIOS Boot Specification Supported
  480. 10: - Specification Reserved
  481. BIOS Major Revision 8
  482. BIOS Minor Revision 14
  483. EC Firmware Major Revision 255
  484. EC Firmware Minor Revision 255
  485. [System Information (Type 1) - Length 27 - Handle 0001h]
  486. Manufacturer MSI
  487. Product Name MS-7250
  488. Version 2.0
  489. UUID 00000000-0000-0000-0000-000000000000
  490. Wakeup Type Power Switch
  491. [BaseBoard Information (Type 2) - Length 15 - Handle 0002h]
  492. Manufacturer MSI
  493. Product MS-7250
  494. Version 2.0
  495. Feature Flags 09h
  496. Chassis Handle 0003h
  497. Board Type 0ah - Processor/Memory Module
  498. Number of Child Handles 0
  499. [System Enclosure (Type 3) - Length 21 - Handle 0003h]
  500. Chassis Type Desktop
  501. Bootup State Safe
  502. Power Supply State Safe
  503. Thermal State Safe
  504. Security Status None
  505. OEM Defined 0
  506. Height 0U
  507. Number of Power Cords 1
  508. Number of Contained Elements 0
  509. Contained Element Size 0
  510. [Processor Information (Type 4) - Length 40 - Handle 0004h]
  511. Socket Designation CPU 1
  512. Processor Type Central Processor
  513. Processor Family 01h - Other
  514. Processor Manufacturer AMD
  515. Processor ID 330f0400fffb8b17
  516. Processor Version AMD Athlon(tm) 64 X2 Dual Core Processor 6000+
  517. Processor Voltage 8fh - 1.5V
  518. External Clock 200MHz
  519. Max Speed 3000MHz
  520. Current Speed 3016MHz
  521. Status Enabled Populated
  522. Processor Upgrade Other
  523. L1 Cache Handle 0005h
  524. L2 Cache Handle 0006h
  525. L3 Cache Handle 0007h
  526. [Cache Information (Type 7) - Length 19 - Handle 0005h]
  527. Socket Designation L1-Cache
  528. Cache Configuration 0280h - Varies Enabled Int NonSocketed L1
  529. Maximum Cache Size 0100h - 256K
  530. Installed Size 0100h - 256K
  531. Supported SRAM Type 0010h - Pipeline-Burst
  532. Current SRAM Type 0010h - Pipeline-Burst
  533. Cache Speed 0ns
  534. Error Correction Type Multi-Bit ECC
  535. System Cache Type Data
  536. Associativity 4-way Set-Associative
  537. [Cache Information (Type 7) - Length 19 - Handle 0006h]
  538. Socket Designation L2-Cache
  539. Cache Configuration 0281h - Varies Enabled Int NonSocketed L2
  540. Maximum Cache Size 0800h - 2048K
  541. Installed Size 0800h - 2048K
  542. Supported SRAM Type 0010h - Pipeline-Burst
  543. Current SRAM Type 0010h - Pipeline-Burst
  544. Cache Speed 0ns
  545. Error Correction Type Multi-Bit ECC
  546. System Cache Type Unified
  547. Associativity 4-way Set-Associative
  548. [Cache Information (Type 7) - Length 19 - Handle 0007h]
  549. Socket Designation L3-Cache
  550. Cache Configuration 0302h - Unknown Disabled Int NonSocketed L3
  551. Maximum Cache Size 0000h - 0K
  552. Installed Size 0000h - 0K
  553. Supported SRAM Type 0002h - Unknown
  554. Current SRAM Type 0002h - Unknown
  555. Cache Speed 0ns
  556. Error Correction Type Unknown
  557. System Cache Type Unknown
  558. Associativity Unknown
  559. [Memory Controller Information (Type 5) - Length 24 - Handle 0008h]
  560. Error Detecting Method 06h - 64-bit ECC
  561. Error Correcting Capability 04h - None
  562. Supported Interleave 03h - One Way Interleave
  563. Current Interleave 03h - One Way Interleave
  564. Maximum Memory Module Size 0ah - 1024MB
  565. Supported Speeds 000ch - 70ns 60ns
  566. Supported Memory Types 0580h - SIMM DIMM SDRAM
  567. Memory Module Voltage 3.3V
  568. Number of Memory Slots 4
  569. Memory Slot Handle 0009h
  570. Memory Slot Handle 000ah
  571. Memory Slot Handle 000bh
  572. Memory Slot Handle 000ch
  573. Enabled Err Correcting Caps 04h - None
  574. [Memory Module Information (Type 6) - Length 12 - Handle 0009h]
  575. Socket Designation DIMM0
  576. Bank Connections 05h - 5 0
  577. Current Speed 5ns
  578. Current Memory Type 0140h - ECC DIMM
  579. Installed Size 8ah - 1024 [double bank]
  580. Enabled Size 8ah - 1024 [double bank]
  581. Error Status 00h - [No Errors]
  582. [Memory Module Information (Type 6) - Length 12 - Handle 000ah]
  583. Socket Designation DIMM1
  584. Bank Connections 05h - 5 0
  585. Current Speed 5ns
  586. Current Memory Type 0140h - ECC DIMM
  587. Installed Size 8ah - 1024 [double bank]
  588. Enabled Size 8ah - 1024 [double bank]
  589. Error Status 00h - [No Errors]
  590. [Memory Module Information (Type 6) - Length 12 - Handle 000bh]
  591. Socket Designation DIMM2
  592. Bank Connections 05h - 5 0
  593. Current Speed 5ns
  594. Current Memory Type 0140h - ECC DIMM
  595. Installed Size 8ah - 1024 [double bank]
  596. Enabled Size 8ah - 1024 [double bank]
  597. Error Status 00h - [No Errors]
  598. [Memory Module Information (Type 6) - Length 12 - Handle 000ch]
  599. Socket Designation DIMM3
  600. Bank Connections 05h - 5 0
  601. Current Speed 5ns
  602. Current Memory Type 0140h - ECC DIMM
  603. Installed Size 8ah - 1024 [double bank]
  604. Enabled Size 8ah - 1024 [double bank]
  605. Error Status 00h - [No Errors]
  606. [Onboard Devices Information (Type 10) - Length 6 - Handle 0027h]
  607. Number of Devices 1
  608. 01: Type Video [enabled]
  609. [OEM Strings (Type 11) - Length 5 - Handle 0028h]
  610. Number of Strings 1
  611. [System Configuration Options (Type 12) - Length 5 - Handle 0029h]
  612. [Physical Memory Array (Type 16) - Length 15 - Handle 002bh]
  613. Location 03h - SystemBoard/Motherboard
  614. Use 03h - System Memory
  615. Memory Error Correction 03h - None
  616. Maximum Capacity 8388608KB
  617. Number of Memory Devices 4
  618. [Memory Array Mapped Address (Type 19) - Length 15 - Handle 002ch]
  619. Starting Address 00000000h
  620. Ending Address 004bffffh
  621. Memory Array Handle 002bh
  622. Partition Width 01
  623. [Memory Device (Type 17) - Length 27 - Handle 002dh]
  624. Physical Memory Array Handle 002bh
  625. Total Width 64 bits
  626. Data Width 72 bits
  627. Size 1024MB
  628. Form Factor 09h - DIMM
  629. Device Locator DIMM0
  630. Bank Locator BANK0
  631. Memory Type 13h - Specification Reserved
  632. Type Detail 0080h - Synchronous
  633. Speed 0MHz
  634. Manufacturer Manufacturer0
  635. Part Number PartNum0
  636. [Memory Device Mapped Address (Type 20) - Length 19 - Handle 002eh]
  637. Starting Address 00000000h
  638. Ending Address 000fffffh
  639. Memory Device Handle 002dh
  640. Mem Array Mapped Adr Handle 002ch
  641. Partition Row Position 01
  642. Interleave Position [None]
  643. Interleave Data Depth [None]
  644. [Memory Device (Type 17) - Length 27 - Handle 002fh]
  645. Physical Memory Array Handle 002bh
  646. Total Width 64 bits
  647. Data Width 72 bits
  648. Size 1024MB
  649. Form Factor 09h - DIMM
  650. Device Locator DIMM1
  651. Bank Locator BANK1
  652. Memory Type 13h - Specification Reserved
  653. Type Detail 0080h - Synchronous
  654. Speed 0MHz
  655. Manufacturer Manufacturer1
  656. Part Number PartNum1
  657. [Memory Device Mapped Address (Type 20) - Length 19 - Handle 0030h]
  658. Starting Address 00100000h
  659. Ending Address 001fffffh
  660. Memory Device Handle 002fh
  661. Mem Array Mapped Adr Handle 002ch
  662. Partition Row Position 01
  663. Interleave Position [None]
  664. Interleave Data Depth [None]
  665. [Memory Device (Type 17) - Length 27 - Handle 0031h]
  666. Physical Memory Array Handle 002bh
  667. Total Width 64 bits
  668. Data Width 72 bits
  669. Size 1024MB
  670. Form Factor 09h - DIMM
  671. Device Locator DIMM2
  672. Bank Locator BANK2
  673. Memory Type 13h - Specification Reserved
  674. Type Detail 0080h - Synchronous
  675. Speed 0MHz
  676. Manufacturer Manufacturer2
  677. Part Number PartNum2
  678. [Memory Device Mapped Address (Type 20) - Length 19 - Handle 0032h]
  679. Starting Address 00200000h
  680. Ending Address 002fffffh
  681. Memory Device Handle 0031h
  682. Mem Array Mapped Adr Handle 002ch
  683. Partition Row Position 01
  684. Interleave Position [None]
  685. Interleave Data Depth [None]
  686. [Memory Device (Type 17) - Length 27 - Handle 0033h]
  687. Physical Memory Array Handle 002bh
  688. Total Width 64 bits
  689. Data Width 72 bits
  690. Size 1024MB
  691. Form Factor 09h - DIMM
  692. Device Locator DIMM3
  693. Bank Locator BANK3
  694. Memory Type 13h - Specification Reserved
  695. Type Detail 0080h - Synchronous
  696. Speed 0MHz
  697. Manufacturer Manufacturer3
  698. Part Number PartNum3
  699. [Memory Device Mapped Address (Type 20) - Length 19 - Handle 0034h]
  700. Starting Address 00300000h
  701. Ending Address 003fffffh
  702. Memory Device Handle 0033h
  703. Mem Array Mapped Adr Handle 002ch
  704. Partition Row Position 01
  705. Interleave Position [None]
  706. Interleave Data Depth [None]
  707.  
  708. ========================================================================
  709. ==================== Dump File: 010818-18703-01.dmp ====================
  710. ========================================================================
  711. Mini Kernel Dump File: Only registers and stack trace are available
  712. Windows 10 Kernel Version 14393 MP (2 procs) Free x64
  713. Kernel base = 0xfffff801`39c81000 PsLoadedModuleList = 0xfffff801`39f7f040
  714. Debug session time: Sun Jan 7 17:56:45.741 2018 (UTC - 5:00)
  715. System Uptime: 0 days 0:16:30.599
  716.  
  717. BugCheck F7, {77b532310502, 57b532310502, ffffa84acdcefafd, 0}
  718. Probably caused by : ntkrnlmp.exe ( nt!_report_gsfailure+25 )
  719. Followup: MachineOwner
  720.  
  721. DRIVER_OVERRAN_STACK_BUFFER (f7)
  722. A driver has overrun a stack-based buffer. This overrun could potentially
  723. allow a malicious user to gain control of this machine.
  724. DESCRIPTION
  725. A driver overran a stack-based buffer (or local variable) in a way that would
  726. have overwritten the function's return address and jumped back to an arbitrary
  727. address when the function returned. This is the classic "buffer overrun"
  728. hacking attack and the system has been brought down to prevent a malicious user
  729. from gaining complete control of it.
  730. Do a kb to get a stack backtrace -- the last routine on the stack before the
  731. buffer overrun handlers and bugcheck call is the one that overran its local
  732. variable(s).
  733.  
  734. Arguments:
  735. Arg1: 000077b532310502, Actual security check cookie from the stack
  736. Arg2: 000057b532310502, Expected security check cookie
  737. Arg3: ffffa84acdcefafd, Complement of the expected security check cookie
  738. Arg4: 0000000000000000, zero
  739.  
  740. Debugging Details:
  741. DUMP_CLASS: 1
  742. DUMP_QUALIFIER: 400
  743. DUMP_TYPE: 2
  744. SECURITY_COOKIE: Expected 000057b532310502 found 000077b532310502
  745. BUGCHECK_STR: 0xF7_ONE_BIT
  746. CUSTOMER_CRASH_COUNT: 1
  747. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  748.  
  749. PROCESS_NAME: System
  750.  
  751. CURRENT_IRQL: d
  752. EXCEPTION_RECORD: fffff80042113f10 -- (.exr 0xfffff80042113f10)
  753. ExceptionAddress: ccccccccccc3c032
  754. ExceptionCode: 8348c033
  755. ExceptionFlags: ccc328c4
  756. NumberParameters: -858993460
  757. Parameter[0]: cccccc0000285be9
  758. Parameter[1]: cccccccccccccccc
  759. Parameter[2]: ffde33e828ec8348
  760. Parameter[3]: 283ee928c48348ff
  761. Parameter[4]: cccccccccccc0000
  762. Parameter[5]: cccccccccccccccc
  763. Parameter[6]: 83485708245c8948
  764. Parameter[7]: 87d98b48c03320ec
  765. Parameter[8]: 01f88300005bf705
  766. Parameter[9]: 005bbb0d8d484b75
  767. Parameter[10]: fdbfffffddf6e800
  768. Parameter[11]: 5baa0d8d48ffffff
  769. Parameter[12]: d08b48c723480000
  770. Parameter[13]: 3d8348ffffde33e8
  771. Parameter[14]: 481e740000005ba7
  772. TRAP_FRAME: ffffb606b7eec010 -- (.trap 0xffffb606b7eec010)
  773. Unable to read trap frame at ffffb606`b7eec010
  774. LAST_CONTROL_TRANSFER: from fffff80139e2e821 to fffff80139dd08a0
  775. STACK_TEXT:
  776. fffff801`3b8a7da8 fffff801`39e2e821 : 00000000`000000f7 000077b5`32310502 000057b5`32310502 ffffa84a`cdcefafd : nt!KeBugCheckEx
  777. fffff801`3b8a7db0 fffff801`39ca1c9c : fffff801`3b899800 00000000`00000000 00000259`65181d00 fffff801`39c5a490 : nt!_report_gsfailure+0x25
  778. fffff801`3b8a7df0 fffff801`39c0f366 : fffff801`3b899800 fffff801`39c5a3e0 00000000`00000000 00000259`65181d8a : nt!KeClockInterruptNotify+0x13c
  779. fffff801`3b8a7f40 fffff801`39c94c26 : fffff801`39c5a3e0 00000000`00000008 fffff801`3b8a7f50 00000000`0000000c : hal!HalpTimerClockInterrupt+0x56
  780. fffff801`3b8a7f70 fffff801`39dd1f1a : fffff801`3b899880 ffffb606`b7eec010 00000005`c423252f 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0x106
  781. fffff801`3b8a7fb0 fffff801`39dd2367 : ffffb606`00000000 ffffb606`b7885897 00000000`00000000 ffffb606`000000e8 : nt!KiInterruptSubDispatchNoLockNoEtw+0xea
  782. fffff801`3b899800 fffff800`42116792 : fffff800`42113f10 00000005`c423252f ffffb606`b7eec010 fffff801`39fbc180 : nt!KiInterruptDispatchNoLockNoEtw+0x37
  783. fffff801`3b899998 fffff800`42113f10 : 00000005`c423252f ffffb606`b7eec010 fffff801`39fbc180 ffffb606`b6a74390 : amdk8!C1Halt+0x2
  784. fffff801`3b8999a0 fffff801`39ca2d63 : 00000000`00000000 00000000`017d7840 ffffb606`b6a74390 00000000`0000002a : amdk8!AcpiCStateIdleExecute+0x20
  785. fffff801`3b8999d0 fffff801`39ca256a : fffff800`4303c990 0000f7a6`0000f7a6 fffff800`43032510 0000f7a6`0000f7a6 : nt!PpmIdleExecuteTransition+0x643
  786. fffff801`3b899c40 fffff801`39dd38fc : 00000000`00000000 fffff801`39fbc180 fffff801`3a036940 ffffb606`b5e18580 : nt!PoIdle+0x33a
  787. fffff801`3b899da0 00000000`00000000 : fffff801`3b89a000 fffff801`3b894000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x2c
  788. STACK_COMMAND: kb
  789. THREAD_SHA1_HASH_MOD_FUNC: bbd0661dd0c012513a4f8287b31a4cb4b2d5f2b8
  790. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 0a87dae11ca1b59edb87a04a41fb5ce6dd3e1ea6
  791. THREAD_SHA1_HASH_MOD: 5f8f14073349eb608e726013129312238cd9c447
  792. FOLLOWUP_IP:
  793. nt!_report_gsfailure+25
  794. fffff801`39e2e821 cc int 3
  795. FAULT_INSTR_CODE: 48cccccc
  796. SYMBOL_STACK_INDEX: 1
  797. SYMBOL_NAME: nt!_report_gsfailure+25
  798. FOLLOWUP_NAME: MachineOwner
  799. MODULE_NAME: nt
  800.  
  801. IMAGE_NAME: ntkrnlmp.exe
  802.  
  803. DEBUG_FLR_IMAGE_TIMESTAMP: 5989449b
  804. IMAGE_VERSION: 10.0.14393.1613
  805. BUCKET_ID_FUNC_OFFSET: 25
  806. FAILURE_BUCKET_ID: 0xF7_ONE_BIT_MISSING_GSFRAME_nt!_report_gsfailure
  807. BUCKET_ID: 0xF7_ONE_BIT_MISSING_GSFRAME_nt!_report_gsfailure
  808. PRIMARY_PROBLEM_CLASS: 0xF7_ONE_BIT_MISSING_GSFRAME_nt!_report_gsfailure
  809. TARGET_TIME: 2018-01-07T22:56:45.000Z
  810. SUITE_MASK: 272
  811. PRODUCT_TYPE: 1
  812. USER_LCID: 0
  813. FAILURE_ID_HASH_STRING: km:0xf7_one_bit_missing_gsframe_nt!_report_gsfailure
  814. FAILURE_ID_HASH: {8f84f302-dd0e-1f96-6f9c-0ea31ad59f42}
  815. Followup: MachineOwner
  816.  
  817. ========================================================================
  818. ==================== Dump File: 010818-18265-01.dmp ====================
  819. ========================================================================
  820. Mini Kernel Dump File: Only registers and stack trace are available
  821. Windows 10 Kernel Version 14393 MP (2 procs) Free x64
  822. Kernel base = 0xfffff802`8cc94000 PsLoadedModuleList = 0xfffff802`8cf92040
  823. Debug session time: Sun Jan 7 17:39:37.296 2018 (UTC - 5:00)
  824. System Uptime: 0 days 0:07:51.154
  825.  
  826. BugCheck A, {fffff8008cc6d490, d, 1, fffff8028cca7c5f}
  827. Probably caused by : ntkrnlmp.exe ( nt!KiCallInterruptServiceRoutine+13f )
  828. Followup: MachineOwner
  829.  
  830. IRQL_NOT_LESS_OR_EQUAL (a)
  831. An attempt was made to access a pageable (or completely invalid) address at an
  832. interrupt request level (IRQL) that is too high. This is usually
  833. caused by drivers using improper addresses.
  834. If a kernel debugger is available get the stack backtrace.
  835.  
  836. Arguments:
  837. Arg1: fffff8008cc6d490, memory referenced
  838. Arg2: 000000000000000d, IRQL
  839. Arg3: 0000000000000001, bitfield :
  840. bit 0 : value 0 = read operation, 1 = write operation
  841. bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
  842. Arg4: fffff8028cca7c5f, address which referenced memory
  843.  
  844. Debugging Details:
  845. DUMP_CLASS: 1
  846. DUMP_QUALIFIER: 400
  847. DUMP_TYPE: 2
  848. WRITE_ADDRESS: fffff8028d033338: Unable to get MiVisibleState
  849. fffff8008cc6d490
  850. CURRENT_IRQL: d
  851. FAULTING_IP:
  852. nt!KiCallInterruptServiceRoutine+13f
  853. fffff802`8cca7c5f 49010f add qword ptr [r15],rcx
  854. CUSTOMER_CRASH_COUNT: 1
  855. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  856. BUGCHECK_STR: AV
  857.  
  858. PROCESS_NAME: System
  859.  
  860. TRAP_FRAME: fffff8028e170de0 -- (.trap 0xfffff8028e170de0)
  861. NOTE: The trap frame does not contain all registers.
  862. Some register values may be zeroed or incorrect.
  863. rax=00000107d6605117 rbx=0000000000000000 rcx=0000000000000de1
  864. rdx=0000010700000000 rsi=0000000000000000 rdi=0000000000000000
  865. rip=fffff8028cca7c5f rsp=fffff8028e170f70 rbp=fffff8028cfcf180
  866. r8=fffff8028cfcf180 r9=0000000000000000 r10=fffff8028cf81a50
  867. r11=fffff8028cdefb4f r12=0000000000000000 r13=0000000000000000
  868. r14=0000000000000000 r15=0000000000000000
  869. iopl=0 nv up ei pl nz na po nc
  870. nt!KiCallInterruptServiceRoutine+0x13f:
  871. fffff802`8cca7c5f 49010f add qword ptr [r15],rcx ds:00000000`00000000=????????????????
  872. Resetting default scope
  873. LAST_CONTROL_TRANSFER: from fffff8028cdeea29 to fffff8028cde38a0
  874. STACK_TEXT:
  875. fffff802`8e170c98 fffff802`8cdeea29 : 00000000`0000000a fffff800`8cc6d490 00000000`0000000d 00000000`00000001 : nt!KeBugCheckEx
  876. fffff802`8e170ca0 fffff802`8cded007 : fffff802`8cfcf180 fffff802`8ccb4c9c fffff802`8e162800 00000000`00000000 : nt!KiBugCheckDispatch+0x69
  877. fffff802`8e170de0 fffff802`8cca7c5f : fffff802`8cc6d3e0 00000000`00000008 fffff802`8e170f50 00000000`0000000c : nt!KiPageFault+0x247
  878. fffff802`8e170f70 fffff802`8cde4f1a : fffff802`8e162880 ffff9f01`2f62d7d0 00000002`be1a8753 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0x13f
  879. fffff802`8e170fb0 fffff802`8cde5367 : 00000000`00000000 00000000`00000003 00000000`00000000 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xea
  880. fffff802`8e162800 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0x37
  881. STACK_COMMAND: kb
  882. THREAD_SHA1_HASH_MOD_FUNC: 6727dbacf5d52303467364adf8410297e4a50cef
  883. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 56dd9a96d700973a42d2b70cbd2212a9bbe3e112
  884. THREAD_SHA1_HASH_MOD: ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693
  885. FOLLOWUP_IP:
  886. nt!KiCallInterruptServiceRoutine+13f
  887. fffff802`8cca7c5f 49010f add qword ptr [r15],rcx
  888. FAULT_INSTR_CODE: 4c0f0149
  889. SYMBOL_STACK_INDEX: 3
  890. SYMBOL_NAME: nt!KiCallInterruptServiceRoutine+13f
  891. FOLLOWUP_NAME: MachineOwner
  892. MODULE_NAME: nt
  893.  
  894. IMAGE_NAME: ntkrnlmp.exe
  895.  
  896. DEBUG_FLR_IMAGE_TIMESTAMP: 5989449b
  897. IMAGE_VERSION: 10.0.14393.1613
  898. BUCKET_ID_FUNC_OFFSET: 13f
  899. FAILURE_BUCKET_ID: AV_nt!KiCallInterruptServiceRoutine
  900. BUCKET_ID: AV_nt!KiCallInterruptServiceRoutine
  901. PRIMARY_PROBLEM_CLASS: AV_nt!KiCallInterruptServiceRoutine
  902. TARGET_TIME: 2018-01-07T22:39:37.000Z
  903. SUITE_MASK: 272
  904. PRODUCT_TYPE: 1
  905. USER_LCID: 0
  906. FAILURE_ID_HASH_STRING: km:av_nt!kicallinterruptserviceroutine
  907. FAILURE_ID_HASH: {49ead8ee-52e2-d680-57c5-6664c364ad42}
  908. Followup: MachineOwner
  909.  
  910. ========================================================================
  911. ==================== Dump File: 010818-18218-01.dmp ====================
  912. ========================================================================
  913. Mini Kernel Dump File: Only registers and stack trace are available
  914. Windows 10 Kernel Version 14393 MP (2 procs) Free x64
  915. Kernel base = 0xfffff802`19290000 PsLoadedModuleList = 0xfffff802`1958e040
  916. Debug session time: Sun Jan 7 17:26:05.911 2018 (UTC - 5:00)
  917. System Uptime: 0 days 0:18:03.770
  918.  
  919. BugCheck A, {ffff8f879de8d2b8, d, 0, fffff802192a3c58}
  920. Probably caused by : ntkrnlmp.exe ( nt!KiCallInterruptServiceRoutine+138 )
  921. Followup: MachineOwner
  922.  
  923. IRQL_NOT_LESS_OR_EQUAL (a)
  924. An attempt was made to access a pageable (or completely invalid) address at an
  925. interrupt request level (IRQL) that is too high. This is usually
  926. caused by drivers using improper addresses.
  927. If a kernel debugger is available get the stack backtrace.
  928.  
  929. Arguments:
  930. Arg1: ffff8f879de8d2b8, memory referenced
  931. Arg2: 000000000000000d, IRQL
  932. Arg3: 0000000000000000, bitfield :
  933. bit 0 : value 0 = read operation, 1 = write operation
  934. bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
  935. Arg4: fffff802192a3c58, address which referenced memory
  936.  
  937. Debugging Details:
  938. DUMP_CLASS: 1
  939. DUMP_QUALIFIER: 400
  940. DUMP_TYPE: 2
  941. READ_ADDRESS: fffff8021962f338: Unable to get MiVisibleState
  942. ffff8f879de8d2b8
  943. CURRENT_IRQL: d
  944. FAULTING_IP:
  945. nt!KiCallInterruptServiceRoutine+138
  946. fffff802`192a3c58 482b8bb8000000 sub rcx,qword ptr [rbx+0B8h]
  947. CUSTOMER_CRASH_COUNT: 1
  948. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  949. BUGCHECK_STR: AV
  950.  
  951. PROCESS_NAME: System
  952.  
  953. TRAP_FRAME: ffffaf879f7f3010 -- (.trap 0xffffaf879f7f3010)
  954. Unable to read trap frame at ffffaf87`9f7f3010
  955. EXCEPTION_RECORD: fffff80346733f10 -- (.exr 0xfffff80346733f10)
  956. ExceptionAddress: ccccccccccc3c032
  957. ExceptionCode: 8348c033
  958. ExceptionFlags: ccc328c4
  959. NumberParameters: -858993460
  960. Parameter[0]: cccccc0000285be9
  961. Parameter[1]: cccccccccccccccc
  962. Parameter[2]: ffde33e828ec8348
  963. Parameter[3]: 283ee928c48348ff
  964. Parameter[4]: cccccccccccc0000
  965. Parameter[5]: cccccccccccccccc
  966. Parameter[6]: 83485708245c8948
  967. Parameter[7]: 87d98b48c03320ec
  968. Parameter[8]: 01f88300005bf705
  969. Parameter[9]: 005bbb0d8d484b75
  970. Parameter[10]: fdbfffffddf6e800
  971. Parameter[11]: 5baa0d8d48ffffff
  972. Parameter[12]: d08b48c723480000
  973. Parameter[13]: 3d8348ffffde33e8
  974. Parameter[14]: 481e740000005ba7
  975. LAST_CONTROL_TRANSFER: from fffff802193eaa29 to fffff802193df8a0
  976. STACK_TEXT:
  977. ffffc281`1b7fec98 fffff802`193eaa29 : 00000000`0000000a ffff8f87`9de8d2b8 00000000`0000000d 00000000`00000000 : nt!KeBugCheckEx
  978. ffffc281`1b7feca0 fffff802`193e9007 : ffffc281`1b5e8180 fffff802`192b0c9c ffffffff`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
  979. ffffc281`1b7fede0 fffff802`192a3c58 : 00000000`1dbff301 00000000`00000000 ffff49ac`873f2548 00000000`00000000 : nt!KiPageFault+0x247
  980. ffffc281`1b7fef70 fffff802`193e0f1a : ffffc281`1b5fd880 ffffaf87`9f7f3010 00000006`4ef8f1b0 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0x138
  981. ffffc281`1b7fefb0 fffff802`193e1367 : 00000000`00000000 fffff803`4593bc28 00000000`00000000 fffff802`192d0035 : nt!KiInterruptSubDispatchNoLockNoEtw+0xea
  982. ffffc281`1b5fd800 fffff803`46736792 : fffff803`46733f10 00000006`4ef8f1b0 ffffaf87`9f7f3010 ffffc281`1b5e8180 : nt!KiInterruptDispatchNoLockNoEtw+0x37
  983. ffffc281`1b5fd998 fffff803`46733f10 : 00000006`4ef8f1b0 ffffaf87`9f7f3010 ffffc281`1b5e8180 ffffaf87`9f1f62a0 : amdk8!C1Halt+0x2
  984. ffffc281`1b5fd9a0 fffff802`192b1d63 : 00000000`00000000 00000000`017d7840 ffffaf87`9f1f62a0 00000000`0000002c : amdk8!AcpiCStateIdleExecute+0x20
  985. ffffc281`1b5fd9d0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PpmIdleExecuteTransition+0x643
  986. STACK_COMMAND: kb
  987. THREAD_SHA1_HASH_MOD_FUNC: a5922086b08a6aa89a264f0ecb4b95751619afb4
  988. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 589a51c4c2f194286b11b63f010f110409c046e6
  989. THREAD_SHA1_HASH_MOD: 41c5e8c353b9837f2d758e7d2417002883880d1e
  990. FOLLOWUP_IP:
  991. nt!KiCallInterruptServiceRoutine+138
  992. fffff802`192a3c58 482b8bb8000000 sub rcx,qword ptr [rbx+0B8h]
  993. FAULT_INSTR_CODE: b88b2b48
  994. SYMBOL_STACK_INDEX: 3
  995. SYMBOL_NAME: nt!KiCallInterruptServiceRoutine+138
  996. FOLLOWUP_NAME: MachineOwner
  997. MODULE_NAME: nt
  998.  
  999. IMAGE_NAME: ntkrnlmp.exe
  1000.  
  1001. DEBUG_FLR_IMAGE_TIMESTAMP: 5989449b
  1002. IMAGE_VERSION: 10.0.14393.1613
  1003. BUCKET_ID_FUNC_OFFSET: 138
  1004. FAILURE_BUCKET_ID: AV_nt!KiCallInterruptServiceRoutine
  1005. BUCKET_ID: AV_nt!KiCallInterruptServiceRoutine
  1006. PRIMARY_PROBLEM_CLASS: AV_nt!KiCallInterruptServiceRoutine
  1007. TARGET_TIME: 2018-01-07T22:26:05.000Z
  1008. SUITE_MASK: 272
  1009. PRODUCT_TYPE: 1
  1010. USER_LCID: 0
  1011. FAILURE_ID_HASH_STRING: km:av_nt!kicallinterruptserviceroutine
  1012. FAILURE_ID_HASH: {49ead8ee-52e2-d680-57c5-6664c364ad42}
  1013. Followup: MachineOwner
  1014.  
  1015. ========================================================================
  1016. ==================== Dump File: 010718-29437-01.dmp ====================
  1017. ========================================================================
  1018. Mini Kernel Dump File: Only registers and stack trace are available
  1019. Windows 10 Kernel Version 14393 MP (2 procs) Free x64
  1020. Kernel base = 0xfffff800`c161c000 PsLoadedModuleList = 0xfffff800`c191a040
  1021. Debug session time: Sun Jan 7 15:37:16.736 2018 (UTC - 5:00)
  1022. System Uptime: 0 days 1:22:35.111
  1023.  
  1024. BugCheck A, {ffff8d05b048f2b8, d, 0, fffff800c162fc58}
  1025. Probably caused by : ntkrnlmp.exe ( nt!KiCallInterruptServiceRoutine+138 )
  1026. Followup: MachineOwner
  1027.  
  1028. IRQL_NOT_LESS_OR_EQUAL (a)
  1029. An attempt was made to access a pageable (or completely invalid) address at an
  1030. interrupt request level (IRQL) that is too high. This is usually
  1031. caused by drivers using improper addresses.
  1032. If a kernel debugger is available get the stack backtrace.
  1033.  
  1034. Arguments:
  1035. Arg1: ffff8d05b048f2b8, memory referenced
  1036. Arg2: 000000000000000d, IRQL
  1037. Arg3: 0000000000000000, bitfield :
  1038. bit 0 : value 0 = read operation, 1 = write operation
  1039. bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
  1040. Arg4: fffff800c162fc58, address which referenced memory
  1041.  
  1042. Debugging Details:
  1043. DUMP_CLASS: 1
  1044. DUMP_QUALIFIER: 400
  1045. DUMP_TYPE: 2
  1046. READ_ADDRESS: fffff800c19bb338: Unable to get MiVisibleState
  1047. ffff8d05b048f2b8
  1048. CURRENT_IRQL: d
  1049. FAULTING_IP:
  1050. nt!KiCallInterruptServiceRoutine+138
  1051. fffff800`c162fc58 482b8bb8000000 sub rcx,qword ptr [rbx+0B8h]
  1052. CUSTOMER_CRASH_COUNT: 1
  1053. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  1054. BUGCHECK_STR: AV
  1055.  
  1056. PROCESS_NAME: System
  1057.  
  1058. TRAP_FRAME: ffffdc01609c3de0 -- (.trap 0xffffdc01609c3de0)
  1059. NOTE: The trap frame does not contain all registers.
  1060. Some register values may be zeroed or incorrect.
  1061. rax=00000d71649d75f7 rbx=0000000000000000 rcx=00000d71649d75f7
  1062. rdx=00000d7100000000 rsi=0000000000000000 rdi=0000000000000000
  1063. rip=fffff800c162fc58 rsp=ffffdc01609c3f70 rbp=ffffdc01609aa180
  1064. r8=ffffdc01609aa180 r9=0000000000000001 r10=ffffdc01609b0514
  1065. r11=0000000000000300 r12=0000000000000000 r13=0000000000000000
  1066. r14=0000000000000000 r15=0000000000000000
  1067. iopl=0 nv up ei pl nz na pe nc
  1068. nt!KiCallInterruptServiceRoutine+0x138:
  1069. fffff800`c162fc58 482b8bb8000000 sub rcx,qword ptr [rbx+0B8h] ds:00000000`000000b8=????????????????
  1070. Resetting default scope
  1071. LAST_CONTROL_TRANSFER: from fffff800c1776a29 to fffff800c176b8a0
  1072. STACK_TEXT:
  1073. ffffdc01`609c3c98 fffff800`c1776a29 : 00000000`0000000a ffff8d05`b048f2b8 00000000`0000000d 00000000`00000000 : nt!KeBugCheckEx
  1074. ffffdc01`609c3ca0 fffff800`c1775007 : ffffdc01`609aa180 fffff800`c163cc9c 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
  1075. ffffdc01`609c3de0 fffff800`c162fc58 : ffffdc01`609c3f01 00000000`00000000 ffff2a31`7044a2fa 00000000`00000000 : nt!KiPageFault+0x247
  1076. ffffdc01`609c3f70 fffff800`c176cf1a : ffffdc01`60866880 ffff8d8d`b1b977d0 0000001c`dc230de1 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0x138
  1077. ffffdc01`609c3fb0 fffff800`c176d367 : 00000000`00000000 ffffdc01`609a0000 00000000`00140001 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xea
  1078. ffffdc01`60866800 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0x37
  1079. STACK_COMMAND: kb
  1080. THREAD_SHA1_HASH_MOD_FUNC: 6727dbacf5d52303467364adf8410297e4a50cef
  1081. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 2677bc55260546afccfc761a380feed49e351ae7
  1082. THREAD_SHA1_HASH_MOD: ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693
  1083. FOLLOWUP_IP:
  1084. nt!KiCallInterruptServiceRoutine+138
  1085. fffff800`c162fc58 482b8bb8000000 sub rcx,qword ptr [rbx+0B8h]
  1086. FAULT_INSTR_CODE: b88b2b48
  1087. SYMBOL_STACK_INDEX: 3
  1088. SYMBOL_NAME: nt!KiCallInterruptServiceRoutine+138
  1089. FOLLOWUP_NAME: MachineOwner
  1090. MODULE_NAME: nt
  1091.  
  1092. IMAGE_NAME: ntkrnlmp.exe
  1093.  
  1094. DEBUG_FLR_IMAGE_TIMESTAMP: 5989449b
  1095. IMAGE_VERSION: 10.0.14393.1613
  1096. BUCKET_ID_FUNC_OFFSET: 138
  1097. FAILURE_BUCKET_ID: AV_nt!KiCallInterruptServiceRoutine
  1098. BUCKET_ID: AV_nt!KiCallInterruptServiceRoutine
  1099. PRIMARY_PROBLEM_CLASS: AV_nt!KiCallInterruptServiceRoutine
  1100. TARGET_TIME: 2018-01-07T20:37:16.000Z
  1101. SUITE_MASK: 272
  1102. PRODUCT_TYPE: 1
  1103. USER_LCID: 0
  1104. FAILURE_ID_HASH_STRING: km:av_nt!kicallinterruptserviceroutine
  1105. FAILURE_ID_HASH: {49ead8ee-52e2-d680-57c5-6664c364ad42}
  1106. Followup: MachineOwner
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement