Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 10.0.14321.1024 X86
- Copyright (c) Microsoft Corporation. All rights reserved.
- ========================================================================
- =================== Dump File: 071817-14000-01.dmp ===================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Kernel base = 0xfffff800`4ca11000 PsLoadedModuleList = 0xfffff800`4cd5d5e0
- Debug session time: Tue Jul 18 15:11:51.986 2017 (UTC - 4:00)
- System Uptime: 0 days 0:36:43.745
- BugCheck 19, {d, ffffb08ca0fd3e20, 9abcecfa570b79e7, 9abcecfa560b79e7}
- Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+22f6 )
- Followup: Pool_corruption
- BAD_POOL_HEADER (19)
- The pool is already corrupt at the time of the current request.
- This may or may not be due to the caller.
- The internal pool links must be walked to figure out a possible cause of
- the problem, and then special pool applied to the suspect tags or the driver
- verifier to a suspect driver.
- Arguments:
- Arg1: 000000000000000d,
- Arg2: ffffb08ca0fd3e20
- Arg3: 9abcecfa570b79e7
- Arg4: 9abcecfa560b79e7
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
- SYSTEM_MANUFACTURER: ASUS
- SYSTEM_PRODUCT_NAME: All Series
- SYSTEM_SKU: All
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: 2603
- BIOS_DATE: 02/22/2016
- BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
- BASEBOARD_PRODUCT: H97M-PLUS
- BASEBOARD_VERSION: Rev X.0x
- DUMP_TYPE: 2
- BUGCHECK_STR: 0x19_d
- CPU_COUNT: 8
- CPU_MHZ: c15
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 3c
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- PROCESS_NAME: System
- CURRENT_IRQL: 2
- LAST_CONTROL_TRANSFER: from fffff8004cc92316 to fffff8004cb7d4c0
- STACK_TEXT:
- fffff800`4edc6698 fffff800`4cc92316 : 00000000`00000019 00000000`0000000d ffffb08c`a0fd3e20 9abcecfa`570b79e7 : nt!KeBugCheckEx
- fffff800`4edc66a0 fffff800`4cc91801 : ffffb08c`a1030ca0 fffff800`4cd90bc0 fffff800`4edc67b9 ffffb08c`a1030e10 : nt!ExDeferredFreePool+0x22f6
- fffff800`4edc6720 fffff800`abd32fc3 : fffff800`abd3b200 ffffb08c`9d525000 00000000`00000000 ffff6758`00000000 : nt!ExFreePoolWithTag+0x7e1
- fffff800`4edc6820 fffff800`abd32df0 : ffffb08c`9d525000 ffffb08c`9d52bc38 00000000`00000000 fffff800`4edc68b9 : HDAudBus!HdaController::ProcessCodecResponses+0x193
- fffff800`4edc6870 fffff800`4ca83b6c : fffff800`4a083f80 00000000`00000001 fffff800`4a081180 00000000`00010001 : HDAudBus!HdaController::CodecDpc+0x70
- fffff800`4edc6920 fffff800`4ca83477 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x1dc
- fffff800`4edc6a60 fffff800`4cb8056a : 00000000`00000000 fffff800`4a081180 00000000`001a6fe0 fffff800`4ce0aa40 : nt!KiRetireDpcList+0xd7
- fffff800`4edc6c60 00000000`00000000 : fffff800`4edc7000 fffff800`4edc1000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
- STACK_COMMAND: kb
- THREAD_SHA1_HASH_MOD_FUNC: 555de23645b4003f21f317e43f30b63cd2b94d17
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bb57f068f5a2fc0e8568a4573334bcdd60b9561e
- THREAD_SHA1_HASH_MOD: c45ee725c8d5fb0d0409d0de11f98f0bac8ce545
- FOLLOWUP_IP:
- nt!ExDeferredFreePool+22f6
- fffff800`4cc92316 cc int 3
- FAULT_INSTR_CODE: cc
- SYMBOL_STACK_INDEX: 1
- SYMBOL_NAME: nt!ExDeferredFreePool+22f6
- FOLLOWUP_NAME: Pool_corruption
- IMAGE_NAME: Pool_Corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- IMAGE_VERSION: 10.0.15063.483
- MODULE_NAME: Pool_Corruption
- BUCKET_ID_FUNC_OFFSET: 22f6
- FAILURE_BUCKET_ID: 0x19_d_nt!ExDeferredFreePool
- BUCKET_ID: 0x19_d_nt!ExDeferredFreePool
- PRIMARY_PROBLEM_CLASS: 0x19_d_nt!ExDeferredFreePool
- TARGET_TIME: 2017-07-18T19:11:51.000Z
- OSBUILD: 15063
- OSSERVICEPACK: 483
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.15063.483
- ANALYSIS_SESSION_ELAPSED_TIME: 1b6b
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:0x19_d_nt!exdeferredfreepool
- FAILURE_ID_HASH: {c66288ca-3a17-2be7-a2de-d6492b261dd2}
- Followup: Pool_corruption
- =============================== Drivers ================================
- ffff98e2`00200000 ffff98e2`00593000 win32kfull (deferred)
- Image path: \SystemRoot\System32\win32kfull.sys
- Image name: win32kfull.sys
- Timestamp: unavailable (00000000)
- ffff98e2`005a0000 ffff98e2`007a6000 win32kbase (deferred)
- Image path: \SystemRoot\System32\win32kbase.sys
- Image name: win32kbase.sys
- Timestamp: unavailable (00000000)
- ffff98e2`007c0000 ffff98e2`007ca000 TSDDD (deferred)
- Image path: \SystemRoot\System32\TSDDD.dll
- Image name: TSDDD.dll
- Timestamp: unavailable (00000000)
- ffff98e2`007d0000 ffff98e2`00811000 cdd (deferred)
- Image path: \SystemRoot\System32\cdd.dll
- Image name: cdd.dll
- Timestamp: unavailable (00000000)
- ffff98e2`01010000 ffff98e2`01084000 win32k (deferred)
- Image path: \SystemRoot\System32\win32k.sys
- Image name: win32k.sys
- Timestamp: unavailable (00000000)
- fffff800`a5b70000 fffff800`a60e2000 iaStorA (deferred)
- Image path: \SystemRoot\System32\drivers\iaStorA.sys
- Image name: iaStorA.sys
- Timestamp: Wed Jun 3 05:38:57 2015 (556ECB31)
- fffff800`a7600000 fffff800`a76c6000 peauth (deferred)
- Image path: \SystemRoot\system32\drivers\peauth.sys
- Image name: peauth.sys
- Timestamp: Sat Dec 9 21:03:08 1989 (2581B95C)
- fffff800`a7c80000 fffff800`a81f2000 dump_iaStorA (deferred)
- Image path: \SystemRoot\System32\Drivers\dump_iaStorA.sys
- Image name: dump_iaStorA.sys
- Timestamp: Wed Jun 3 05:38:57 2015 (556ECB31)
- fffff800`a84a0000 fffff800`a84cf000 VBoxNetAdp6 (deferred)
- Image path: \SystemRoot\system32\DRIVERS\VBoxNetAdp6.sys
- Image name: VBoxNetAdp6.sys
- Timestamp: Fri Apr 28 11:36:57 2017 (59036199)
- fffff800`a8690000 fffff800`a869e000 MpKsld67884e7 (deferred)
- Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{6E96F768-7739-4142-B328-C678276DB02B}\MpKsld67884e7.sys
- Image name: MpKsld67884e7.sys
- Timestamp: Tue May 19 21:50:37 2015 (555BE86D)
- fffff800`a8700000 fffff800`a8706000 AsIO (deferred)
- Image path: \SystemRoot\SysWow64\drivers\AsIO.sys
- Image name: AsIO.sys
- Timestamp: Wed Aug 22 05:54:47 2012 (5034AC67)
- fffff800`a87b0000 fffff800`a8c2b000 RTKVHD64 (deferred)
- Image path: \SystemRoot\system32\drivers\RTKVHD64.sys
- Image name: RTKVHD64.sys
- Timestamp: Tue May 5 07:18:22 2015 (5548A6FE)
- fffff800`aa720000 fffff800`aa750000 TeeDriverW8x64 (deferred)
- Image path: \SystemRoot\System32\drivers\TeeDriverW8x64.sys
- Image name: TeeDriverW8x64.sys
- Timestamp: Tue Jul 7 13:43:32 2015 (559C0FC4)
- fffff800`aa750000 fffff800`aa7d4000 e1d62x64 (deferred)
- Image path: \SystemRoot\system32\DRIVERS\e1d62x64.sys
- Image name: e1d62x64.sys
- Timestamp: Sun Mar 19 10:37:16 2017 (58CE979C)
- fffff800`aa910000 fffff800`aa91e000 MpKsl026a38c9 (deferred)
- Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{AD3AF98A-5DD0-4D57-BBB9-DFD2C4126F2C}\MpKsl026a38c9.sys
- Image name: MpKsl026a38c9.sys
- Timestamp: Tue May 19 21:50:37 2015 (555BE86D)
- fffff800`aaa40000 fffff800`aaa75000 nvhda64v (deferred)
- Image path: \SystemRoot\system32\drivers\nvhda64v.sys
- Image name: nvhda64v.sys
- Timestamp: Wed Mar 15 08:48:41 2017 (58C93829)
- fffff800`aaf10000 fffff800`abd2d000 nvlddmkm (deferred)
- Image path: \SystemRoot\System32\DriverStore\FileRepository\nv_ref_pubwu.inf_amd64_f9309145156afb40\nvlddmkm.sys
- Image name: nvlddmkm.sys
- Timestamp: Mon May 1 15:55:53 2017 (590792C9)
- fffff800`abdc0000 fffff800`abde1000 drmk (deferred)
- Image path: \SystemRoot\System32\drivers\drmk.sys
- Image name: drmk.sys
- Timestamp: ***** Invalid (A01C1986)
- fffff800`abdf0000 fffff800`abdf7000 semav6msr64 (deferred)
- Image path: \??\C:\Windows\system32\drivers\semav6msr64.sys
- Image name: semav6msr64.sys
- Timestamp: Fri Jan 24 14:22:40 2014 (52E2BD80)
- Unloaded modules:
- fffff800`aae30000 fffff800`aae3b000 cldflt.sys
- Timestamp: unavailable (00000000)
- Checksum: 00000000
- ImageSize: 0000B000
- fffff800`a6de0000 fffff800`a6def000 dump_storpor
- Timestamp: unavailable (00000000)
- Checksum: 00000000
- ImageSize: 0000F000
- fffff800`a7600000 fffff800`a7b72000 dump_iaStorA
- Timestamp: unavailable (00000000)
- Checksum: 00000000
- ImageSize: 00572000
- fffff800`a7ba0000 fffff800`a7bbd000 dump_dumpfve
- Timestamp: unavailable (00000000)
- Checksum: 00000000
- ImageSize: 0001D000
- fffff800`aa8e0000 fffff800`aa91d000 WUDFRd.sys
- Timestamp: unavailable (00000000)
- Checksum: 00000000
- ImageSize: 0003D000
- fffff800`a86e0000 fffff800`a8700000 dam.sys
- Timestamp: unavailable (00000000)
- Checksum: 00000000
- ImageSize: 00020000
- fffff800`a5870000 fffff800`a587f000 WdBoot.sys
- Timestamp: unavailable (00000000)
- Checksum: 00000000
- ImageSize: 0000F000
- fffff800`a6b80000 fffff800`a6b8f000 hwpolicy.sys
- Timestamp: unavailable (00000000)
- Checksum: 00000000
- ImageSize: 0000F000
- ============================= BIOS INFO ================================
- [SMBIOS Data Tables v2.8]
- [DMI Version - 0]
- [2.0 Calling Convention - No]
- [Table Size - 3817 bytes]
- [BIOS Information (Type 0) - Length 24 - Handle 0000h]
- Vendor American Megatrends Inc.
- BIOS Version 2603
- BIOS Starting Address Segment f000
- BIOS Release Date 02/22/2016
- BIOS ROM Size 800000
- BIOS Characteristics
- 07: - PCI Supported
- 10: - APM Supported
- 11: - Upgradeable FLASH BIOS
- 12: - BIOS Shadowing Supported
- 15: - CD-Boot Supported
- 16: - Selectable Boot Supported
- 17: - BIOS ROM Socketed
- 19: - EDD Supported
- 23: - 1.2MB Floppy Supported
- 24: - 720KB Floppy Supported
- 25: - 2.88MB Floppy Supported
- 26: - Print Screen Device Supported
- 27: - Keyboard Services Supported
- 28: - Serial Services Supported
- 29: - Printer Services Supported
- 32: - BIOS Vendor Reserved
- BIOS Characteristic Extensions
- 00: - ACPI Supported
- 01: - USB Legacy Supported
- 08: - BIOS Boot Specification Supported
- 10: - Specification Reserved
- 11: - Specification Reserved
- BIOS Major Revision 4
- BIOS Minor Revision 6
- EC Firmware Major Revision 255
- EC Firmware Minor Revision 255
- [System Information (Type 1) - Length 27 - Handle 0001h]
- Manufacturer ASUS
- Product Name All Series
- Version System Version
- UUID 00000000-0000-0000-0000-000000000000
- Wakeup Type Power Switch
- SKUNumber All
- Family ASUS MB
- [BaseBoard Information (Type 2) - Length 15 - Handle 0002h]
- Manufacturer ASUSTeK COMPUTER INC.
- Product H97M-PLUS
- Version Rev X.0x
- Feature Flags 09h
- 1739792904: - ?ÿU?ì?ì¡H.Æg3Å?Eü3ÀW?}?Eô?Eø?ÿu
- ¸@
- 1739792944: - ?ÿU?ì?ì¡H.Æg3Å?Eü3ÀW?}?Eô?Eø?ÿu
- ¸@
- Chassis Handle 0003h
- Board Type 0ah - Processor/Memory Module
- Number of Child Handles 0
- [System Enclosure (Type 3) - Length 25 - Handle 0003h]
- Chassis Type Desktop
- Bootup State Safe
- Power Supply State Safe
- Thermal State Safe
- Security Status None
- OEM Defined 0
- Height 0U
- Number of Power Cords 1
- Number of Contained Elements 1
- Contained Element Size 3
- [Onboard Devices Information (Type 10) - Length 8 - Handle 0024h]
- Number of Devices 2
- 01: Type Video [enabled]
- 02: Type Ethernet [enabled]
- [OEM Strings (Type 11) - Length 5 - Handle 0025h]
- Number of Strings 4
- 3 Pink
- [System Configuration Options (Type 12) - Length 5 - Handle 0026h]
- [Physical Memory Array (Type 16) - Length 23 - Handle 0042h]
- Location 03h - SystemBoard/Motherboard
- Use 03h - System Memory
- Memory Error Correction 03h - None
- Maximum Capacity 33554432KB
- Number of Memory Devices 4
- [Memory Device (Type 17) - Length 40 - Handle 0043h]
- Physical Memory Array Handle 0042h
- Total Width 64 bits
- Data Width 64 bits
- Size 4096MB
- Form Factor 09h - DIMM
- Device Locator DIMM_A1
- Bank Locator BANK 0
- Memory Type 18h - Specification Reserved
- Type Detail 0080h - Synchronous
- Speed 1600MHz
- Manufacturer 1315
- [Memory Device (Type 17) - Length 40 - Handle 0044h]
- Physical Memory Array Handle 0042h
- Total Width 0 bits
- Data Width 0 bits
- Form Factor 09h - DIMM
- Device Locator DIMM_A2
- Bank Locator BANK 1
- Memory Type 02h - Unknown
- Type Detail 0000h -
- Speed 0MHz
- [Memory Device (Type 17) - Length 40 - Handle 0045h]
- Physical Memory Array Handle 0042h
- Total Width 64 bits
- Data Width 64 bits
- Size 4096MB
- Form Factor 09h - DIMM
- Device Locator DIMM_B1
- Bank Locator BANK 2
- Memory Type 18h - Specification Reserved
- Type Detail 0080h - Synchronous
- Speed 1600MHz
- Manufacturer 1315
- [Memory Device (Type 17) - Length 40 - Handle 0046h]
- Physical Memory Array Handle 0042h
- Total Width 0 bits
- Data Width 0 bits
- Form Factor 09h - DIMM
- Device Locator DIMM_B2
- Bank Locator BANK 3
- Memory Type 02h - Unknown
- Type Detail 0000h -
- Speed 0MHz
- [Memory Array Mapped Address (Type 19) - Length 31 - Handle 0047h]
- Starting Address 00000000h
- Ending Address 007fffffh
- Memory Array Handle 0042h
- Partition Width 04
- [Memory Device Mapped Address (Type 20) - Length 35 - Handle 0048h]
- Starting Address 00000000h
- Ending Address 003fffffh
- Memory Device Handle 0046h
- Mem Array Mapped Adr Handle 0047h
- Interleave Position 01
- Interleave Data Depth 02
- [Memory Device Mapped Address (Type 20) - Length 35 - Handle 0049h]
- Starting Address 00400000h
- Ending Address 007fffffh
- Memory Device Handle 0046h
- Mem Array Mapped Adr Handle 0047h
- Interleave Position 02
- Interleave Data Depth 02
- [Processor Information (Type 4) - Length 42 - Handle 004fh]
- Socket Designation SOCKET 1150
- Processor Type Central Processor
- Processor Family 01h - Other
- Processor Manufacturer Intel
- Processor ID c3060300fffbebbf
- Processor Version Intel(R) Core(TM) i7-4770S CPU @ 3.10GHz
- Processor Voltage 8ch - 1.2V
- External Clock 100MHz
- Max Speed 3900MHz
- Current Speed 3100MHz
- Status Enabled Populated
- Processor Upgrade Specification Reserved
- L1 Cache Handle 0050h
- L2 Cache Handle 0051h
- L3 Cache Handle 0052h
- [Cache Information (Type 7) - Length 19 - Handle 0050h]
- Socket Designation CPU Internal L1
- Cache Configuration 0180h - WB Enabled Int NonSocketed L1
- Maximum Cache Size 0100h - 256K
- Installed Size 0100h - 256K
- Supported SRAM Type 0020h - Synchronous
- Current SRAM Type 0020h - Synchronous
- Cache Speed 0ns
- Error Correction Type ParitySingle-Bit ECC
- System Cache Type Other
- Associativity 8-way Set-Associative
- [Cache Information (Type 7) - Length 19 - Handle 0051h]
- Socket Designation CPU Internal L2
- Cache Configuration 0181h - WB Enabled Int NonSocketed L2
- Maximum Cache Size 0400h - 1024K
- Installed Size 0400h - 1024K
- Supported SRAM Type 0020h - Synchronous
- Current SRAM Type 0020h - Synchronous
- Cache Speed 0ns
- Error Correction Type Multi-Bit ECC
- System Cache Type Unified
- Associativity 8-way Set-Associative
- [Cache Information (Type 7) - Length 19 - Handle 0052h]
- Socket Designation CPU Internal L3
- Cache Configuration 0182h - WB Enabled Int NonSocketed L3
- Maximum Cache Size 2000h - 8192K
- Installed Size 2000h - 8192K
- Supported SRAM Type 0020h - Synchronous
- Current SRAM Type 0020h - Synchronous
- Cache Speed 0ns
- Error Correction Type Specification Reserved
- System Cache Type Unified
- Associativity 16-way Set-Associative
- ========================================================================
- =================== Dump File: 071817-15953-01.dmp ===================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Kernel base = 0xfffff802`fa887000 PsLoadedModuleList = 0xfffff802`fabd35e0
- Debug session time: Tue Jul 18 14:14:05.704 2017 (UTC - 4:00)
- System Uptime: 0 days 0:10:29.337
- BugCheck 4E, {99, 11117e, 2, 600011000111179}
- Probably caused by : memory_corruption
- Followup: memory_corruption
- PFN_LIST_CORRUPT (4e)
- Typically caused by drivers passing bad memory descriptor lists (ie: calling
- MmUnlockPages twice with the same list, etc). If a kernel debugger is
- available get the stack trace.
- Arguments:
- Arg1: 0000000000000099, A PTE or PFN is corrupt
- Arg2: 000000000011117e, page frame number
- Arg3: 0000000000000002, current page state
- Arg4: 0600011000111179, 0
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
- SYSTEM_MANUFACTURER: ASUS
- SYSTEM_PRODUCT_NAME: All Series
- SYSTEM_SKU: All
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: 2603
- BIOS_DATE: 02/22/2016
- BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
- BASEBOARD_PRODUCT: H97M-PLUS
- BASEBOARD_VERSION: Rev X.0x
- DUMP_TYPE: 2
- BUGCHECK_STR: 0x4E_99
- CPU_COUNT: 8
- CPU_MHZ: c15
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 3c
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- PROCESS_NAME: MpCmdRun.exe
- CURRENT_IRQL: 2
- LAST_CONTROL_TRANSFER: from fffff802faa2ba2a to fffff802fa9f34c0
- STACK_TEXT:
- ffff8701`947e7fd8 fffff802`faa2ba2a : 00000000`0000004e 00000000`00000099 00000000`0011117e 00000000`00000002 : nt!KeBugCheckEx
- ffff8701`947e7fe0 fffff802`fa90bcc2 : ffffbe3f`fc71ffb8 ffffbe3f`fc71fb80 00000000`0000005b ffffbe3f`fc71eff8 : nt!MiDeletePteRun+0x10fcea
- ffff8701`947e8150 fffff802`fa9065bd : ffffbe8d`4383ed88 ffffbe8d`43c6e080 ffffbe8d`4383ed88 ffffbe8d`4383e7c0 : nt!MiDeleteVirtualAddresses+0x972
- ffff8701`947e8400 fffff802`fad13217 : ffffbe8d`43c6e080 ffffbe8d`424e2b70 ffffbe8d`424e2b70 ffffbe8d`43c6e080 : nt!MiDeleteVad+0x3ad
- ffff8701`947e8580 fffff802`fad136fe : 00000000`00000000 ffffbe8d`43cc6a40 ffffbe8d`424e2b70 ffffbe8d`4383e7c0 : nt!MiCleanVad+0x27
- ffff8701`947e85b0 fffff802`fad5154f : 00000000`00040000 00000000`00000000 ffffbe8d`4383e7c0 ffffbe8d`00000000 : nt!MmCleanProcessAddressSpace+0x13e
- ffff8701`947e8630 fffff802`facc18b1 : ffffbe8d`4383e7c0 ffffd606`4558ea20 ffff8701`947e8840 00000000`00000000 : nt!PspRundownSingleProcess+0x11f
- ffff8701`947e86b0 fffff802`fadc1313 : 00000000`000000ff ffffbe8d`43c6e001 00000055`7b09a000 ffff8701`947e8601 : nt!PspExitThread+0x57d
- ffff8701`947e87b0 fffff802`fa8bc5d3 : 00000055`00005590 ffffbe8d`42495000 00000000`00000000 ffff8701`947e8130 : nt!KiSchedulerApcTerminate+0x33
- ffff8701`947e87f0 fffff802`fa9f6b60 : 00000055`7af3dd80 ffffbe8d`00000010 ffffbe8d`4383e7c0 fffff802`00000000 : nt!KiDeliverApc+0x313
- ffff8701`947e8880 fffff802`fa9f3ee3 : 00000000`00000000 00000000`00000000 ffffbe8d`43c6e080 00000000`00000000 : nt!KiInitiateUserApc+0x70
- ffff8701`947e89c0 fffff802`fa9fe413 : ffffbe8d`43c6e080 00000000`ffffffff 00000000`00000000 ffffbe8d`c0000034 : nt!NtRaiseException+0x133
- ffff8701`947e8b00 00007ff8`e3fd5430 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
- 00000055`7af3dc08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`e3fd5430
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff802fa90bcef-fffff802fa90bcf0 2 bytes - nt!MiDeleteVirtualAddresses+99f
- [ 80 f6:00 be ]
- fffff802fa90f0ee-fffff802fa90f0ef 2 bytes - nt!MiGetNextPageTable+19e (+0x33ff)
- [ 80 f6:00 be ]
- fffff802fa90f121-fffff802fa90f122 2 bytes - nt!MiGetNextPageTable+1d1 (+0x33)
- [ 80 f6:00 be ]
- fffff802fa974874-fffff802fa974875 2 bytes - nt!MiIsLowestPageTablePage+30 (+0x65753)
- [ 80 f6:00 be ]
- fffff802fa974886-fffff802fa974887 2 bytes - nt!MiIsLowestPageTablePage+42 (+0x12)
- [ ff f6:7f be ]
- fffff802fa974902-fffff802fa974903 2 bytes - nt!MiComputePageCommitment+32 (+0x7c)
- [ 80 f6:00 be ]
- fffff802faa2ba67 - nt!MiDeletePteRun+10fd27 (+0xb7165)
- [ fa:e9 ]
- fffff802fab07383-fffff802fab07385 3 bytes - nt!ExFreePoolWithTag+363
- [ 40 fb f6:00 5f be ]
- 16 errors : !nt (fffff802fa90bcef-fffff802fab07385)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-07-18T18:14:05.000Z
- OSBUILD: 15063
- OSSERVICEPACK: 483
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.15063.483
- ANALYSIS_SESSION_ELAPSED_TIME: 38a7
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- ========================================================================
- =================== Dump File: 071817-15500-01.dmp ===================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Kernel base = 0xfffff803`2ec16000 PsLoadedModuleList = 0xfffff803`2ef625e0
- Debug session time: Tue Jul 18 14:02:41.988 2017 (UTC - 4:00)
- System Uptime: 0 days 4:22:26.747
- BugCheck 1A, {41792, fffff48000002ea8, 1000000, 0}
- Probably caused by : memory_corruption
- Followup: memory_corruption
- MEMORY_MANAGEMENT (1a)
- # Any other values for parameter 1 must be individually examined.
- Arguments:
- Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
- the PTE. Parameters 3/4 contain the low/high parts of the PTE.
- Arg2: fffff48000002ea8
- Arg3: 0000000001000000
- Arg4: 0000000000000000
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
- SYSTEM_MANUFACTURER: ASUS
- SYSTEM_PRODUCT_NAME: All Series
- SYSTEM_SKU: All
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: 2603
- BIOS_DATE: 02/22/2016
- BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
- BASEBOARD_PRODUCT: H97M-PLUS
- BASEBOARD_VERSION: Rev X.0x
- DUMP_TYPE: 2
- BUGCHECK_STR: 0x1a_41792
- CPU_COUNT: 8
- CPU_MHZ: c15
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 3c
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- PROCESS_NAME: esrv.exe
- CURRENT_IRQL: 2
- STACK_TEXT:
- ffffb800`d1b54428 fffff803`2edb5cb0 : 00000000`0000001a 00000000`00041792 fffff480`00002ea8 00000000`01000000 : nt!KeBugCheckEx
- ffffb800`d1b54430 fffff803`2ec955bd : ffffc886`a2100648 ffffc886`a0bf4500 ffffc886`a2100648 ffffc886`a2100080 : nt!MiDeleteVirtualAddresses+0x11b960
- ffffb800`d1b546e0 fffff803`2f0a2217 : ffffc886`a0bf4500 ffffc886`a1fbfd60 ffffc886`a1fbfd60 ffffc886`a0bf4500 : nt!MiDeleteVad+0x3ad
- ffffb800`d1b54860 fffff803`2f0a26fe : 00000000`00000000 ffffc886`a272b930 ffffc886`a1fbfd60 ffffc886`a2100080 : nt!MiCleanVad+0x27
- ffffb800`d1b54890 fffff803`2f0e054f : 00000000`00040000 00000000`00000000 ffffc886`a2100080 ffffc886`00000000 : nt!MmCleanProcessAddressSpace+0x13e
- ffffb800`d1b54910 fffff803`2f0508b1 : ffffc886`a2100080 ffffda08`aaec1060 ffffc886`a2100080 00000000`00000000 : nt!PspRundownSingleProcess+0x11f
- ffffb800`d1b54990 fffff803`2f110f89 : 00000000`00000001 ffffc886`a2100001 00000000`0025c000 ffffc886`a0bf4500 : nt!PspExitThread+0x57d
- ffffb800`d1b54a90 fffff803`2ed8d413 : ffffc886`a2100080 ffffc886`a0bf4500 ffffb800`d1b54b80 00000000`02341620 : nt!NtTerminateProcess+0xe9
- ffffb800`d1b54b00 00007ffe`b8e95924 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
- 00000000`04611898 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`b8e95924
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff8032ec9e0ef - nt!MiGetNextPageTable+19f
- [ f6:f4 ]
- fffff8032ec9e122 - nt!MiGetNextPageTable+1d2 (+0x33)
- [ f6:f4 ]
- 2 errors : !nt (fffff8032ec9e0ef-fffff8032ec9e122)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: ONE_BIT_LARGE
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_ONE_BIT_LARGE
- TARGET_TIME: 2017-07-18T18:02:41.000Z
- OSBUILD: 15063
- OSSERVICEPACK: 483
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.15063.483
- ANALYSIS_SESSION_ELAPSED_TIME: 2a82
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_one_bit_large
- FAILURE_ID_HASH: {31545515-196b-fab5-2300-9ce714226f43}
- Followup: memory_corruption
- ========================================================================
- =================== Dump File: 071817-14421-01.dmp ===================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Kernel base = 0xfffff801`d7697000 PsLoadedModuleList = 0xfffff801`d79e35e0
- Debug session time: Tue Jul 18 09:27:22.585 2017 (UTC - 4:00)
- System Uptime: 0 days 8:06:22.217
- BugCheck 12B, {ffffffffc00002c4, c5d, 179a220, ffffad80ba255000}
- *** WARNING: Unable to verify timestamp for win32k.sys
- *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
- Probably caused by : memory_corruption
- Followup: memory_corruption
- FAULTY_HARDWARE_CORRUPTED_PAGE (12b)
- This bugcheck indicates that a single bit error was found in this page. This is a hardware memory error.
- Arguments:
- Arg1: ffffffffc00002c4, virtual address mapping the corrupted page
- Arg2: 0000000000000c5d, physical page number
- Arg3: 000000000179a220, zero
- Arg4: ffffad80ba255000, zero
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
- SYSTEM_MANUFACTURER: ASUS
- SYSTEM_PRODUCT_NAME: All Series
- SYSTEM_SKU: All
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: 2603
- BIOS_DATE: 02/22/2016
- BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
- BASEBOARD_PRODUCT: H97M-PLUS
- BASEBOARD_VERSION: Rev X.0x
- DUMP_TYPE: 2
- BUGCHECK_STR: 0x12B_c00002c4_StCtDecompressFailed
- CPU_COUNT: 8
- CPU_MHZ: c15
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 3c
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- PROCESS_NAME: MemCompression
- CURRENT_IRQL: 0
- LAST_CONTROL_TRANSFER: from fffff801d78dfb87 to fffff801d78034c0
- STACK_TEXT:
- ffffad80`b784d208 fffff801`d78dfb87 : 00000000`0000012b ffffffff`c00002c4 00000000`00000c5d 00000000`0179a220 : nt!KeBugCheckEx
- ffffad80`b784d210 fffff801`d784e79d : 00000000`00000200 00000000`00000003 00000000`0179a220 ffffad80`ba255000 : nt!ST_STORE<SM_TRAITS>::StDmPageError+0x117
- ffffad80`b784d260 fffff801`d777084f : 00000000`00000000 ffffad80`b784d478 00000000`00000000 00000000`00000086 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0xddf19
- ffffad80`b784d340 fffff801`d777023b : 00000000`00000001 00000000`0000a220 ffffad80`0000a220 00000000`00001000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0x7b
- ffffad80`b784d390 fffff801`d777000c : ffffad80`ffffffff ffff878a`0d935000 ffffad80`b784d478 ffff8789`ff733c10 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x183
- ffffad80`b784d430 fffff801`d7771c7f : ffff8789`ff733c10 fffff801`00000000 00000000`00000001 ffff8789`ff733c10 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0x98
- ffffad80`b784d4f0 fffff801`d77c0f81 : ffff878a`0b792000 ffffad80`b784d600 fffff801`d77c0f60 ffffad80`b784d600 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x6f
- ffffad80`b784d540 fffff801`d76ad20b : ffff878a`0a623080 ffffad80`b784d600 00000000`00000002 fffff801`d77686d0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21
- ffffad80`b784d570 fffff801`d7768625 : 00000000`00000003 ffff878a`0d935000 ffff878a`0b792000 ffff8789`ff733c10 : nt!KeExpandKernelStackAndCalloutInternal+0x8b
- ffffad80`b784d5c0 fffff801`d775ecc2 : ffffad80`b784d6c0 fffff801`d7a8da00 00000000`00000000 fffff801`d7772dc0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xad
- ffffad80`b784d690 fffff801`d775e522 : 00000000`00000000 00000000`00000000 ffffad80`b784d740 ffff8789`ff733c10 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x1ae
- ffffad80`b784d6e0 fffff801`d7772afa : 00000000`0000000c 00000000`00000001 ffff8789`ff733c10 ffff878a`09e84060 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0xce
- ffffad80`b784d760 fffff801`d77af6ea : ffff878a`00000001 ffff878a`09e84110 ffff878a`00000000 ffff878a`0b792000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x16a
- ffffad80`b784d7d0 fffff801`d7738fa9 : ffff878a`0a623080 ffff878a`09e84010 00000000`00000000 00000000`00000002 : nt!SmPageRead+0x2e
- ffffad80`b784d820 fffff801`d7738970 : 00000000`00000002 ffffad80`b784d8b0 00000000`00000000 ffff878a`09e84010 : nt!MiIssueHardFaultIo+0x11d
- ffffad80`b784d870 fffff801`d7724486 : 00000000`c0033333 ffffad80`b784db00 00000000`00000000 ffffad80`00000000 : nt!MiIssueHardFault+0x190
- ffffad80`b784d910 fffff801`d780cd72 : ffff878a`0a623080 00000060`00000000 00000000`00000000 00000060`a31fc9c0 : nt!MmAccessFault+0xc96
- ffffad80`b784db00 00007ffb`21802246 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x132
- 00000060`a31fc280 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`21802246
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff801d76d5698 - nt!MiGetWsleProtection+18
- [ f6:bf ]
- fffff801d76d56e8 - nt!MiGetWsleContents+18 (+0x50)
- [ f6:bf ]
- fffff801d772454d - nt!MmAccessFault+d5d (+0x4ee65)
- [ f6:bf ]
- fffff801d7738a13 - nt!MiIssueHardFault+233 (+0x144c6)
- [ f6:bf ]
- 4 errors : !nt (fffff801d76d5698-fffff801d7738a13)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-07-18T13:27:22.000Z
- OSBUILD: 15063
- OSSERVICEPACK: 483
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.15063.483
- ANALYSIS_SESSION_ELAPSED_TIME: 2a82
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- ========================================================================
- =================== Dump File: 072017-15578-01.dmp ===================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Kernel base = 0xfffff800`b5c15000 PsLoadedModuleList = 0xfffff800`b5f615e0
- Debug session time: Thu Jul 20 02:16:30.185 2017 (UTC - 4:00)
- System Uptime: 0 days 0:11:18.817
- BugCheck 1A, {41793, ffffe400db965e28, 9, 8}
- Probably caused by : memory_corruption
- Followup: memory_corruption
- MEMORY_MANAGEMENT (1a)
- # Any other values for parameter 1 must be individually examined.
- Arguments:
- Arg1: 0000000000041793, The subtype of the bugcheck.
- Arg2: ffffe400db965e28
- Arg3: 0000000000000009
- Arg4: 0000000000000008
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
- SYSTEM_MANUFACTURER: ASUS
- SYSTEM_PRODUCT_NAME: All Series
- SYSTEM_SKU: All
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: 2603
- BIOS_DATE: 02/22/2016
- BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
- BASEBOARD_PRODUCT: H97M-PLUS
- BASEBOARD_VERSION: Rev X.0x
- DUMP_TYPE: 2
- BUGCHECK_STR: 0x1a_41793
- CPU_COUNT: 8
- CPU_MHZ: c15
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 3c
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- PROCESS_NAME: MsMpEng.exe
- CURRENT_IRQL: 2
- LAST_CONTROL_TRANSFER: from fffff800b5db4cd0 to fffff800b5d814c0
- STACK_TEXT:
- ffffe680`99a845a8 fffff800`b5db4cd0 : 00000000`0000001a 00000000`00041793 ffffe400`db965e28 00000000`00000009 : nt!KeBugCheckEx
- ffffe680`99a845b0 fffff800`b5c945bd : ffff8e00`890cdb48 ffff8e00`7c98f080 ffff8e00`890cdb48 ffff8e00`890cd580 : nt!MiDeleteVirtualAddresses+0x11b980
- ffffe680`99a84860 fffff800`b60c989c : 000001b7`2c8d0000 ffff8e00`883d6240 ffffffff`ffffffff 00000000`00000000 : nt!MiDeleteVad+0x3ad
- ffffe680`99a849e0 fffff800`b613f9c6 : ffff8e00`890cd580 ffffe680`00000008 ffff8e00`7c423d40 000001b7`2c8d0000 : nt!MiUnmapViewOfSection+0xec
- ffffe680`99a84ab0 fffff800`b5d8c413 : ffff8e00`7c98f080 00000000`ffffffff 00000000`00000000 ffff8e00`890cd580 : nt!NtUnmapViewOfSectionEx+0x86
- ffffe680`99a84b00 00007ffb`6c0d8b54 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
- 0000006e`bfaff1f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`6c0d8b54
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff800b5c55051-fffff800b5c55052 2 bytes - nt!MiIsAddressValid+c1
- [ ff f6:7f e4 ]
- fffff800b5c550e3-fffff800b5c550e4 2 bytes - nt!MmUnmapLockedPages+73 (+0x92)
- [ 80 f6:00 e4 ]
- fffff800b5c5f0f6-fffff800b5c5f0f7 2 bytes - nt!MiCreateDecayPfn+56 (+0xa013)
- [ 80 fa:00 b6 ]
- fffff800b5caa816-fffff800b5caa817 2 bytes - nt!MiPfnShareCountIsZero+186 (+0x4b720)
- [ 80 f6:00 e4 ]
- fffff800b5cacfd2-fffff800b5cacfd3 2 bytes - nt!MiDeletePteList+592 (+0x27bc)
- [ 80 fa:00 b6 ]
- 10 errors : !nt (fffff800b5c55051-fffff800b5cacfd3)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-07-20T06:16:30.000Z
- OSBUILD: 15063
- OSSERVICEPACK: 483
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.15063.483
- ANALYSIS_SESSION_ELAPSED_TIME: 2a9d
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- ========================================================================
- =================== Dump File: 072017-14953-01.dmp ===================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Kernel base = 0xfffff800`8fa16000 PsLoadedModuleList = 0xfffff800`8fd625e0
- Debug session time: Thu Jul 20 16:17:06.990 2017 (UTC - 4:00)
- System Uptime: 0 days 0:47:01.622
- BugCheck 1A, {41792, fffff6805d1fee28, 1000000, 0}
- Probably caused by : memory_corruption
- Followup: memory_corruption
- MEMORY_MANAGEMENT (1a)
- # Any other values for parameter 1 must be individually examined.
- Arguments:
- Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
- the PTE. Parameters 3/4 contain the low/high parts of the PTE.
- Arg2: fffff6805d1fee28
- Arg3: 0000000001000000
- Arg4: 0000000000000000
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
- SYSTEM_MANUFACTURER: ASUS
- SYSTEM_PRODUCT_NAME: All Series
- SYSTEM_SKU: All
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: 2603
- BIOS_DATE: 02/22/2016
- BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
- BASEBOARD_PRODUCT: H97M-PLUS
- BASEBOARD_VERSION: Rev X.0x
- DUMP_TYPE: 2
- MEMORY_CORRUPTOR: LARGE
- BUGCHECK_STR: 0x1a_41792
- CPU_COUNT: 8
- CPU_MHZ: c15
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 3c
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- PROCESS_NAME: browser_broker.exe
- CURRENT_IRQL: 2
- STACK_TEXT:
- ffffb301`6eb7f248 fffff800`8fbb5cb0 : 00000000`0000001a 00000000`00041792 fffff680`5d1fee28 00000000`01000000 : nt!KeBugCheckEx
- ffffb301`6eb7f250 fffff800`8fa955bd : ffff9b01`01727d88 ffff9b01`017287c0 ffff9b01`01727d88 ffff9b01`017277c0 : nt!MiDeleteVirtualAddresses+0x11b960
- ffffb301`6eb7f500 fffff800`8fea26fe : 00000000`00000000 ffff9b01`005fe2e0 ffff9b01`017d68b0 ffff9b01`017287c0 : nt!MiDeleteVad+0x3ad
- ffffb301`6eb7f680 fffff800`8fee054f : 00000000`00040000 00000000`00000000 ffff9b01`017277c0 ffff9b01`00000000 : nt!MmCleanProcessAddressSpace+0x13e
- ffffb301`6eb7f700 fffff800`8fe508b1 : ffff9b01`017277c0 ffff8509`e4ca38a0 ffffb301`6eb7f910 00000000`00000000 : nt!PspRundownSingleProcess+0x11f
- ffffb301`6eb7f780 fffff800`8ff50313 : 00000000`80004005 ffff9b01`01732001 000000ba`3f85e000 ffffb301`00000010 : nt!PspExitThread+0x57d
- ffffb301`6eb7f880 fffff800`8fa4b5d3 : 000000ba`3f7af4d8 000002a8`31c557c0 00000000`e0ffff00 00000001`6eb7f970 : nt!KiSchedulerApcTerminate+0x33
- ffffb301`6eb7f8c0 fffff800`8fb85b60 : 000002a8`31c55b40 000002a8`31c557c0 00000000`00000650 ffff9b01`00000000 : nt!KiDeliverApc+0x313
- ffffb301`6eb7f950 fffff800`8fb8d4ba : 00000000`00000000 ffffb301`6eb7fb80 00000000`00000000 fffff800`8fec622f : nt!KiInitiateUserApc+0x70
- ffffb301`6eb7fa90 00007ff9`c3878c34 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
- 000000ba`3f7af478 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`c3878c34
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff8008faa70d8-fffff8008faa70d9 2 bytes - nt!MiResolvePrivateZeroFault+2d8
- [ 80 fa:00 95 ]
- 2 errors : !nt (fffff8008faa70d8-fffff8008faa70d9)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-07-20T20:17:06.000Z
- OSBUILD: 15063
- OSSERVICEPACK: 483
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.15063.483
- ANALYSIS_SESSION_ELAPSED_TIME: 2ad7
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- ========================================================================
- =================== Dump File: 072017-14750-01.dmp ===================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Kernel base = 0xfffff802`ca212000 PsLoadedModuleList = 0xfffff802`ca55e5e0
- Debug session time: Thu Jul 20 15:29:11.125 2017 (UTC - 4:00)
- System Uptime: 0 days 13:11:43.883
- BugCheck F7, {1c8187c5a030, 2fb6679bbf70, ffffd0499864408f, 0}
- Probably caused by : memory_corruption
- Followup: memory_corruption
- DRIVER_OVERRAN_STACK_BUFFER (f7)
- A driver has overrun a stack-based buffer. This overrun could potentially
- allow a malicious user to gain control of this machine.
- DESCRIPTION
- A driver overran a stack-based buffer (or local variable) in a way that would
- have overwritten the function's return address and jumped back to an arbitrary
- address when the function returned. This is the classic "buffer overrun"
- hacking attack and the system has been brought down to prevent a malicious user
- from gaining complete control of it.
- Do a kb to get a stack backtrace -- the last routine on the stack before the
- buffer overrun handlers and bugcheck call is the one that overran its local
- variable(s).
- Arguments:
- Arg1: 00001c8187c5a030, Actual security check cookie from the stack
- Arg2: 00002fb6679bbf70, Expected security check cookie
- Arg3: ffffd0499864408f, Complement of the expected security check cookie
- Arg4: 0000000000000000, zero
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
- SYSTEM_MANUFACTURER: ASUS
- SYSTEM_PRODUCT_NAME: All Series
- SYSTEM_SKU: All
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: 2603
- BIOS_DATE: 02/22/2016
- BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
- BASEBOARD_PRODUCT: H97M-PLUS
- BASEBOARD_VERSION: Rev X.0x
- DUMP_TYPE: 2
- SECURITY_COOKIE: Expected 00002fb6679bbf70 found 00001c8187c5a030
- CPU_COUNT: 8
- CPU_MHZ: c15
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 3c
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- BUGCHECK_STR: 0xF7
- PROCESS_NAME: svchost.exe
- CURRENT_IRQL: 2
- LAST_CONTROL_TRANSFER: from fffff802ca3ec905 to fffff802ca37e4c0
- STACK_TEXT:
- ffff9181`87c5ef88 fffff802`ca3ec905 : 00000000`000000f7 00001c81`87c5a030 00002fb6`679bbf70 ffffd049`9864408f : nt!KeBugCheckEx
- ffff9181`87c5ef90 fffff802`ca27b180 : ffffdc0b`2d50b000 ffff9181`87c5f010 00000000`00000000 fffff6fc`00000000 : nt!_report_gsfailure+0x25
- ffff9181`87c5efd0 fffff802`ca27b02e : 00000000`00000100 ffffdc0b`2d50c8c0 00000000`00000000 ffff9181`87c5f198 : nt!MiIdentifyPfn+0x100
- ffff9181`87c5f0a0 fffff802`ca6bfdda : 00000000`00000000 ffffdc0b`2d50b0f0 ffffdc0b`2d50b000 00000000`00000000 : nt!MiIdentifyPfnWrapper+0x3e
- ffff9181`87c5f0d0 fffff802`ca6bf8ef : ffffa30c`ecda0060 00000000`00000001 ffff9181`87c5f2b4 ffffdc0b`2d50b000 : nt!PfpPfnPrioRequest+0xca
- ffff9181`87c5f150 fffff802`ca6bdb4e : 00000000`0000004f 00000000`42506650 0000005e`7ad7a008 00000000`00000200 : nt!PfQuerySuperfetchInformation+0x2bf
- ffff9181`87c5f280 fffff802`ca6bd7fb : 00000000`00000000 00000000`00000000 00000000`00000008 0000005e`7ad7d260 : nt!ExpQuerySystemInformation+0x22e
- ffff9181`87c5fac0 fffff802`ca389413 : ffffdc0b`2998e7c0 00000000`00000000 00000000`00000000 00007ffe`744c4d50 : nt!NtQuerySystemInformation+0x2b
- ffff9181`87c5fb00 00007ffe`87765a64 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
- 0000005e`7ad79f08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`87765a64
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff802ca27b0b9-fffff802ca27b0ba 2 bytes - nt!MiIdentifyPfn+39
- [ 80 fa:00 8d ]
- fffff802ca2b7f4a-fffff802ca2b7f4b 2 bytes - nt!MmSetPfnListPriorities+13a (+0x3ce91)
- [ 80 fa:00 8d ]
- fffff802ca6bfde7-fffff802ca6bfde8 2 bytes - nt!PfpPfnPrioRequest+d7
- [ 80 fa:00 8d ]
- 6 errors : !nt (fffff802ca27b0b9-fffff802ca6bfde8)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-07-20T19:29:11.000Z
- OSBUILD: 15063
- OSSERVICEPACK: 483
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.15063.483
- ANALYSIS_SESSION_ELAPSED_TIME: 3cd1
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- ========================================================================
- =================== Dump File: 072017-14453-01.dmp ===================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Kernel base = 0xfffff800`1e601000 PsLoadedModuleList = 0xfffff800`1e94d5e0
- Debug session time: Thu Jul 20 16:28:26.554 2017 (UTC - 4:00)
- System Uptime: 0 days 0:10:25.312
- BugCheck 139, {3, ffffb68180c955d0, ffffb68180c95528, 0}
- *** WARNING: Unable to verify timestamp for win32k.sys
- *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
- Probably caused by : memory_corruption
- Followup: memory_corruption
- KERNEL_SECURITY_CHECK_FAILURE (139)
- A kernel component has corrupted a critical data structure. The corruption
- could potentially allow a malicious user to gain control of this machine.
- Arguments:
- Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
- Arg2: ffffb68180c955d0, Address of the trap frame for the exception that caused the bugcheck
- Arg3: ffffb68180c95528, Address of the exception record for the exception that caused the bugcheck
- Arg4: 0000000000000000, Reserved
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
- SYSTEM_MANUFACTURER: ASUS
- SYSTEM_PRODUCT_NAME: All Series
- SYSTEM_SKU: All
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: 2603
- BIOS_DATE: 02/22/2016
- BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
- BASEBOARD_PRODUCT: H97M-PLUS
- BASEBOARD_VERSION: Rev X.0x
- DUMP_TYPE: 2
- TRAP_FRAME: ffffb68180c955d0 -- (.trap 0xffffb68180c955d0)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=ffffdd031c9d0ea0 rbx=0000000000000000 rcx=0000000000000003
- rdx=ffffdd031f87eac0 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff8001e8822ed rsp=ffffb68180c95760 rbp=0000000000000000
- r8=ffffdd031c9d0d30 r9=ffffdd031d9d0bd0 r10=0000000000000001
- r11=ffffdd031c8fb950 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei ng nz na pe cy
- nt!ExDeferredFreePool+0x22cd:
- fffff800`1e8822ed cd29 int 29h
- Resetting default scope
- EXCEPTION_RECORD: ffffb68180c95528 -- (.exr 0xffffb68180c95528)
- ExceptionAddress: fffff8001e8822ed (nt!ExDeferredFreePool+0x00000000000022cd)
- ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
- ExceptionFlags: 00000001
- NumberParameters: 1
- Parameter[0]: 0000000000000003
- Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
- CPU_COUNT: 8
- CPU_MHZ: c15
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 3c
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- BUGCHECK_STR: 0x139
- PROCESS_NAME: System
- CURRENT_IRQL: 1
- ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
- EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
- EXCEPTION_CODE_STR: c0000409
- EXCEPTION_PARAMETER1: 0000000000000003
- LAST_CONTROL_TRANSFER: from fffff8001e7788a9 to fffff8001e76d4c0
- STACK_TEXT:
- ffffb681`80c952a8 fffff800`1e7788a9 : 00000000`00000139 00000000`00000003 ffffb681`80c955d0 ffffb681`80c95528 : nt!KeBugCheckEx
- ffffb681`80c952b0 fffff800`1e778c10 : 00000000`c0000225 fffff809`db237b09 00000000`00000001 ffffb681`80c95808 : nt!KiBugCheckDispatch+0x69
- ffffb681`80c953f0 fffff800`1e777bf7 : 00000000`00000000 fffff809`dc22dd7b ffffcc07`5f9bd940 ffffcc07`5f9bd940 : nt!KiFastFailDispatch+0xd0
- ffffb681`80c955d0 fffff800`1e8822ed : ffffcc07`51a413c0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0xf7
- ffffb681`80c95760 fffff800`1e881801 : ffffdd03`201345d0 ffffcc07`51a413c0 ffffb681`80c95879 ffffdd03`1fdc33a0 : nt!ExDeferredFreePool+0x22cd
- ffffb681`80c957e0 fffff800`1eada99c : 00000000`00000000 ffffcc07`5f8b3a70 ffffcc07`5f8b3a70 ffffcc07`00000001 : nt!ExFreePoolWithTag+0x7e1
- ffffb681`80c958e0 fffff800`1e72ab80 : ffffcc07`5f8b3a70 ffffb681`80c959b0 fffff800`1e97e640 ffffb681`7fe00180 : nt!MiSegmentDelete+0x10c
- ffffb681`80c95930 fffff800`1e74ef8c : 00000000`00000002 fffff800`1e97e658 fffff800`1e97e100 fffff800`1e97e100 : nt!MiProcessDereferenceList+0xb0
- ffffb681`80c959e0 fffff800`1e6ddac7 : ffffb681`7fe00180 ffffcc07`5f88e7c0 00000000`00000080 fffff800`1e74ee70 : nt!MiDereferenceSegmentThread+0x11c
- ffffb681`80c95c10 fffff800`1e772946 : ffffb681`7fe00180 ffffcc07`5f88e7c0 fffff800`1e6dda80 fffff800`1e6c7f14 : nt!PspSystemThreadStartup+0x47
- ffffb681`80c95c60 00000000`00000000 : ffffb681`80c96000 ffffb681`80c90000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff8001e719b19-fffff8001e719b1a 2 bytes - nt!MiUnlockPagedAddress+21
- [ 80 f6:00 97 ]
- fffff8001e719b41 - nt!MiUnlockPagedAddress+49 (+0x28)
- [ fa:91 ]
- 3 errors : !nt (fffff8001e719b19-fffff8001e719b41)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-07-20T20:28:26.000Z
- OSBUILD: 15063
- OSSERVICEPACK: 483
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.15063.483
- ANALYSIS_SESSION_ELAPSED_TIME: 2aae
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- ========================================================================
- =================== Dump File: 071917-16546-01.dmp ===================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Kernel base = 0xfffff801`87a7e000 PsLoadedModuleList = 0xfffff801`87dca5e0
- Debug session time: Wed Jul 19 17:40:46.556 2017 (UTC - 4:00)
- System Uptime: 0 days 0:20:19.189
- BugCheck 50, {fffff4fa40000040, 0, 0, 6}
- Could not read faulting driver name
- *** WARNING: Unable to verify timestamp for win32k.sys
- *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
- Probably caused by : memory_corruption
- Followup: memory_corruption
- PAGE_FAULT_IN_NONPAGED_AREA (50)
- Invalid system memory was referenced. This cannot be protected by try-except.
- Typically the address is just plain bad or it is pointing at freed memory.
- Arguments:
- Arg1: fffff4fa40000040, memory referenced.
- Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
- Arg3: 0000000000000000, If non-zero, the instruction address which referenced the bad memory
- address.
- Arg4: 0000000000000006, (reserved)
- Debugging Details:
- Could not read faulting driver name
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
- SYSTEM_MANUFACTURER: ASUS
- SYSTEM_PRODUCT_NAME: All Series
- SYSTEM_SKU: All
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: 2603
- BIOS_DATE: 02/22/2016
- BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
- BASEBOARD_PRODUCT: H97M-PLUS
- BASEBOARD_VERSION: Rev X.0x
- DUMP_TYPE: 2
- READ_ADDRESS: fffff80187e5f358: Unable to get MiVisibleState
- fffff4fa40000040
- MM_INTERNAL_CODE: 6
- CPU_COUNT: 8
- CPU_MHZ: c15
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 3c
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- BUGCHECK_STR: AV
- PROCESS_NAME: System
- CURRENT_IRQL: 2
- TRAP_FRAME: ffff9b8009fe4700 -- (.trap 0xffff9b8009fe4700)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=0000000000000040 rbx=0000000000000000 rcx=fffff4fa40000000
- rdx=ffff9b8009fe4980 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff80187ae7d08 rsp=ffff9b8009fe4890 rbp=ffff9b8009fe49d9
- r8=0000000000000000 r9=0000000000000000 r10=7ffffffffffffffc
- r11=ffffd8805f976ad0 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl nz na pe nc
- nt!ExFreeLargePool+0x68:
- fffff801`87ae7d08 488b0408 mov rax,qword ptr [rax+rcx] ds:fffff4fa`40000040=????????????????
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff80187c203f2 to fffff80187bea4c0
- STACK_TEXT:
- ffff9b80`09fe4508 fffff801`87c203f2 : 00000000`00000050 fffff4fa`40000040 00000000`00000000 fffff4fa`7d200000 : nt!KeBugCheckEx
- ffff9b80`09fe4510 fffff801`87bf3d72 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x115c02
- ffff9b80`09fe4700 fffff801`87ae7d08 : ffff9b80`09fe4990 fffff801`87a04ef5 00000000`00000000 ffffae89`998c9001 : nt!KiPageFault+0x132
- ffff9b80`09fe4890 fffff801`87cfe4ef : 00000000`01000000 ffff9b80`09fe4980 00000000`00000000 fffff801`00000000 : nt!ExFreeLargePool+0x68
- ffff9b80`09fe4940 fffff801`8805d37f : 00000000`00000003 00000000`00000000 00000000`00000000 00000000`00080000 : nt!ExFreePoolWithTag+0x4cf
- ffff9b80`09fe4a40 fffff801`87ec077b : ffff9b80`09fe4b28 00000000`00000000 ffffd880`56d72de8 ffff9b80`09fe4b28 : nt!CmpFreeKeyControlBlock+0x19e4ef
- ffff9b80`09fe4a80 fffff801`87edec7d : ffff9b80`09fe4b30 ffff9b80`09fe4b3c 00000000`00000003 00000000`00000000 : nt!CmpUnlockKcb+0x6b
- ffff9b80`09fe4ab0 fffff801`87abbca8 : ffffae89`8ec0a7c0 fffff801`87edea70 fffff801`87de6000 ffffae89`8f4a7750 : nt!CmpDelayCloseWorker+0x20d
- ffff9b80`09fe4b80 fffff801`87b5aac7 : 0030005f`0043004e 00000000`00000080 ffffae89`8e8b9680 ffffae89`8ec0a7c0 : nt!ExpWorkerThread+0xd8
- ffff9b80`09fe4c10 fffff801`87bef946 : ffff9b80`093e0180 ffffae89`8ec0a7c0 fffff801`87b5aa80 00660061`00660036 : nt!PspSystemThreadStartup+0x47
- ffff9b80`09fe4c60 00000000`00000000 : ffff9b80`09fe5000 ffff9b80`09fdf000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff80187cfe384-fffff80187cfe385 2 bytes - nt!ExFreePoolWithTag+364
- [ fb f6:fa f4 ]
- 2 errors : !nt (fffff80187cfe384-fffff80187cfe385)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: ONE_BIT_LARGE
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_ONE_BIT_LARGE
- TARGET_TIME: 2017-07-19T21:40:46.000Z
- OSBUILD: 15063
- OSSERVICEPACK: 483
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.15063.483
- ANALYSIS_SESSION_ELAPSED_TIME: 398c
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_one_bit_large
- FAILURE_ID_HASH: {31545515-196b-fab5-2300-9ce714226f43}
- Followup: memory_corruption
- ========================================================================
- =================== Dump File: 071817-17531-01.dmp ===================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Kernel base = 0xfffff802`23685000 PsLoadedModuleList = 0xfffff802`239d15e0
- Debug session time: Tue Jul 18 09:39:23.117 2017 (UTC - 4:00)
- System Uptime: 0 days 0:11:07.881
- BugCheck 19, {22, ffff80017121a000, 1, 0}
- Probably caused by : CI.dll ( CI!MincryptFreePolicyInfo+26 )
- Followup: MachineOwner
- BAD_POOL_HEADER (19)
- The pool is already corrupt at the time of the current request.
- This may or may not be due to the caller.
- The internal pool links must be walked to figure out a possible cause of
- the problem, and then special pool applied to the suspect tags or the driver
- verifier to a suspect driver.
- Arguments:
- Arg1: 0000000000000022,
- Arg2: ffff80017121a000
- Arg3: 0000000000000001
- Arg4: 0000000000000000
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
- SYSTEM_MANUFACTURER: ASUS
- SYSTEM_PRODUCT_NAME: All Series
- SYSTEM_SKU: All
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: 2603
- BIOS_DATE: 02/22/2016
- BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
- BASEBOARD_PRODUCT: H97M-PLUS
- BASEBOARD_VERSION: Rev X.0x
- DUMP_TYPE: 2
- BUGCHECK_STR: 0x19_22
- POOL_ADDRESS: fffff80223a66358: Unable to get MiVisibleState
- ffff80017121a000
- CPU_COUNT: 8
- CPU_MHZ: c15
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 3c
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- PROCESS_NAME: System
- CURRENT_IRQL: 2
- LAST_CONTROL_TRANSFER: from fffff8022381d75c to fffff802237f14c0
- STACK_TEXT:
- ffffc381`9e9658e8 fffff802`2381d75c : 00000000`00000019 00000000`00000022 ffff8001`7121a000 00000000`00000001 : nt!KeBugCheckEx
- ffffc381`9e9658f0 fffff802`239054ef : ffff8001`7121a000 ffffc381`9e9659e0 00000000`00000000 00000000`00000001 : nt!ExFreeLargePool+0x12eabc
- ffffc381`9e9659a0 fffff80d`efa7fa4e : ffff8001`702aad58 fffff802`237064ed 00000000`00000003 ffff8001`6e569898 : nt!ExFreePoolWithTag+0x4cf
- ffffc381`9e965aa0 fffff80d`efa69b56 : ffffa28a`169d1e20 ffffa28a`12332b48 fffff802`23a7d201 ffffa28a`12332b48 : CI!MincryptFreePolicyInfo+0x26
- ffffc381`9e965ad0 fffff80d`efa6cd77 : ffffa28a`12332b48 ffffa28a`169d1e20 ffff8001`6e4eedc0 00000000`00000001 : CI!I_FreeCatalogData+0x62
- ffffc381`9e965b00 fffff80d`efa655d8 : 00000000`00000000 fffff80d`efa65580 ffffa28a`169d1ea0 00000000`00000300 : CI!CiTrimCatalogs+0x17f
- ffffc381`9e965b50 fffff802`236c2ca8 : ffffa28a`1e8eb040 00000000`783a5a00 fffff802`23758ea0 fffff802`239ce300 : CI!CipPostBootWorker+0x58
- ffffc381`9e965b80 fffff802`23761ac7 : 7250620a`61736153 00000000`00000080 ffffa28a`1221e040 ffffa28a`1e8eb040 : nt!ExpWorkerThread+0xd8
- ffffc381`9e965c10 fffff802`237f6946 : ffffc381`9b400180 ffffa28a`1e8eb040 fffff802`23761a80 00010b15`00005331 : nt!PspSystemThreadStartup+0x47
- ffffc381`9e965c60 00000000`00000000 : ffffc381`9e966000 ffffc381`9e960000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
- STACK_COMMAND: kb
- THREAD_SHA1_HASH_MOD_FUNC: 4b949bc2c12ae01c3edf98d640e4b12bd61a4327
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 273a738ee258368ea7dfb0fb6053096f0f548662
- THREAD_SHA1_HASH_MOD: 6aad5f1d05ac89741af71803f6a8100f925d6eb6
- FOLLOWUP_IP:
- CI!MincryptFreePolicyInfo+26
- fffff80d`efa7fa4e 33d2 xor edx,edx
- FAULT_INSTR_CODE: 8b48d233
- SYMBOL_STACK_INDEX: 3
- SYMBOL_NAME: CI!MincryptFreePolicyInfo+26
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: CI
- IMAGE_NAME: CI.dll
- DEBUG_FLR_IMAGE_TIMESTAMP: 57c1e861
- IMAGE_VERSION: 10.0.15063.251
- BUCKET_ID_FUNC_OFFSET: 26
- FAILURE_BUCKET_ID: 0x19_22_CI!MincryptFreePolicyInfo
- BUCKET_ID: 0x19_22_CI!MincryptFreePolicyInfo
- PRIMARY_PROBLEM_CLASS: 0x19_22_CI!MincryptFreePolicyInfo
- TARGET_TIME: 2017-07-18T13:39:23.000Z
- OSBUILD: 15063
- OSSERVICEPACK: 483
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.15063.483
- ANALYSIS_SESSION_ELAPSED_TIME: 99b
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:0x19_22_ci!mincryptfreepolicyinfo
- FAILURE_ID_HASH: {28844b18-239c-4dbb-0fee-731ea86689d2}
- Followup: MachineOwner
- ========================================================================
- =================== Dump File: 071817-16312-01.dmp ===================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Kernel base = 0xfffff802`36a90000 PsLoadedModuleList = 0xfffff802`36ddc5e0
- Debug session time: Tue Jul 18 01:20:04.815 2017 (UTC - 4:00)
- System Uptime: 0 days 1:48:43.574
- BugCheck 3B, {c0000005, fffff80236c01fc7, ffffe48172648890, 0}
- Probably caused by : ntkrnlmp.exe ( nt!CmpCreateKeyBody+8f )
- Followup: MachineOwner
- SYSTEM_SERVICE_EXCEPTION (3b)
- An exception happened while executing a system service routine.
- Arguments:
- Arg1: 00000000c0000005, Exception code that caused the bugcheck
- Arg2: fffff80236c01fc7, Address of the instruction which caused the bugcheck
- Arg3: ffffe48172648890, Address of the context record for the exception that caused the bugcheck
- Arg4: 0000000000000000, zero.
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
- SYSTEM_MANUFACTURER: ASUS
- SYSTEM_PRODUCT_NAME: All Series
- SYSTEM_SKU: All
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: 2603
- BIOS_DATE: 02/22/2016
- BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
- BASEBOARD_PRODUCT: H97M-PLUS
- BASEBOARD_VERSION: Rev X.0x
- DUMP_TYPE: 2
- EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- FAULTING_IP:
- nt!ExpInterlockedPopEntrySListFault+0
- fffff802`36c01fc7 498b08 mov rcx,qword ptr [r8]
- CONTEXT: ffffe48172648890 -- (.cxr 0xffffe48172648890)
- rax=00000007649a0002 rbx=0000000000000000 rcx=ffffab00bfeb0b10
- rdx=5364615602050000 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff80236c01fc7 rsp=ffffe48172649280 rbp=ffffab00bfeb0b10
- r8=5364615602050000 r9=0000000000000000 r10=ffffab00bfeb0b10
- r11=ffffe48172649310 r12=ffffe4816dd80180 r13=ffffab00bff47d90
- r14=ffff9186959b9a70 r15=0000000000000001
- iopl=0 nv up ei pl nz na po nc
- cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206
- nt!ExpInterlockedPopEntrySListFault:
- fffff802`36c01fc7 498b08 mov rcx,qword ptr [r8] ds:002b:53646156`02050000=????????????????
- Resetting default scope
- CPU_COUNT: 8
- CPU_MHZ: c15
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 3c
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- BUGCHECK_STR: 0x3B
- PROCESS_NAME: explorer.exe
- CURRENT_IRQL: 0
- LAST_CONTROL_TRANSFER: from fffff80236f28d0f to fffff80236c01fc7
- STACK_TEXT:
- ffffe481`72649280 fffff802`36f28d0f : 00000006`00060001 fffff802`00000006 00000000`00000000 ffff9186`8eb2c000 : nt!ExpInterlockedPopEntrySListFault
- ffffe481`72649290 fffff802`36f2d058 : 00000000`00000000 00000000`00000001 ffffe481`72649cd0 00000000`00000000 : nt!CmpCreateKeyBody+0x8f
- ffffe481`72649340 fffff802`36f38306 : ffffe481`0000001c ffffe481`72649810 ffffe481`72649790 ffff9186`949316b0 : nt!CmpDoParseKey+0xa48
- ffffe481`72649720 fffff802`36f3261b : ffffab00`c0b24b10 fffff491`00000000 ffffab00`c0b24b10 ffffe481`72649b01 : nt!CmpParseKey+0x266
- ffffe481`726498f0 fffff802`36f36150 : ffffab00`c0b24b00 ffffe481`72649b58 ffff9186`00000040 ffffab00`bff47d90 : nt!ObpLookupObjectName+0x46b
- ffffe481`72649ac0 fffff802`36f36e54 : 00000000`00000001 ffffab00`bff47d90 00000000`00000000 00000000`00000000 : nt!ObOpenObjectByNameEx+0x1e0
- ffffe481`72649c00 fffff802`36f39b7f : 00000000`0000a91c fffff491`e0ecdd29 00000000`00000000 00000000`00090402 : nt!CmOpenKey+0x274
- ffffe481`72649e00 fffff802`36c07413 : ffffab00`ce4c67c0 00000000`0c6c9220 00000000`00000005 00000000`00000100 : nt!NtOpenKeyEx+0xf
- ffffe481`72649e40 00007ffb`9d107634 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
- 00000000`10fce0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`9d107634
- THREAD_SHA1_HASH_MOD_FUNC: d994e0c1e6e8349776dc8ce6a9e19057de601648
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: a111c5851d3b0f25f8dc319ad34f118ec6262adb
- THREAD_SHA1_HASH_MOD: 9f457f347057f10e1df248e166a3e95e6570ecfe
- FOLLOWUP_IP:
- nt!CmpCreateKeyBody+8f
- fffff802`36f28d0f 488bf0 mov rsi,rax
- FAULT_INSTR_CODE: 48f08b48
- SYMBOL_STACK_INDEX: 1
- SYMBOL_NAME: nt!CmpCreateKeyBody+8f
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- DEBUG_FLR_IMAGE_TIMESTAMP: 595f24eb
- IMAGE_VERSION: 10.0.15063.483
- STACK_COMMAND: .cxr 0xffffe48172648890 ; kb
- BUCKET_ID_FUNC_OFFSET: 8f
- FAILURE_BUCKET_ID: 0x3B_nt!CmpCreateKeyBody
- BUCKET_ID: 0x3B_nt!CmpCreateKeyBody
- PRIMARY_PROBLEM_CLASS: 0x3B_nt!CmpCreateKeyBody
- TARGET_TIME: 2017-07-18T05:20:04.000Z
- OSBUILD: 15063
- OSSERVICEPACK: 483
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.15063.483
- ANALYSIS_SESSION_ELAPSED_TIME: 782a
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:0x3b_nt!cmpcreatekeybody
- FAILURE_ID_HASH: {9082b3ad-154f-c3b5-53fd-dcb083d044d2}
- Followup: MachineOwner
- ========================================================================
- =================== Dump File: 072117-15484-01.dmp ===================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Kernel base = 0xfffff800`21489000 PsLoadedModuleList = 0xfffff800`217d55e0
- Debug session time: Thu Jul 20 21:41:10.463 2017 (UTC - 4:00)
- System Uptime: 0 days 5:11:49.224
- BugCheck 1A, {41793, ffffb98115870e28, 9, 8}
- Probably caused by : memory_corruption
- Followup: memory_corruption
- MEMORY_MANAGEMENT (1a)
- # Any other values for parameter 1 must be individually examined.
- Arguments:
- Arg1: 0000000000041793, The subtype of the bugcheck.
- Arg2: ffffb98115870e28
- Arg3: 0000000000000009
- Arg4: 0000000000000008
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
- SYSTEM_MANUFACTURER: ASUS
- SYSTEM_PRODUCT_NAME: All Series
- SYSTEM_SKU: All
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: 2603
- BIOS_DATE: 02/22/2016
- BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
- BASEBOARD_PRODUCT: H97M-PLUS
- BASEBOARD_VERSION: Rev X.0x
- DUMP_TYPE: 2
- BUGCHECK_STR: 0x1a_41793
- CPU_COUNT: 8
- CPU_MHZ: c15
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 3c
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- PROCESS_NAME: MsMpEng.exe
- CURRENT_IRQL: 2
- LAST_CONTROL_TRANSFER: from fffff80021628cd0 to fffff800215f54c0
- STACK_TEXT:
- ffffd581`b2b1d5a8 fffff800`21628cd0 : 00000000`0000001a 00000000`00041793 ffffb981`15870e28 00000000`00000009 : nt!KeBugCheckEx
- ffffd581`b2b1d5b0 fffff800`215085bd : ffff8803`05db9d88 ffff8803`06807080 ffff8803`05db9d88 ffff8803`05db97c0 : nt!MiDeleteVirtualAddresses+0x11b980
- ffffd581`b2b1d860 fffff800`2193d89c : 0000022b`0de00000 ffff8803`01a91d40 ffffffff`ffffffff 00000000`00000000 : nt!MiDeleteVad+0x3ad
- ffffd581`b2b1d9e0 fffff800`219b39c6 : ffff8803`05db97c0 ffffd581`00000008 ffff8802`f96c2f20 0000022b`0de00000 : nt!MiUnmapViewOfSection+0xec
- ffffd581`b2b1dab0 fffff800`21600413 : ffff8803`06807080 00000000`ffffffff 00000000`00000000 ffff8803`05db97c0 : nt!NtUnmapViewOfSectionEx+0x86
- ffffd581`b2b1db00 00007ff8`39228b54 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
- 000000a7`562ff138 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`39228b54
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff800214d30f6 - nt!MiCreateDecayPfn+56
- [ 80:00 ]
- 1 error : !nt (fffff800214d30f6)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: ONE_BIT
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
- BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_ONE_BIT
- TARGET_TIME: 2017-07-21T01:41:10.000Z
- OSBUILD: 15063
- OSSERVICEPACK: 483
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.15063.483
- ANALYSIS_SESSION_ELAPSED_TIME: 3963
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_one_bit
- FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
- Followup: memory_corruption
- ========================================================================
- =================== Dump File: 072117-14671-01.dmp ===================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Kernel base = 0xfffff800`d9c0e000 PsLoadedModuleList = 0xfffff800`d9f5a5e0
- Debug session time: Thu Jul 20 22:04:22.263 2017 (UTC - 4:00)
- System Uptime: 0 days 0:22:18.021
- BugCheck 133, {1, 1e00, fffff800d9fef348, 0}
- *************************************************************************
- *** Either you specified an unqualified symbol, or your debugger ***
- *** doesn't have full symbol information. Unqualified symbol ***
- *** resolution is turned off by default. Please either specify a ***
- *** fully qualified symbol module!symbolname, or enable resolution ***
- *** of unqualified symbols by typing ".symopt- 100". Note that ***
- *** enabling unqualified symbol resolution with network symbol ***
- *** server shares in the symbol path may cause the debugger to ***
- *** appear to hang for long periods of time when an incorrect ***
- *** symbol name is typed or the network symbol server is down. ***
- *** For some commands to work properly, your symbol path ***
- *** must point to .pdb files that have full type information. ***
- *** Certain .pdb files (such as the public OS symbols) do not ***
- *** contain the required information. Contact the group that ***
- *** provided you with these symbols if you need this command to ***
- *** work. ***
- *** Type referenced: TickPeriods ***
- *************************************************************************
- Probably caused by : memory_corruption
- Followup: memory_corruption
- DPC_WATCHDOG_VIOLATION (133)
- The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
- or above.
- Arguments:
- Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
- DISPATCH_LEVEL or above. The offending component can usually be
- identified with a stack trace.
- Arg2: 0000000000001e00, The watchdog period.
- Arg3: fffff800d9fef348
- Arg4: 0000000000000000
- Debugging Details:
- *************************************************************************
- *** Either you specified an unqualified symbol, or your debugger ***
- *** doesn't have full symbol information. Unqualified symbol ***
- *** resolution is turned off by default. Please either specify a ***
- *** fully qualified symbol module!symbolname, or enable resolution ***
- *** of unqualified symbols by typing ".symopt- 100". Note that ***
- *** enabling unqualified symbol resolution with network symbol ***
- *** server shares in the symbol path may cause the debugger to ***
- *** appear to hang for long periods of time when an incorrect ***
- *** symbol name is typed or the network symbol server is down. ***
- *** For some commands to work properly, your symbol path ***
- *** must point to .pdb files that have full type information. ***
- *** Certain .pdb files (such as the public OS symbols) do not ***
- *** contain the required information. Contact the group that ***
- *** provided you with these symbols if you need this command to ***
- *** work. ***
- *** Type referenced: TickPeriods ***
- *************************************************************************
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
- SYSTEM_MANUFACTURER: ASUS
- SYSTEM_PRODUCT_NAME: All Series
- SYSTEM_SKU: All
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: 2603
- BIOS_DATE: 02/22/2016
- BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
- BASEBOARD_PRODUCT: H97M-PLUS
- BASEBOARD_VERSION: Rev X.0x
- DUMP_TYPE: 2
- DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
- CPU_COUNT: 8
- CPU_MHZ: c15
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 3c
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- BUGCHECK_STR: 0x133
- PROCESS_NAME: WmiPrvSE.exe
- CURRENT_IRQL: d
- LAST_CONTROL_TRANSFER: from fffff800d9daa45d to fffff800d9d7a4c0
- STACK_TEXT:
- ffffd180`e4ab4bc8 fffff800`d9daa45d : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff800`d9fef348 : nt!KeBugCheckEx
- ffffd180`e4ab4bd0 fffff800`d9c83899 : 000003db`caebda60 ffffd180`e4a80180 00000000`00014e81 00000000`00000002 : nt!KeAccumulateTicks+0x124f2d
- ffffd180`e4ab4c30 fffff800`da49a676 : 000003db`caebca73 00000000`00000001 ffffd180`e86fa360 ffffa90d`70ec65b0 : nt!KeClockInterruptNotify+0x599
- ffffd180`e4ab4f40 fffff800`d9c1d675 : ffffa90d`70ec6500 00000000`00000000 00000000`00000000 00000000`00000000 : hal!HalpTimerClockInterrupt+0x56
- ffffd180`e4ab4f70 fffff800`d9d7bb5a : ffffd180`e86fa3e0 ffffa90d`70ec6500 ffff8b87`e79f76f8 ffff9e80`01ddec10 : nt!KiCallInterruptServiceRoutine+0xa5
- ffffd180`e4ab4fb0 fffff800`d9d7bfa7 : 00000000`000e505f 000e6cc0`0000902e 80000001`00000000 00001f80`00f802c0 : nt!KiInterruptSubDispatchNoLockNoEtw+0xea
- ffffd180`e86fa360 fffff800`d9ca95a1 : 00000000`00000000 00000000`00000004 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0x37
- ffffd180`e86fa4f0 fffff800`da0e360c : ffffa90d`8392fa70 fffffb68`c07282d8 00000000`00000002 fffffb68`00000000 : nt!MiWalkEntireImage+0x251
- ffffd180`e86fa670 fffff800`da0e4943 : ffffa90d`8392fa70 00007fff`cbda0000 fffffb68`c07282d8 00000000`00000000 : nt!MiSwitchBaseAddress+0x5c
- ffffd180`e86fa6a0 fffff800`da0e4607 : 00007fff`cbda0000 ffffd180`e86fa910 00007fff`cca60000 ffffa90d`83b2e7c0 : nt!MiRelocateImageAgain+0x197
- ffffd180`e86fa720 fffff800`da0c7f21 : ffffd180`e86fa910 ffffd180`e86fa910 ffff8b87`d31ed680 00000000`01000000 : nt!MiValidateExistingImage+0x57
- ffffd180`e86fa780 fffff800`da0c73e3 : 00000000`00000002 ffffd180`e86fa910 ffffa90d`8392fa70 ffffa90d`7e10ab60 : nt!MiShareExistingControlArea+0xb9
- ffffd180`e86fa7c0 fffff800`da0c6c82 : ffffa90d`8392fa70 00000000`00000000 ffffa90d`7e10ab60 00000000`00f80060 : nt!MiCreateImageOrDataSection+0x163
- ffffd180`e86fa8a0 fffff800`da0c7802 : 00000000`11000000 00000000`00000000 ffff8b87`c94cd060 fffff800`da0b9159 : nt!MiCreateSection+0xd2
- ffffd180`e86fa9e0 fffff800`d9d85413 : ffffa90d`83b2e7c0 00000000`00000005 00000000`00000000 000000b0`675fbc78 : nt!NtCreateSection+0x1e2
- ffffd180`e86faa90 00007fff`e60c5ce4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
- 000000b0`675fbc58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`e60c5ce4
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff800d9c960ee-fffff800d9c960ef 2 bytes - nt!MiGetNextPageTable+19e
- [ 80 f6:00 fb ]
- fffff800d9c96121-fffff800d9c96122 2 bytes - nt!MiGetNextPageTable+1d1 (+0x33)
- [ 80 f6:00 fb ]
- fffff800d9ca3816-fffff800d9ca3817 2 bytes - nt!MiPfnShareCountIsZero+186 (+0xd6f5)
- [ 80 f6:00 fb ]
- fffff800d9ca95bc - nt!MiWalkEntireImage+26c (+0x5da6)
- [ fa:9e ]
- fffff800d9ca9604-fffff800d9ca9605 2 bytes - nt!MiWalkEntireImage+2b4 (+0x48)
- [ 80 f6:00 fb ]
- fffff800d9ca9666 - nt!MiWalkEntireImage+316 (+0x62)
- [ fa:9e ]
- fffff800d9e8e383-fffff800d9e8e385 3 bytes - nt!ExFreePoolWithTag+363
- [ 40 fb f6:80 7d fb ]
- 13 errors : !nt (fffff800d9c960ee-fffff800d9e8e385)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-07-21T02:04:22.000Z
- OSBUILD: 15063
- OSSERVICEPACK: 483
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.15063.483
- ANALYSIS_SESSION_ELAPSED_TIME: 2cbb
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- ========================================================================
- =================== Dump File: 072117-16578-01.dmp ===================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Kernel base = 0xfffff801`cb084000 PsLoadedModuleList = 0xfffff801`cb3d05e0
- Debug session time: Thu Jul 20 22:26:28.784 2017 (UTC - 4:00)
- System Uptime: 0 days 0:21:13.561
- BugCheck 1A, {41793, ffff810107a19ea8, 5, 4}
- Probably caused by : memory_corruption
- Followup: memory_corruption
- MEMORY_MANAGEMENT (1a)
- # Any other values for parameter 1 must be individually examined.
- Arguments:
- Arg1: 0000000000041793, The subtype of the bugcheck.
- Arg2: ffff810107a19ea8
- Arg3: 0000000000000005
- Arg4: 0000000000000004
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
- SYSTEM_MANUFACTURER: ASUS
- SYSTEM_PRODUCT_NAME: All Series
- SYSTEM_SKU: All
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: 2603
- BIOS_DATE: 02/22/2016
- BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
- BASEBOARD_PRODUCT: H97M-PLUS
- BASEBOARD_VERSION: Rev X.0x
- DUMP_TYPE: 2
- BUGCHECK_STR: 0x1a_41793
- CPU_COUNT: 8
- CPU_MHZ: c15
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 3c
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- PROCESS_NAME: MsMpEng.exe
- CURRENT_IRQL: 2
- LAST_CONTROL_TRANSFER: from fffff801cb223cd0 to fffff801cb1f04c0
- STACK_TEXT:
- ffffdf80`31ba75a8 fffff801`cb223cd0 : 00000000`0000001a 00000000`00041793 ffff8101`07a19ea8 00000000`00000005 : nt!KeBugCheckEx
- ffffdf80`31ba75b0 fffff801`cb1035bd : ffffc907`9bc05d88 ffffc907`9c45c080 ffffc907`9bc05d88 ffffc907`9bc057c0 : nt!MiDeleteVirtualAddresses+0x11b980
- ffffdf80`31ba7860 fffff801`cb53889c : 0000020f`433d0000 ffffc907`a01e2b50 ffffffff`ffffffff 00000000`00000000 : nt!MiDeleteVad+0x3ad
- ffffdf80`31ba79e0 fffff801`cb5ae9c6 : ffffc907`9bc057c0 000000f3`00000008 ffffc907`8f026f20 0000020f`433d0000 : nt!MiUnmapViewOfSection+0xec
- ffffdf80`31ba7ab0 fffff801`cb1fb413 : ffffc907`9c45c080 000000f3`00000000 00000000`00000000 ffffc907`9bc057c0 : nt!NtUnmapViewOfSectionEx+0x86
- ffffdf80`31ba7b00 00007fff`95788b54 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
- 000000f3`647fa588 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`95788b54
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff801cb0c4287 - nt!MiMapArbitraryPage+37
- [ fa:af ]
- 1 error : !nt (fffff801cb0c4287)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: ONE_BYTE
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BYTE
- BUCKET_ID: MEMORY_CORRUPTION_ONE_BYTE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_ONE_BYTE
- TARGET_TIME: 2017-07-21T02:26:28.000Z
- OSBUILD: 15063
- OSSERVICEPACK: 483
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.15063.483
- ANALYSIS_SESSION_ELAPSED_TIME: 3b57
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_one_byte
- FAILURE_ID_HASH: {ad110d6a-3b33-2c0a-c931-570eae1ba92d}
- Followup: memory_corruption
- ========================================================================
- =================== Dump File: 072217-20640-01.dmp ===================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Kernel base = 0xfffff802`88093000 PsLoadedModuleList = 0xfffff802`883df5e0
- Debug session time: Sat Jul 22 10:37:09.389 2017 (UTC - 4:00)
- System Uptime: 1 days 12:09:42.147
- BugCheck 3B, {c0000005, fffff80288124c95, ffffc38037d6b630, 0}
- Probably caused by : memory_corruption
- Followup: memory_corruption
- SYSTEM_SERVICE_EXCEPTION (3b)
- An exception happened while executing a system service routine.
- Arguments:
- Arg1: 00000000c0000005, Exception code that caused the bugcheck
- Arg2: fffff80288124c95, Address of the instruction which caused the bugcheck
- Arg3: ffffc38037d6b630, Address of the context record for the exception that caused the bugcheck
- Arg4: 0000000000000000, zero.
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
- SYSTEM_MANUFACTURER: ASUS
- SYSTEM_PRODUCT_NAME: All Series
- SYSTEM_SKU: All
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: 2603
- BIOS_DATE: 02/22/2016
- BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
- BASEBOARD_PRODUCT: H97M-PLUS
- BASEBOARD_VERSION: Rev X.0x
- DUMP_TYPE: 2
- EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- FAULTING_IP:
- nt!MiGetFreeOrZeroPage+45
- fffff802`88124c95 488b8cea680f0000 mov rcx,qword ptr [rdx+rbp*8+0F68h]
- CONTEXT: ffffc38037d6b630 -- (.cxr 0xffffc38037d6b630)
- rax=0000000000000001 rbx=0000000000029a70 rcx=0000000000000000
- rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000001
- rip=fffff80288124c95 rsp=ffffc38037d6c020 rbp=0000000000000001
- r8=0000000000000000 r9=0000000000000029 r10=fffff80288411800
- r11=0000000000000000 r12=00000000000029a7 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000001
- iopl=0 nv up ei pl nz na pe nc
- cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
- nt!MiGetFreeOrZeroPage+0x45:
- fffff802`88124c95 488b8cea680f0000 mov rcx,qword ptr [rdx+rbp*8+0F68h] ds:002b:00000000`00000f70=????????????????
- Resetting default scope
- CPU_COUNT: 8
- CPU_MHZ: c15
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 3c
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- BUGCHECK_STR: 0x3B
- PROCESS_NAME: svchost.exe
- CURRENT_IRQL: 0
- LAST_CONTROL_TRANSFER: from fffff80288124b3c to fffff80288124c95
- STACK_TEXT:
- ffffc380`37d6c020 fffff802`88124b3c : 00000000`00000000 00000000`000029a7 ffff93ff`00000000 00000000`00000001 : nt!MiGetFreeOrZeroPage+0x45
- ffffc380`37d6c0d0 fffff802`880d51f9 : 00000000`00000000 ffffd484`00000029 00000000`00000000 00000000`00000001 : nt!MiGetPage+0x8c
- ffffc380`37d6c140 fffff802`880d4a86 : 00000000`00005000 00000000`00005000 00000000`00000000 00000000`001c5000 : nt!MiMakePageAvoidRead+0x139
- ffffc380`37d6c2c0 fffff802`880d41bf : 62617461`00000000 000001b6`3bdc5a50 ffffc380`00000000 ffffc380`37d6c311 : nt!MmCopyToCachedPage+0x186
- ffffc380`37d6c390 fffff802`880d3541 : ffffd484`6ed5db10 000001b6`3bdc5a50 ffffc380`37d6c550 ffffd484`00000000 : nt!CcMapAndCopyInToCache+0x31f
- ffffc380`37d6c4f0 fffff80e`079e3015 : 00000000`001c6000 ffffd484`00000001 ffffc380`37d6c5a8 ffffd484`676b9d60 : nt!CcCopyWriteEx+0x111
- ffffc380`37d6c570 fffff80e`06a05e3e : 00000000`000001a0 ffffd484`69785780 ffffd484`678b2080 000001b6`3bdc5a50 : NTFS!NtfsCopyWriteA+0x3c5
- ffffc380`37d6c820 fffff80e`06a0331d : ffffc380`37d6c910 ffffd484`678b2000 ffffd484`676b9cf8 ffffd484`676b9c00 : FLTMGR!FltpPerformFastIoCall+0x13e
- ffffc380`37d6c880 fffff80e`06a357dc : 00000000`00001000 fffff802`88552ce4 00000000`00000001 ffffc380`37d6c9f8 : FLTMGR!FltpPassThroughFastIo+0xbd
- ffffc380`37d6c8e0 fffff802`885527c7 : 00000000`00000000 fffff802`88528201 ffffc380`37d6cb80 00000000`00000000 : FLTMGR!FltpFastIoWrite+0x15c
- ffffc380`37d6c980 fffff802`8820a413 : 000001b6`3a440000 00000000`00000000 00000000`00000000 000000ac`18f7ebe0 : nt!NtWriteFile+0x457
- ffffc380`37d6ca90 00007ff9`ae6754a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
- 000000ac`18f7eb38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`ae6754a4
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff802880d522f-fffff802880d5230 2 bytes - nt!MiMakePageAvoidRead+16f
- [ 80 fa:00 91 ]
- fffff802880e2fbb-fffff802880e2fbc 2 bytes - nt!MiReleaseSystemCacheView+43 (+0xdd8c)
- [ 80 f6:00 c2 ]
- fffff802880e3011-fffff802880e3013 3 bytes - nt!MiReleaseSystemCacheView+99 (+0x56)
- [ 40 fb f6:00 61 c2 ]
- fffff80288120d27-fffff80288120d28 2 bytes - nt!MiResolvePageTablePage+3b7 (+0x3dd16)
- [ ff f6:7f c2 ]
- fffff80288120d48-fffff80288120d4c 5 bytes - nt!MiResolvePageTablePage+3d8 (+0x21)
- [ df be 7d fb f6:4f 98 30 61 c2 ]
- fffff8028812407a-fffff8028812407b 2 bytes - nt!MiResolvePrivateZeroFault+27a (+0x3332)
- [ 80 f6:00 c2 ]
- fffff802881240b0-fffff802881240b2 3 bytes - nt!MiResolvePrivateZeroFault+2b0 (+0x36)
- [ 40 fb f6:00 61 c2 ]
- fffff802881240d8-fffff802881240d9 2 bytes - nt!MiResolvePrivateZeroFault+2d8 (+0x28)
- [ 80 fa:00 91 ]
- fffff80288124267-fffff80288124268 2 bytes - nt!MiResolvePrivateZeroFault+467 (+0x18f)
- [ 80 f6:00 c2 ]
- fffff80288124563-fffff80288124564 2 bytes - nt!MiResolvePrivateZeroFault+763 (+0x2fc)
- [ 80 f6:00 c2 ]
- fffff8028812471a-fffff8028812471b 2 bytes - nt!MiGetPageChain+17a (+0x1b7)
- [ 80 fa:00 91 ]
- fffff80288124b53-fffff80288124b54 2 bytes - nt!MiGetPage+a3 (+0x439)
- [ 80 fa:00 91 ]
- fffff80288124cc2-fffff80288124cc3 2 bytes - nt!MiGetFreeOrZeroPage+72 (+0x16f)
- [ 80 fa:00 91 ]
- fffff8028813279c-fffff8028813279d 2 bytes - nt!MiRemoveLockedPageChargeAndDecRef+1ac (+0xdada)
- [ 80 fa:00 91 ]
- fffff8028818b559-fffff8028818b55a 2 bytes - nt!MiDeleteParentDecayNode+25 (+0x58dbd)
- [ 80 fa:00 91 ]
- fffff8028818b614-fffff8028818b615 2 bytes - nt!MiRemoveDecayClusterTimer+38 (+0xbb)
- [ 80 fa:00 91 ]
- fffff80288313383-fffff80288313385 3 bytes - nt!ExFreePoolWithTag+363
- [ 40 fb f6:00 61 c2 ]
- 40 errors : !nt (fffff802880d522f-fffff80288313385)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- STACK_COMMAND: .cxr 0xffffc38037d6b630 ; kb
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-07-22T14:37:09.000Z
- OSBUILD: 15063
- OSSERVICEPACK: 483
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.15063.483
- ANALYSIS_SESSION_ELAPSED_TIME: 387b
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
Advertisement
Add Comment
Please, Sign In to add comment