Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 10.0.14321.1024 X86
- Copyright (c) Microsoft Corporation. All rights reserved.
- ========================================================================
- =================== Dump File: 072617-6765-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 14393 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 14393.1480.amd64fre.rs1_release.170706-2004
- Kernel base = 0xfffff803`58a79000 PsLoadedModuleList = 0xfffff803`58d78040
- Debug session time: Wed Jul 26 20:15:27.867 2017 (UTC - 4:00)
- System Uptime: 0 days 5:24:08.623
- BugCheck 50, {ffffc389f50268d8, 0, fffff803590d8de7, 2}
- Could not read faulting driver name
- Probably caused by : memory_corruption
- Followup: memory_corruption
- PAGE_FAULT_IN_NONPAGED_AREA (50)
- Invalid system memory was referenced. This cannot be protected by try-except.
- Typically the address is just plain bad or it is pointing at freed memory.
- Arguments:
- Arg1: ffffc389f50268d8, memory referenced.
- Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
- Arg3: fffff803590d8de7, If non-zero, the instruction address which referenced the bad memory
- address.
- Arg4: 0000000000000002, (reserved)
- Debugging Details:
- Could not read faulting driver name
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
- SYSTEM_MANUFACTURER: MSI
- SYSTEM_PRODUCT_NAME: MS-7693
- SYSTEM_VERSION: 4.0
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: V22.4
- BIOS_DATE: 12/21/2015
- BASEBOARD_MANUFACTURER: MSI
- BASEBOARD_PRODUCT: 970 GAMING (MS-7693)
- BASEBOARD_VERSION: 4.0
- DUMP_TYPE: 2
- READ_ADDRESS: fffff80358e19338: Unable to get MiVisibleState
- ffffc389f50268d8 Paged pool
- FAULTING_IP:
- nt!ObpCaptureHandleInformation+63
- fffff803`590d8de7 0fb64218 movzx eax,byte ptr [rdx+18h]
- MM_INTERNAL_CODE: 2
- CPU_COUNT: 8
- CPU_MHZ: fa0
- CPU_VENDOR: AuthenticAMD
- CPU_FAMILY: 15
- CPU_MODEL: 2
- CPU_STEPPING: 0
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- BUGCHECK_STR: AV
- PROCESS_NAME: Steam.exe
- CURRENT_IRQL: 0
- TRAP_FRAME: ffffd880ba971050 -- (.trap 0xffffd880ba971050)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=00ffffc389f50268 rbx=0000000000000000 rcx=0000000000000068
- rdx=ffffc389f50268c0 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff803590d8de7 rsp=ffffd880ba9711e8 rbp=ffffc38df4ff3a50
- r8=ffffc38df4ff3a50 r9=000000000004d294 r10=ffffd880ba971278
- r11=0000000000001fe8 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl nz ac pe cy
- nt!ObpCaptureHandleInformation+0x63:
- fffff803`590d8de7 0fb64218 movzx eax,byte ptr [rdx+18h] ds:ffffc389`f50268d8=??
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff80358bf2e11 to fffff80358bc8960
- STACK_TEXT:
- ffffd880`ba970d58 fffff803`58bf2e11 : 00000000`00000050 ffffc389`f50268d8 00000000`00000000 ffffd880`ba971050 : nt!KeBugCheckEx
- ffffd880`ba970d60 fffff803`58ace0fd : 00000000`00000000 00000000`00000000 ffffd880`ba971050 ffffc389`f50268d8 : nt!MiSystemFault+0x100201
- ffffd880`ba970e50 fffff803`58bd1ffc : 00000000`00000000 00001f80`00ae0000 c38df38a`7580fffc ffffc38d`ee992040 : nt!MmAccessFault+0x27d
- ffffd880`ba971050 fffff803`590d8de7 : fffff803`5911e527 00000000`0004d294 00000000`00000000 ffff9802`00000000 : nt!KiPageFault+0x13c
- ffffd880`ba9711e8 fffff803`5911e527 : 00000000`0004d294 00000000`00000000 ffff9802`00000000 00000000`00000000 : nt!ObpCaptureHandleInformation+0x63
- ffffd880`ba9711f0 fffff803`590d8cfc : fffff803`590d8d84 ffffe87e`bf75b600 ffffd880`0058a4e0 ffffd880`ba971324 : nt!ExpSnapShotHandleTables+0x127
- ffffd880`ba971270 fffff803`5911c237 : ffffd880`ba971324 00000000`0035b5c8 00000000`0058a4e0 00000000`00000000 : nt!ObGetHandleInformation+0x3c
- ffffd880`ba9712b0 fffff803`590001d3 : 00000000`00000010 00000000`00020000 ffffe87e`bf400050 ffff9802`f38c5000 : nt!ExpGetHandleInformation+0x53
- ffffd880`ba9712f0 fffff803`58e7cb6b : 00000000`00000002 00000000`0000e000 ffffffff`ffffffff 00000000`00b90000 : nt!ExpQuerySystemInformation+0x183553
- ffffd880`ba971ac0 fffff803`58bd3693 : ffff9802`ec885480 00000000`00000000 ffffd880`ba971ad8 ffff9802`ec88a120 : nt!NtQuerySystemInformation+0x2b
- ffffd880`ba971b00 00007ffa`a35b67a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
- 00000000`0af8e668 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`a35b67a4
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff80358acb1f5 - nt!MiCompletePrivateZeroFault+45
- [ f6:bf ]
- fffff80358acb9d1 - nt!MiCompletePrivateZeroFault+821 (+0x7dc)
- [ fa:ef ]
- fffff80358acba94 - nt!MiCompletePrivateZeroFault+8e4 (+0xc3)
- [ fa:ef ]
- fffff80358acbf22 - nt!MiAllocateWsle+422 (+0x48e)
- [ f6:bf ]
- fffff80358acd3d8 - nt!MiGetPage+98 (+0x14b6)
- [ fa:ef ]
- fffff80358acd5eb - nt!MiGetFreeOrZeroPage+7b (+0x213)
- [ fa:ef ]
- fffff80358acf3a4 - nt!MiResolvePageTablePage+54 (+0x1db9)
- [ f6:bf ]
- fffff80358ae33d1 - nt!MiInsertProtectedStandbyPage+21 (+0x1402d)
- [ fa:ef ]
- fffff80358afddb9 - nt!MiMakeZeroedPageTableRange+1d1 (+0x1a9e8)
- [ f6:bf ]
- fffff80358afde10 - nt!MiMakeZeroedPageTableRange+228 (+0x57)
- [ f6:bf ]
- fffff80358b8c2de - nt!MiPurgeZeroList+6e (+0x8e4ce)
- [ fa:ef ]
- 11 errors : !nt (fffff80358acb1f5-fffff80358b8c2de)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-07-27T00:15:27.000Z
- OSBUILD: 14393
- OSSERVICEPACK: 1480
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
- BUILDDATESTAMP_STR: 170706-2004
- BUILDLAB_STR: rs1_release
- BUILDOSVER_STR: 10.0.14393.1480
- ANALYSIS_SESSION_ELAPSED_TIME: 49e0
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- =============================== Drivers ================================
- ffffd41c`c6120000 ffffd41c`c612a000 TSDDD (deferred)
- Image path: \SystemRoot\System32\TSDDD.dll
- Image name: TSDDD.dll
- Timestamp: unavailable (00000000)
- fffff800`04fe0000 fffff800`04ffd000 mcupdate_AuthenticAMD (deferred)
- Image path: \SystemRoot\system32\mcupdate_AuthenticAMD.dll
- Image name: mcupdate_AuthenticAMD.dll
- Timestamp: Fri Jul 15 22:29:15 2016 (57899BFB)
- fffff800`06050000 fffff800`0605a000 Null (deferred)
- Image path: \SystemRoot\System32\Drivers\Null.SYS
- Image name: Null.SYS
- Timestamp: unavailable (00000000)
- fffff800`06070000 fffff800`06096000 ctxusbm (deferred)
- Image path: \SystemRoot\system32\DRIVERS\ctxusbm.sys
- Image name: ctxusbm.sys
- Timestamp: Mon Aug 29 09:14:23 2016 (57C4352F)
- fffff800`06480000 fffff800`067e5000 bwcW10x64 (deferred)
- Image path: \SystemRoot\system32\DRIVERS\bwcW10x64.sys
- Image name: bwcW10x64.sys
- Timestamp: Fri Jan 22 17:08:51 2016 (56A2A873)
- fffff800`06920000 fffff800`0692e000 MpKslf7edd665 (deferred)
- Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{477D63B7-88EF-4533-9167-7AB8BA3A4460}\MpKslf7edd665.sys
- Image name: MpKslf7edd665.sys
- Timestamp: Tue May 19 21:50:37 2015 (555BE86D)
- fffff800`06930000 fffff800`0693e000 MpKsl4b7f4181 (deferred)
- Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{12F8D1E2-47DB-4F1F-A80C-655A77F8AE9E}\MpKsl4b7f4181.sys
- Image name: MpKsl4b7f4181.sys
- Timestamp: Tue May 19 21:50:37 2015 (555BE86D)
- fffff800`06940000 fffff800`0694e000 MpKsl49b57fbd (deferred)
- Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{178D3882-493B-4A2D-82BB-E5A2386749D5}\MpKsl49b57fbd.sys
- Image name: MpKsl49b57fbd.sys
- Timestamp: Tue May 19 21:50:37 2015 (555BE86D)
- fffff800`06950000 fffff800`0695e000 MpKsl4386cc84 (deferred)
- Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{96E3F65E-1C91-4D2C-ACD5-BE30F969CF5D}\MpKsl4386cc84.sys
- Image name: MpKsl4386cc84.sys
- Timestamp: Tue May 19 21:50:37 2015 (555BE86D)
- fffff800`06960000 fffff800`0696e000 MpKsl312c2281 (deferred)
- Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{96E3F65E-1C91-4D2C-ACD5-BE30F969CF5D}\MpKsl312c2281.sys
- Image name: MpKsl312c2281.sys
- Timestamp: Tue May 19 21:50:37 2015 (555BE86D)
- fffff800`06970000 fffff800`0697e000 MpKsl2829a156 (deferred)
- Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{B21424A9-38BD-47AB-8E93-AB971B55EB4A}\MpKsl2829a156.sys
- Image name: MpKsl2829a156.sys
- Timestamp: Tue May 19 21:50:37 2015 (555BE86D)
- fffff800`06e00000 fffff800`06ec2000 peauth (deferred)
- Image path: \SystemRoot\system32\drivers\peauth.sys
- Image name: peauth.sys
- Timestamp: Fri Jul 15 22:24:39 2016 (57899AE7)
- fffff800`07150000 fffff800`0715e000 MpKsld526b941 (deferred)
- Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{35A34713-BE69-4DBD-BC6E-462217CF76C8}\MpKsld526b941.sys
- Image name: MpKsld526b941.sys
- Timestamp: Tue May 19 21:50:37 2015 (555BE86D)
- fffff800`078e0000 fffff800`07963000 atikmpag (deferred)
- Image path: \SystemRoot\System32\DriverStore\FileRepository\c0313745.inf_amd64_133311ca362c9cc6\atikmpag.sys
- Image name: atikmpag.sys
- Timestamp: Mon Apr 24 20:57:35 2017 (58FE9EFF)
- fffff800`09f60000 fffff800`09f69000 IOMap64 (deferred)
- Image path: \??\C:\Windows\system32\drivers\IOMap64.sys
- Image name: IOMap64.sys
- Timestamp: Wed Oct 22 20:52:12 2014 (5448513C)
- fffff800`09fa0000 fffff800`09fc7000 e22w10x64 (deferred)
- Image path: \SystemRoot\System32\drivers\e22w10x64.sys
- Image name: e22w10x64.sys
- Timestamp: Fri Aug 28 17:05:38 2015 (55E0CD22)
- fffff800`0a040000 fffff800`0a044e00 LGBusEnum (deferred)
- Image path: \SystemRoot\system32\drivers\LGBusEnum.sys
- Image name: LGBusEnum.sys
- Timestamp: Mon Jun 13 14:47:08 2016 (575EFFAC)
- fffff800`0a050000 fffff800`0a05c800 LGJoyXlCore (deferred)
- Image path: \SystemRoot\system32\drivers\LGJoyXlCore.sys
- Image name: LGJoyXlCore.sys
- Timestamp: Mon Jun 13 14:47:06 2016 (575EFFAA)
- fffff800`0a160000 fffff800`0a17e000 AtihdWT6 (deferred)
- Image path: \SystemRoot\system32\drivers\AtihdWT6.sys
- Image name: AtihdWT6.sys
- Timestamp: Sat Mar 25 17:04:05 2017 (58D6DB45)
- fffff800`0a220000 fffff800`0a776000 RTKVHD64 (deferred)
- Image path: \SystemRoot\system32\drivers\RTKVHD64.sys
- Image name: RTKVHD64.sys
- Timestamp: Tue Oct 18 07:20:52 2016 (58060594)
- fffff800`0a780000 fffff800`0a78e000 MBfilt64 (deferred)
- Image path: \SystemRoot\system32\drivers\MBfilt64.sys
- Image name: MBfilt64.sys
- Timestamp: Thu Jul 30 23:40:32 2009 (4A7267B0)
- fffff800`0acb0000 fffff800`0acb8000 lgcoretemp (deferred)
- Image path: \??\C:\Program Files\Logitech Gaming Software\Drivers\LgCoreTemp\lgcoretemp.sys
- Image name: lgcoretemp.sys
- Timestamp: Tue Jun 9 12:52:10 2015 (557719BA)
- fffff800`0ad60000 fffff800`0d094000 atikmdag (deferred)
- Image path: \SystemRoot\System32\DriverStore\FileRepository\c0313745.inf_amd64_133311ca362c9cc6\atikmdag.sys
- Image name: atikmdag.sys
- Timestamp: Mon Apr 24 21:11:16 2017 (58FEA234)
- fffff800`0d0a0000 fffff800`0d0a2500 LGVirHid (deferred)
- Image path: \SystemRoot\system32\drivers\LGVirHid.sys
- Image name: LGVirHid.sys
- Timestamp: Mon Jun 13 14:47:03 2016 (575EFFA7)
- fffff800`0d140000 fffff800`0d161000 drmk (deferred)
- Image path: \SystemRoot\System32\drivers\drmk.sys
- Image name: drmk.sys
- Timestamp: Fri Jul 15 22:27:13 2016 (57899B81)
- LegalCopyright: © Microsoft Corporation. All rights reserved.
- Unloaded modules:
- fffff800`05f30000 fffff800`05f3f000 dump_storpor
- fffff800`05f70000 fffff800`05f94000 dump_storahc
- fffff800`05fc0000 fffff800`05fdd000 dump_dumpfve
- fffff800`09f60000 fffff800`09f6a000 amdkmafd.sys
- fffff800`0d0a0000 fffff800`0d0aa000 amdkmafd.sys
- fffff800`069c0000 fffff800`069d4000 dam.sys
- fffff800`05fe0000 fffff800`06011000 cdrom.sys
- fffff800`05210000 fffff800`05220000 WdBoot.sys
- fffff800`05e40000 fffff800`05e4f000 hwpolicy.sys
- ============================= BIOS INFO ================================
- [SMBIOS Data Tables v2.8]
- [DMI Version - 0]
- [2.0 Calling Convention - No]
- [Table Size - 2287 bytes]
- [BIOS Information (Type 0) - Length 24 - Handle 0000h]
- Vendor American Megatrends Inc.
- BIOS Version V22.4
- BIOS Starting Address Segment f000
- BIOS Release Date 12/21/2015
- BIOS ROM Size 800000
- BIOS Characteristics
- 07: - PCI Supported
- 11: - Upgradeable FLASH BIOS
- 12: - BIOS Shadowing Supported
- 15: - CD-Boot Supported
- 16: - Selectable Boot Supported
- 17: - BIOS ROM Socketed
- 19: - EDD Supported
- 23: - 1.2MB Floppy Supported
- 24: - 720KB Floppy Supported
- 25: - 2.88MB Floppy Supported
- 26: - Print Screen Device Supported
- 27: - Keyboard Services Supported
- 28: - Serial Services Supported
- 29: - Printer Services Supported
- 32: - BIOS Vendor Reserved
- BIOS Characteristic Extensions
- 00: - ACPI Supported
- 01: - USB Legacy Supported
- 08: - BIOS Boot Specification Supported
- 10: - Specification Reserved
- 11: - Specification Reserved
- BIOS Major Revision 4
- BIOS Minor Revision 6
- EC Firmware Major Revision 255
- EC Firmware Minor Revision 255
- [System Information (Type 1) - Length 27 - Handle 0001h]
- Manufacturer MSI
- Product Name MS-7693
- Version 4.0
- UUID 00000000-0000-0000-0000-000000000000
- Wakeup Type Power Switch
- [BaseBoard Information (Type 2) - Length 15 - Handle 0002h]
- Manufacturer MSI
- Product 970 GAMING (MS-7693)
- Version 4.0
- Feature Flags 09h
- 1665933832: - ?ÿU?ì?ì¡H._c3Å?Eü3ÀW?}?Eô?Eø?ÿu
- ¸@
- 1665933872: - ?ÿU?ì?ì¡H._c3Å?Eü3ÀW?}?Eô?Eø?ÿu
- ¸@
- Chassis Handle 0003h
- Board Type 0ah - Processor/Memory Module
- Number of Child Handles 0
- [System Enclosure (Type 3) - Length 25 - Handle 0003h]
- Manufacturer MSI
- Chassis Type Desktop
- Version 4.0
- Bootup State Safe
- Power Supply State Safe
- Thermal State Safe
- Security Status None
- OEM Defined 0
- Height 0U
- Number of Power Cords 1
- Number of Contained Elements 1
- Contained Element Size 3
- [Processor Information (Type 4) - Length 42 - Handle 0004h]
- Socket Designation CPU 1
- Processor Type Central Processor
- Processor Family 3fh - Specification Reserved
- Processor Manufacturer AMD
- Processor ID 200f6000fffb8b17
- Processor Version AMD FX(tm)-8350 Eight-Core Processor
- Processor Voltage 8eh - 1.4V
- External Clock 200MHz
- Max Speed 4000MHz
- Current Speed 4000MHz
- Status Enabled Populated
- Processor Upgrade Specification Reserved
- L1 Cache Handle 0005h
- L2 Cache Handle 0006h
- L3 Cache Handle 0007h
- [Cache Information (Type 7) - Length 19 - Handle 0005h]
- Socket Designation L1-Cache
- Cache Configuration 0180h - WB Enabled Int NonSocketed L1
- Maximum Cache Size 0180h - 384K
- Installed Size 0180h - 384K
- Supported SRAM Type 0010h - Pipeline-Burst
- Current SRAM Type 0010h - Pipeline-Burst
- Cache Speed 1ns
- Error Correction Type Specification Reserved
- System Cache Type Unified
- Associativity 2-way Set-Associative
- [Cache Information (Type 7) - Length 19 - Handle 0006h]
- Socket Designation L2-Cache
- Cache Configuration 0181h - WB Enabled Int NonSocketed L2
- Maximum Cache Size 2000h - 8192K
- Installed Size 2000h - 8192K
- Supported SRAM Type 0010h - Pipeline-Burst
- Current SRAM Type 0010h - Pipeline-Burst
- Cache Speed 1ns
- Error Correction Type Specification Reserved
- System Cache Type Unified
- Associativity 16-way Set-Associative
- [Cache Information (Type 7) - Length 19 - Handle 0007h]
- Socket Designation L3-Cache
- Cache Configuration 0182h - WB Enabled Int NonSocketed L3
- Maximum Cache Size 2000h - 8192K
- Installed Size 2000h - 8192K
- Supported SRAM Type 0010h - Pipeline-Burst
- Current SRAM Type 0010h - Pipeline-Burst
- Cache Speed 1ns
- Error Correction Type Specification Reserved
- System Cache Type Unified
- Associativity Specification Reserved
- [OEM Strings (Type 11) - Length 5 - Handle 0025h]
- Number of Strings 1
- [System Configuration Options (Type 12) - Length 5 - Handle 0026h]
- [Physical Memory Array (Type 16) - Length 23 - Handle 0027h]
- Location 03h - SystemBoard/Motherboard
- Use 03h - System Memory
- Memory Error Correction 03h - None
- Maximum Capacity 33554432KB
- Number of Memory Devices 4
- [Memory Array Mapped Address (Type 19) - Length 31 - Handle 0028h]
- Starting Address 00000000h
- Ending Address 00ffffffh
- Memory Array Handle 0027h
- Partition Width 255
- [Memory Device (Type 17) - Length 40 - Handle 0029h]
- Physical Memory Array Handle 0027h
- Total Width 64 bits
- Data Width 64 bits
- Size 8192MB
- Form Factor 09h - DIMM
- Device Locator A1_DIMM0
- Bank Locator A1_BANK0
- Memory Type 18h - Specification Reserved
- Type Detail 4080h - Synchronous
- Speed 800MHz
- Manufacturer Kingston
- Part Number KHX1600C10D3/8G
- [Memory Device Mapped Address (Type 20) - Length 35 - Handle 002ah]
- Starting Address 00000000h
- Ending Address 0000003fh
- Memory Device Handle 0029h
- Mem Array Mapped Adr Handle 0028h
- [Memory Device (Type 17) - Length 40 - Handle 002bh]
- Physical Memory Array Handle 0027h
- Total Width 64 bits
- Data Width 64 bits
- Size 8192MB
- Form Factor 09h - DIMM
- Device Locator A1_DIMM1
- Bank Locator A1_BANK1
- Memory Type 18h - Specification Reserved
- Type Detail 4080h - Synchronous
- Speed 800MHz
- Manufacturer Kingston
- Part Number KHX1600C10D3/8G
- [Memory Device Mapped Address (Type 20) - Length 35 - Handle 002ch]
- Starting Address 00000000h
- Ending Address 0000003fh
- Memory Device Handle 002bh
- Mem Array Mapped Adr Handle 0028h
- [Memory Device (Type 17) - Length 40 - Handle 002dh]
- Physical Memory Array Handle 0027h
- Total Width 0 bits
- Data Width 64 bits
- Form Factor 09h - DIMM
- Device Locator A1_DIMM2
- Bank Locator A1_BANK2
- Memory Type 02h - Unknown
- Type Detail 0080h - Synchronous
- Speed 0MHz
- Manufacturer A1_Manufacturer2
- Part Number Array1_PartNumber2
- [Memory Device (Type 17) - Length 40 - Handle 002fh]
- Physical Memory Array Handle 0027h
- Total Width 0 bits
- Data Width 64 bits
- Form Factor 09h - DIMM
- Device Locator A1_DIMM3
- Bank Locator A1_BANK3
- Memory Type 02h - Unknown
- Type Detail 0080h - Synchronous
- Speed 0MHz
- Manufacturer A1_Manufacturer3
- Part Number Array1_PartNumber3
- ========================================================================
- =================== Dump File: 072617-6796-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 14393 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 14393.1480.amd64fre.rs1_release.170706-2004
- Kernel base = 0xfffff803`3b817000 PsLoadedModuleList = 0xfffff803`3bb16040
- Debug session time: Wed Jul 26 01:56:06.170 2017 (UTC - 4:00)
- System Uptime: 0 days 0:22:53.926
- BugCheck 3B, {c0000005, fffff8033b84acc2, ffff9c80739f9d70, 0}
- Probably caused by : win32kfull.sys ( win32kfull!TimersProc+284 )
- Followup: MachineOwner
- SYSTEM_SERVICE_EXCEPTION (3b)
- An exception happened while executing a system service routine.
- Arguments:
- Arg1: 00000000c0000005, Exception code that caused the bugcheck
- Arg2: fffff8033b84acc2, Address of the instruction which caused the bugcheck
- Arg3: ffff9c80739f9d70, Address of the context record for the exception that caused the bugcheck
- Arg4: 0000000000000000, zero.
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
- SYSTEM_MANUFACTURER: MSI
- SYSTEM_PRODUCT_NAME: MS-7693
- SYSTEM_VERSION: 4.0
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: V22.4
- BIOS_DATE: 12/21/2015
- BASEBOARD_MANUFACTURER: MSI
- BASEBOARD_PRODUCT: 970 GAMING (MS-7693)
- BASEBOARD_VERSION: 4.0
- DUMP_TYPE: 2
- EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- FAULTING_IP:
- nt!KeSetEvent+12
- fffff803`3b84acc2 f6017f test byte ptr [rcx],7Fh
- CONTEXT: ffff9c80739f9d70 -- (.cxr 0xffff9c80739f9d70)
- rax=fffff34a8088c140 rbx=fffff34a8273c290 rcx=fffb868b7a0d9720
- rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000200
- rip=fffff8033b84acc2 rsp=ffff9c80739fa770 rbp=0000000000000000
- r8=0000000000000000 r9=0000000000000004 r10=0000000000000000
- r11=ffff9c80739fa7e0 r12=000000000014f6e1 r13=fffff78000000320
- r14=0000000000000010 r15=0000000000000010
- iopl=0 nv up ei pl zr na po nc
- cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00210246
- nt!KeSetEvent+0x12:
- fffff803`3b84acc2 f6017f test byte ptr [rcx],7Fh ds:002b:fffb868b`7a0d9720=??
- Resetting default scope
- CPU_COUNT: 8
- CPU_MHZ: fa0
- CPU_VENDOR: AuthenticAMD
- CPU_FAMILY: 15
- CPU_MODEL: 2
- CPU_STEPPING: 0
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- BUGCHECK_STR: 0x3B
- PROCESS_NAME: csrss.exe
- CURRENT_IRQL: 0
- LAST_CONTROL_TRANSFER: from fffff321de6a8cc4 to fffff8033b84acc2
- STACK_TEXT:
- ffff9c80`739fa770 fffff321`de6a8cc4 : 00000000`00000001 fffff803`3b88744b 00000000`00000002 00000000`00000009 : nt!KeSetEvent+0x12
- ffff9c80`739fa800 fffff321`de6a88c3 : 00000000`00000001 ffff9c80`739fa980 00000000`00000001 00000000`0000000d : win32kfull!TimersProc+0x284
- ffff9c80`739fa880 fffff321`df0f309a : 00000000`00000004 00000000`00000004 00000000`00000000 00000000`00000020 : win32kfull!RawInputThread+0x1323
- ffff9c80`739faa90 fffff321`de6aaf0f : 00000000`00000002 ffff9c80`746b2e10 00000000`00000004 00000000`00000000 : win32kbase!xxxCreateSystemThreads+0x12a
- ffff9c80`739faad0 fffff803`3b971693 : ffff868b`78ac7080 00000000`00000004 000001d0`95709b98 000001d0`95704090 : win32kfull!NtUserCallNoParam+0x2f
- ffff9c80`739fab00 00007ffd`6b141144 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
- 0000002e`6fe7fe48 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`6b141144
- THREAD_SHA1_HASH_MOD_FUNC: f6501adb690e9debb187f301e9fc82f93c742e90
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 1bf346fe917eac473700bcb90e38097256af3b31
- THREAD_SHA1_HASH_MOD: 96fd029d160db6533056a875ce32dfd8f7debb09
- FOLLOWUP_IP:
- win32kfull!TimersProc+284
- fffff321`de6a8cc4 e945feffff jmp win32kfull!TimersProc+0xce (fffff321`de6a8b0e)
- FAULT_INSTR_CODE: fffe45e9
- SYMBOL_STACK_INDEX: 1
- SYMBOL_NAME: win32kfull!TimersProc+284
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: win32kfull
- IMAGE_NAME: win32kfull.sys
- DEBUG_FLR_IMAGE_TIMESTAMP: 595f2913
- IMAGE_VERSION: 10.0.14393.1480
- STACK_COMMAND: .cxr 0xffff9c80739f9d70 ; kb
- BUCKET_ID_FUNC_OFFSET: 284
- FAILURE_BUCKET_ID: 0x3B_win32kfull!TimersProc
- BUCKET_ID: 0x3B_win32kfull!TimersProc
- PRIMARY_PROBLEM_CLASS: 0x3B_win32kfull!TimersProc
- TARGET_TIME: 2017-07-26T05:56:06.000Z
- OSBUILD: 14393
- OSSERVICEPACK: 1480
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
- BUILDDATESTAMP_STR: 170706-2004
- BUILDLAB_STR: rs1_release
- BUILDOSVER_STR: 10.0.14393.1480
- ANALYSIS_SESSION_ELAPSED_TIME: 1e554
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:0x3b_win32kfull!timersproc
- FAILURE_ID_HASH: {99e9ad21-9939-f2bd-dcc1-a25f9cb25caa}
- Followup: MachineOwner
- ========================================================================
- =================== Dump File: 072617-6968-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 14393 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 14393.1480.amd64fre.rs1_release.170706-2004
- Kernel base = 0xfffff802`86475000 PsLoadedModuleList = 0xfffff802`86774040
- Debug session time: Wed Jul 26 01:32:30.194 2017 (UTC - 4:00)
- System Uptime: 0 days 0:02:24.951
- BugCheck 1000007E, {ffffffffc0000005, fffff80240e4d5c1, ffff918193fa27f8, ffff918193fa2030}
- *** WARNING: Unable to verify timestamp for win32k.sys
- *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
- Probably caused by : dxgmms2.sys ( dxgmms2!VIDMM_GLOBAL::DestroyOneAllocation+191 )
- Followup: MachineOwner
- SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
- This is a very common bugcheck. Usually the exception address pinpoints
- the driver/function that caused the problem. Always note this address
- as well as the link date of the driver/image that contains this address.
- Some common problems are exception code 0x80000003. This means a hard
- coded breakpoint or assertion was hit, but this system was booted
- /NODEBUG. This is not supposed to happen as developers should never have
- hardcoded breakpoints in retail code, but ...
- If this happens, make sure a debugger gets connected, and the
- system is booted /DEBUG. This will let us see why this breakpoint is
- happening.
- Arguments:
- Arg1: ffffffffc0000005, The exception code that was not handled
- Arg2: fffff80240e4d5c1, The address that the exception occurred at
- Arg3: ffff918193fa27f8, Exception Record Address
- Arg4: ffff918193fa2030, Context Record Address
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
- SYSTEM_MANUFACTURER: MSI
- SYSTEM_PRODUCT_NAME: MS-7693
- SYSTEM_VERSION: 4.0
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: V22.4
- BIOS_DATE: 12/21/2015
- BASEBOARD_MANUFACTURER: MSI
- BASEBOARD_PRODUCT: 970 GAMING (MS-7693)
- BASEBOARD_VERSION: 4.0
- DUMP_TYPE: 2
- EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- FAULTING_IP:
- dxgmms2!VIDMM_GLOBAL::DestroyOneAllocation+191
- fffff802`40e4d5c1 f00fc106 lock xadd dword ptr [rsi],eax
- EXCEPTION_RECORD: ffff918193fa27f8 -- (.exr 0xffff918193fa27f8)
- ExceptionAddress: fffff80240e4d5c1 (dxgmms2!VIDMM_GLOBAL::DestroyOneAllocation+0x0000000000000191)
- ExceptionCode: c0000005 (Access violation)
- ExceptionFlags: 00000000
- NumberParameters: 2
- Parameter[0]: 0000000000000000
- Parameter[1]: ffffffffffffffff
- Attempt to read from address ffffffffffffffff
- CONTEXT: ffff918193fa2030 -- (.cxr 0xffff918193fa2030)
- rax=00000000ffffffff rbx=ffffa6802fea02a0 rcx=ffffa6802fea02a0
- rdx=ffffa6802fea00e0 rsi=fffba6802e58d220 rdi=ffffcb0286a4be00
- rip=fffff80240e4d5c1 rsp=ffff918193fa2a30 rbp=0000000000000000
- r8=ffffa6802fea00e0 r9=fffff80286475000 r10=ffff918192e17b20
- r11=ffffa6802fea02a0 r12=0000000000000000 r13=0000000000000000
- r14=000000008bd1e000 r15=000000000000003f
- iopl=0 nv up ei ng nz na po nc
- cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
- dxgmms2!VIDMM_GLOBAL::DestroyOneAllocation+0x191:
- fffff802`40e4d5c1 f00fc106 lock xadd dword ptr [rsi],eax ds:002b:fffba680`2e58d220=????????
- Resetting default scope
- CPU_COUNT: 8
- CPU_MHZ: fa0
- CPU_VENDOR: AuthenticAMD
- CPU_FAMILY: 15
- CPU_MODEL: 2
- CPU_STEPPING: 0
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- PROCESS_NAME: System
- CURRENT_IRQL: 0
- ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- EXCEPTION_CODE_STR: c0000005
- EXCEPTION_PARAMETER1: 0000000000000000
- EXCEPTION_PARAMETER2: ffffffffffffffff
- FOLLOWUP_IP:
- dxgmms2!VIDMM_GLOBAL::DestroyOneAllocation+191
- fffff802`40e4d5c1 f00fc106 lock xadd dword ptr [rsi],eax
- READ_ADDRESS: fffff80286815338: Unable to get MiVisibleState
- ffffffffffffffff
- BUGCHECK_STR: AV
- LAST_CONTROL_TRANSFER: from fffff80240e3dd81 to fffff80240e4d5c1
- STACK_TEXT:
- ffff9181`93fa2a30 fffff802`40e3dd81 : ffffa680`2cbbb000 ffffa680`00000000 00000000`00000000 00000000`00000001 : dxgmms2!VIDMM_GLOBAL::DestroyOneAllocation+0x191
- ffff9181`93fa2c60 fffff802`40e41d64 : 00000000`00000510 ffffcb02`00000004 00000000`0008be00 ffffef80`00000000 : dxgmms2!VIDMM_PAGE_TABLE::DestroyPageTable+0x8d
- ffff9181`93fa2cf0 fffff802`40e3e644 : ffffcb02`81f63f60 ffffcb02`8140e670 ffff9181`93fa2f60 00000000`00000000 : dxgmms2!VIDMM_PAGE_DIRECTORY::CommitVirtualAddressRange+0x1284
- ffff9181`93fa2ed0 fffff802`40e446b5 : ffffcb02`8706d009 000f0000`00000000 00000000`00000000 00000000`00000000 : dxgmms2!CVirtualAddressAllocator::UncommitVirtualAddressRange+0x104
- ffff9181`93fa3000 fffff802`40e447df : ffffa680`2bfe7e20 ffffcb02`86bfaa00 ffffcb02`86bd2338 fffff802`40df1e38 : dxgmms2!VIDMM_GLOBAL::MakeOneVirtualAddressRangeNotResident+0x169
- ffff9181`93fa3490 fffff802`40e35253 : 00000000`00000000 ffff9181`93fa3580 00000000`00000000 ffffcb02`86bfaa00 : dxgmms2!VIDMM_GLOBAL::MakeVirtualAddressRangeNotResident+0xbf
- ffff9181`93fa34f0 fffff802`40e4a671 : ffffa680`2cbbb000 ffffa680`307c3d20 00000000`ffffffff ffffa680`2cbbb000 : dxgmms2!VIDMM_MEMORY_SEGMENT::EvictResource+0x3e3
- ffff9181`93fa36f0 fffff802`40e5e5d5 : ffffa680`2cbbb000 00000000`00000001 ffffa680`2cbc4bd8 ffffa680`307c3d20 : dxgmms2!VIDMM_GLOBAL::ProcessDeferredCommand+0x2e1
- ffff9181`93fa3960 fffff802`8652b965 : ffff9181`92e17180 ffffa680`2cb3c800 fffff802`40e5d720 ffffcb02`6c26e7d0 : dxgmms2!VIDMM_WORKER_THREAD::Run+0xea5
- ffff9181`93fa3c10 fffff802`865c9e26 : ffff9181`92e17180 ffffa680`2cb3c800 fffff802`8652b924 eea91066`8004d859 : nt!PspSystemThreadStartup+0x41
- ffff9181`93fa3c60 00000000`00000000 : ffff9181`93fa4000 ffff9181`93f9e000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
- THREAD_SHA1_HASH_MOD_FUNC: fda33f86c563565ec3bdf260255934e689806d47
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: ec6dded717c2d9487b16d5fd31ac637dddb9e67d
- THREAD_SHA1_HASH_MOD: 6ec3af4337961d3332e041e86f509d8cef317437
- FAULT_INSTR_CODE: 6c10ff0
- SYMBOL_STACK_INDEX: 0
- SYMBOL_NAME: dxgmms2!VIDMM_GLOBAL::DestroyOneAllocation+191
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: dxgmms2
- IMAGE_NAME: dxgmms2.sys
- DEBUG_FLR_IMAGE_TIMESTAMP: 58ba5e7e
- IMAGE_VERSION: 10.0.14393.953
- STACK_COMMAND: .cxr 0xffff918193fa2030 ; kb
- BUCKET_ID_FUNC_OFFSET: 191
- FAILURE_BUCKET_ID: AV_dxgmms2!VIDMM_GLOBAL::DestroyOneAllocation
- BUCKET_ID: AV_dxgmms2!VIDMM_GLOBAL::DestroyOneAllocation
- PRIMARY_PROBLEM_CLASS: AV_dxgmms2!VIDMM_GLOBAL::DestroyOneAllocation
- TARGET_TIME: 2017-07-26T05:32:30.000Z
- OSBUILD: 14393
- OSSERVICEPACK: 1480
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
- BUILDDATESTAMP_STR: 170706-2004
- BUILDLAB_STR: rs1_release
- BUILDOSVER_STR: 10.0.14393.1480
- ANALYSIS_SESSION_ELAPSED_TIME: 1d425
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:av_dxgmms2!vidmm_global::destroyoneallocation
- FAILURE_ID_HASH: {4e73fa52-c790-a648-4bd4-084a2b509fd0}
- Followup: MachineOwner
- ========================================================================
- =================== Dump File: 072617-7406-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 14393 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 14393.1480.amd64fre.rs1_release.170706-2004
- Kernel base = 0xfffff802`8368f000 PsLoadedModuleList = 0xfffff802`8398e040
- Debug session time: Wed Jul 26 14:06:48.725 2017 (UTC - 4:00)
- System Uptime: 0 days 4:26:30.482
- BugCheck 3B, {c0000005, fffff8019c5b2680, ffffae0041e45e60, 0}
- *** WARNING: Unable to verify timestamp for cdd.dll
- *** ERROR: Module load completed but symbols could not be loaded for cdd.dll
- *** WARNING: Unable to verify timestamp for win32k.sys
- *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
- Probably caused by : memory_corruption
- Followup: memory_corruption
- SYSTEM_SERVICE_EXCEPTION (3b)
- An exception happened while executing a system service routine.
- Arguments:
- Arg1: 00000000c0000005, Exception code that caused the bugcheck
- Arg2: fffff8019c5b2680, Address of the instruction which caused the bugcheck
- Arg3: ffffae0041e45e60, Address of the context record for the exception that caused the bugcheck
- Arg4: 0000000000000000, zero.
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
- SYSTEM_MANUFACTURER: MSI
- SYSTEM_PRODUCT_NAME: MS-7693
- SYSTEM_VERSION: 4.0
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: V22.4
- BIOS_DATE: 12/21/2015
- BASEBOARD_MANUFACTURER: MSI
- BASEBOARD_PRODUCT: 970 GAMING (MS-7693)
- BASEBOARD_VERSION: 4.0
- DUMP_TYPE: 2
- EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- FAULTING_IP:
- dxgkrnl!memset+c0
- fffff801`9c5b2680 488911 mov qword ptr [rcx],rdx
- CONTEXT: ffffae0041e45e60 -- (.cxr 0xffffae0041e45e60)
- rax=fffbdb0e62ef3000 rbx=ffff80097c36c400 rcx=fffbdb0e62ef3000
- rdx=0000000000000000 rsi=ffff9b9940096401 rdi=ffff80097dbe2010
- rip=fffff8019c5b2680 rsp=ffffae0041e46868 rbp=ffffae0041e469a0
- r8=0000000000010000 r9=0000000000000000 r10=0000000000000400
- r11=7ffffffffffffffc r12=ffffae0041e46ae0 r13=ffffdb0e61ed00c0
- r14=ffff80097c36c400 r15=ffff80097dbe2010
- iopl=0 nv up ei pl zr na po nc
- cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
- dxgkrnl!memset+0xc0:
- fffff801`9c5b2680 488911 mov qword ptr [rcx],rdx ds:002b:fffbdb0e`62ef3000=????????????????
- Resetting default scope
- CPU_COUNT: 8
- CPU_MHZ: fa0
- CPU_VENDOR: AuthenticAMD
- CPU_FAMILY: 15
- CPU_MODEL: 2
- CPU_STEPPING: 0
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- BUGCHECK_STR: 0x3B
- PROCESS_NAME: TslGame.exe
- CURRENT_IRQL: 0
- LAST_CONTROL_TRANSFER: from fffff8019c62f7b0 to fffff8019c5b2680
- STACK_TEXT:
- ffffae00`41e46868 fffff801`9c62f7b0 : 00000000`00000209 ffffae00`00000209 ffff8009`7c36c400 00000000`00000001 : dxgkrnl!memset+0xc0
- ffffae00`41e46870 fffff801`9c62fd1c : ffff8009`7c36c6d0 ffff9b99`40096458 ffffae00`00000209 00000000`00000000 : dxgkrnl!DISPLAY_SOURCE::GetClippedCursor+0x64
- ffffae00`41e468a0 fffff801`9c62fa64 : 00000000`00000000 00000000`00000000 00000020`00000020 ffffc2a3`0fd66e2e : dxgkrnl!DxgkSetPointerShape+0x29c
- ffffae00`41e46a60 ffff9bca`24f7dc8e : ffff9b99`40096448 ffffae00`41e46b00 ffff9b99`423c0018 ffffae00`41e46b00 : dxgkrnl!DxgkCddSetPointerShape+0x54
- ffffae00`41e46aa0 ffff9b99`40096448 : ffffae00`41e46b00 ffff9b99`423c0018 ffffae00`41e46b00 ffff9b99`00000020 : cdd+0xdc8e
- ffffae00`41e46aa8 ffffae00`41e46b00 : ffff9b99`423c0018 ffffae00`41e46b00 ffff9b99`00000020 ffff9bca`00000000 : 0xffff9b99`40096448
- ffffae00`41e46ab0 ffff9b99`423c0018 : ffffae00`41e46b00 ffff9b99`00000020 ffff9bca`00000000 00000000`000806e7 : 0xffffae00`41e46b00
- ffffae00`41e46ab8 ffffae00`41e46b00 : ffff9b99`00000020 ffff9bca`00000000 00000000`000806e7 00000000`00000001 : 0xffff9b99`423c0018
- ffffae00`41e46ac0 ffff9b99`00000020 : ffff9bca`00000000 00000000`000806e7 00000000`00000001 00000000`00000001 : 0xffffae00`41e46b00
- ffffae00`41e46ac8 ffff9bca`00000000 : 00000000`000806e7 00000000`00000001 00000000`00000001 00000000`00000000 : 0xffff9b99`00000020
- ffffae00`41e46ad0 00000000`000806e7 : 00000000`00000001 00000000`00000001 00000000`00000000 ffffc2a3`0fd66ebe : 0xffff9bca`00000000
- ffffae00`41e46ad8 00000000`00000001 : 00000000`00000001 00000000`00000000 ffffc2a3`0fd66ebe 00000000`00000030 : 0x806e7
- ffffae00`41e46ae0 00000000`00000001 : 00000000`00000000 ffffc2a3`0fd66ebe 00000000`00000030 00000000`00000000 : 0x1
- ffffae00`41e46ae8 00000000`00000000 : ffffc2a3`0fd66ebe 00000000`00000030 00000000`00000000 00000000`00000000 : 0x1
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff80283709db0-fffff80283709db2 3 bytes - nt!MiReleaseSystemCacheView+168
- [ 40 fb f6:80 48 91 ]
- fffff8028372b86e-fffff8028372b86f 2 bytes - nt!MmCreateKernelStack+13e (+0x21abe)
- [ 80 f6:00 91 ]
- fffff8028372b8bf - nt!MmCreateKernelStack+18f (+0x51)
- [ fa:95 ]
- fffff802838d7387-fffff802838d7389 3 bytes - nt!ExFreePoolWithTag+387
- [ 40 fb f6:80 48 91 ]
- 9 errors : !nt (fffff80283709db0-fffff802838d7389)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- STACK_COMMAND: .cxr 0xffffae0041e45e60 ; kb
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-07-26T18:06:48.000Z
- OSBUILD: 14393
- OSSERVICEPACK: 1480
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
- BUILDDATESTAMP_STR: 170706-2004
- BUILDLAB_STR: rs1_release
- BUILDOSVER_STR: 10.0.14393.1480
- ANALYSIS_SESSION_ELAPSED_TIME: 134fb
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- ========================================================================
- =================== Dump File: 072617-8484-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 14393 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 14393.1480.amd64fre.rs1_release.170706-2004
- Kernel base = 0xfffff803`64484000 PsLoadedModuleList = 0xfffff803`64783040
- Debug session time: Wed Jul 26 14:43:57.544 2017 (UTC - 4:00)
- System Uptime: 0 days 0:34:39.300
- BugCheck 139, {3, fffff803663877f0, fffff80366387748, 0}
- Probably caused by : ntkrnlmp.exe ( nt!KiFastFailDispatch+d0 )
- Followup: MachineOwner
- KERNEL_SECURITY_CHECK_FAILURE (139)
- A kernel component has corrupted a critical data structure. The corruption
- could potentially allow a malicious user to gain control of this machine.
- Arguments:
- Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
- Arg2: fffff803663877f0, Address of the trap frame for the exception that caused the bugcheck
- Arg3: fffff80366387748, Address of the exception record for the exception that caused the bugcheck
- Arg4: 0000000000000000, Reserved
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
- SYSTEM_MANUFACTURER: MSI
- SYSTEM_PRODUCT_NAME: MS-7693
- SYSTEM_VERSION: 4.0
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: V22.4
- BIOS_DATE: 12/21/2015
- BASEBOARD_MANUFACTURER: MSI
- BASEBOARD_PRODUCT: 970 GAMING (MS-7693)
- BASEBOARD_VERSION: 4.0
- DUMP_TYPE: 2
- TRAP_FRAME: fffff803663877f0 -- (.trap 0xfffff803663877f0)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=ffff820995aae908 rbx=0000000000000000 rcx=0000000000000003
- rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff8036461128b rsp=fffff80366387980 rbp=fffff803647c0180
- r8=0000000000000000 r9=0000000000000002 r10=00000004d75c24c8
- r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei ng nz na po cy
- nt!KiProcessThreadWaitList+0xbccbb:
- fffff803`6461128b cd29 int 29h
- Resetting default scope
- EXCEPTION_RECORD: fffff80366387748 -- (.exr 0xfffff80366387748)
- ExceptionAddress: fffff8036461128b (nt!KiProcessThreadWaitList+0x00000000000bccbb)
- ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
- ExceptionFlags: 00000001
- NumberParameters: 1
- Parameter[0]: 0000000000000003
- Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
- CPU_COUNT: 8
- CPU_MHZ: fa0
- CPU_VENDOR: AuthenticAMD
- CPU_FAMILY: 15
- CPU_MODEL: 2
- CPU_STEPPING: 0
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: LIST_ENTRY_CORRUPT
- BUGCHECK_STR: 0x139
- PROCESS_NAME: System
- CURRENT_IRQL: 2
- ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
- EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
- EXCEPTION_CODE_STR: c0000409
- EXCEPTION_PARAMETER1: 0000000000000003
- LAST_CONTROL_TRANSFER: from fffff803645deb29 to fffff803645d3960
- STACK_TEXT:
- fffff803`663874c8 fffff803`645deb29 : 00000000`00000139 00000000`00000003 fffff803`663877f0 fffff803`66387748 : nt!KeBugCheckEx
- fffff803`663874d0 fffff803`645dee90 : 00000000`00000002 00000000`00000000 00000003`00000030 ffff8209`0000000a : nt!KiBugCheckDispatch+0x69
- fffff803`66387610 fffff803`645dde73 : 00000000`00000000 fffff803`644a62e1 ffff1132`0188e9b4 fffff803`647c5ec8 : nt!KiFastFailDispatch+0xd0
- fffff803`663877f0 fffff803`6461128b : 00000000`00000000 fffff803`66387b60 fffff803`66387b58 fffff780`00000000 : nt!KiRaiseSecurityCheckFailure+0xf3
- fffff803`66387980 fffff803`644ba484 : ffff8209`00000000 ffff8209`95969740 00000000`00140001 00000000`00000002 : nt!KiProcessThreadWaitList+0xbccbb
- fffff803`663879e0 fffff803`645d69ea : 00000000`00000000 fffff803`647c0180 fffff803`6483a940 ffff8209`97d3f800 : nt!KiRetireDpcList+0x824
- fffff803`66387c60 00000000`00000000 : fffff803`66388000 fffff803`66382000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
- STACK_COMMAND: kb
- THREAD_SHA1_HASH_MOD_FUNC: 729d659528af1886126097481f222c34a5e10b7f
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 26cbf75db59cb4a805308e5df24b2a209e5226dd
- THREAD_SHA1_HASH_MOD: 30a3e915496deaace47137d5b90c3ecc03746bf6
- FOLLOWUP_IP:
- nt!KiFastFailDispatch+d0
- fffff803`645dee90 c644242000 mov byte ptr [rsp+20h],0
- FAULT_INSTR_CODE: 202444c6
- SYMBOL_STACK_INDEX: 2
- SYMBOL_NAME: nt!KiFastFailDispatch+d0
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- DEBUG_FLR_IMAGE_TIMESTAMP: 595f2981
- IMAGE_VERSION: 10.0.14393.1480
- BUCKET_ID_FUNC_OFFSET: d0
- FAILURE_BUCKET_ID: 0x139_3_nt!KiFastFailDispatch
- BUCKET_ID: 0x139_3_nt!KiFastFailDispatch
- PRIMARY_PROBLEM_CLASS: 0x139_3_nt!KiFastFailDispatch
- TARGET_TIME: 2017-07-26T18:43:57.000Z
- OSBUILD: 14393
- OSSERVICEPACK: 1480
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
- BUILDDATESTAMP_STR: 170706-2004
- BUILDLAB_STR: rs1_release
- BUILDOSVER_STR: 10.0.14393.1480
- ANALYSIS_SESSION_ELAPSED_TIME: a1a
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:0x139_3_nt!kifastfaildispatch
- FAILURE_ID_HASH: {36173680-6f08-995f-065a-3d368c996911}
- Followup: MachineOwner
- ========================================================================
- =================== Dump File: 072617-9140-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 14393 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 14393.1480.amd64fre.rs1_release.170706-2004
- Kernel base = 0xfffff803`c4002000 PsLoadedModuleList = 0xfffff803`c4301040
- Debug session time: Wed Jul 26 01:29:26.467 2017 (UTC - 4:00)
- System Uptime: 0 days 0:05:33.224
- BugCheck 3B, {c0000005, fffff803c4036232, ffffd48036b59fb0, 0}
- Probably caused by : memory_corruption
- Followup: memory_corruption
- SYSTEM_SERVICE_EXCEPTION (3b)
- An exception happened while executing a system service routine.
- Arguments:
- Arg1: 00000000c0000005, Exception code that caused the bugcheck
- Arg2: fffff803c4036232, Address of the instruction which caused the bugcheck
- Arg3: ffffd48036b59fb0, Address of the context record for the exception that caused the bugcheck
- Arg4: 0000000000000000, zero.
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
- SYSTEM_MANUFACTURER: MSI
- SYSTEM_PRODUCT_NAME: MS-7693
- SYSTEM_VERSION: 4.0
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: V22.4
- BIOS_DATE: 12/21/2015
- BASEBOARD_MANUFACTURER: MSI
- BASEBOARD_PRODUCT: 970 GAMING (MS-7693)
- BASEBOARD_VERSION: 4.0
- DUMP_TYPE: 2
- EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- FAULTING_IP:
- nt!KiExitDispatcher+152
- fffff803`c4036232 f0410fba2c2407 lock bts dword ptr [r12],7
- CONTEXT: ffffd48036b59fb0 -- (.cxr 0xffffd48036b59fb0)
- rax=0000000000000004 rbx=ffff868fc5679500 rcx=ffff868fc07fbc58
- rdx=0000000000000000 rsi=ffff868fc0c05970 rdi=ffffd48030fc0180
- rip=fffff803c4036232 rsp=ffffd48036b5a9b0 rbp=0000000000000001
- r8=0000000000000001 r9=0000000000000001 r10=fffff803c4415e00
- r11=0000000000000000 r12=fffb868fc6740ee0 r13=ffff868fc0c059d0
- r14=0000000000000001 r15=ffff868fc0c05800
- iopl=0 nv up ei ng nz ac po cy
- cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010297
- nt!KiExitDispatcher+0x152:
- fffff803`c4036232 f0410fba2c2407 lock bts dword ptr [r12],7 ds:002b:fffb868f`c6740ee0=????????
- Resetting default scope
- CPU_COUNT: 8
- CPU_MHZ: fa0
- CPU_VENDOR: AuthenticAMD
- CPU_FAMILY: 15
- CPU_MODEL: 2
- CPU_STEPPING: 0
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- BUGCHECK_STR: 0x3B
- PROCESS_NAME: audiodg.exe
- CURRENT_IRQL: 2
- LAST_CONTROL_TRANSFER: from fffff803c4035dac to fffff803c4036232
- STACK_TEXT:
- ffffd480`36b5a9b0 fffff803`c4035dac : ffff868f`c56795b0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExitDispatcher+0x152
- ffffd480`36b5aa20 fffff803`c4415ee2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeSetEvent+0xfc
- ffffd480`36b5aab0 fffff803`c415c693 : ffff868f`c08b3080 00000000`00000001 00000000`00000000 ffff868f`c56795b0 : nt!NtSetEvent+0x92
- ffffd480`36b5ab00 00007ffb`89cd62a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
- 000000d2`e72ffce8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`89cd62a4
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff803c40549d1 - nt!MiCompletePrivateZeroFault+821
- [ fa:e7 ]
- fffff803c4054a94 - nt!MiCompletePrivateZeroFault+8e4 (+0xc3)
- [ fa:e7 ]
- fffff803c4054f21-fffff803c4054f22 2 bytes - nt!MiAllocateWsle+421 (+0x48d)
- [ 80 f6:00 81 ]
- fffff803c4060022-fffff803c4060023 2 bytes - nt!MiAgeWorkingSet+5a2 (+0xb101)
- [ ff f6:7f 81 ]
- fffff803c41152de - nt!MiPurgeZeroList+6e (+0xb52bc)
- [ fa:e7 ]
- 7 errors : !nt (fffff803c40549d1-fffff803c41152de)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- STACK_COMMAND: .cxr 0xffffd48036b59fb0 ; kb
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-07-26T05:29:26.000Z
- OSBUILD: 14393
- OSSERVICEPACK: 1480
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
- BUILDDATESTAMP_STR: 170706-2004
- BUILDLAB_STR: rs1_release
- BUILDOSVER_STR: 10.0.14393.1480
- ANALYSIS_SESSION_ELAPSED_TIME: 2ac1
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- ========================================================================
- =================== Dump File: 072617-9421-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 14393 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 14393.1480.amd64fre.rs1_release.170706-2004
- Kernel base = 0xfffff800`8de7e000 PsLoadedModuleList = 0xfffff800`8e17d040
- Debug session time: Wed Jul 26 01:23:07.396 2017 (UTC - 4:00)
- System Uptime: 3 days 19:03:20.153
- BugCheck A, {200000002, 2, 0, fffff8008deb472c}
- Probably caused by : Unknown_Image ( PAGE_NOT_ZERO )
- Followup: MachineOwner
- *** Memory manager detected 1 instance(s) of page corruption, target is likely to have memory corruption.
- IRQL_NOT_LESS_OR_EQUAL (a)
- An attempt was made to access a pageable (or completely invalid) address at an
- interrupt request level (IRQL) that is too high. This is usually
- caused by drivers using improper addresses.
- If a kernel debugger is available get the stack backtrace.
- Arguments:
- Arg1: 0000000200000002, memory referenced
- Arg2: 0000000000000002, IRQL
- Arg3: 0000000000000000, bitfield :
- bit 0 : value 0 = read operation, 1 = write operation
- bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
- Arg4: fffff8008deb472c, address which referenced memory
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
- SYSTEM_MANUFACTURER: MSI
- SYSTEM_PRODUCT_NAME: MS-7693
- SYSTEM_VERSION: 4.0
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: V22.4
- BIOS_DATE: 12/21/2015
- BASEBOARD_MANUFACTURER: MSI
- BASEBOARD_PRODUCT: 970 GAMING (MS-7693)
- BASEBOARD_VERSION: 4.0
- DUMP_TYPE: 2
- READ_ADDRESS: fffff8008e21e338: Unable to get MiVisibleState
- 0000000200000002
- CURRENT_IRQL: 2
- FAULTING_IP:
- nt!KiTimerWaitTest+9c
- fffff800`8deb472c 0fb74702 movzx eax,word ptr [rdi+2]
- CPU_COUNT: 8
- CPU_MHZ: fa0
- CPU_VENDOR: AuthenticAMD
- CPU_FAMILY: 15
- CPU_MODEL: 2
- CPU_STEPPING: 0
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: PAGE_NOT_ZERO_AV
- BUGCHECK_STR: AV
- PROCESS_NAME: System
- BAD_PAGES_DETECTED: 1
- TRAP_FRAME: fffff8008fced790 -- (.trap 0xfffff8008fced790)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=0000000000000004 rbx=0000000000000000 rcx=0000000000000005
- rdx=ffffb38086ae2610 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff8008deb472c rsp=fffff8008fced920 rbp=fffff8008e1ba180
- r8=0000000000000102 r9=0000000000bece07 r10=000002fb381dedfc
- r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl nz na pe nc
- nt!KiTimerWaitTest+0x9c:
- fffff800`8deb472c 0fb74702 movzx eax,word ptr [rdi+2] ds:00000000`00000002=????
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff8008dfd8b29 to fffff8008dfcd960
- STACK_TEXT:
- fffff800`8fced648 fffff800`8dfd8b29 : 00000000`0000000a 00000002`00000002 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
- fffff800`8fced650 fffff800`8dfd7107 : 00000000`00000000 fffff800`8e1bcf10 ffffb380`8c1b0640 fffff800`8dea1075 : nt!KiBugCheckDispatch+0x69
- fffff800`8fced790 fffff800`8deb472c : 00000000`000005d3 ffffb380`871632f0 00000000`00000001 ffffb380`87163708 : nt!KiPageFault+0x247
- fffff800`8fced920 fffff800`8deb41f8 : ffffb380`86ae2540 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiTimerWaitTest+0x9c
- fffff800`8fced9e0 fffff800`8dfd09ea : 00000000`00000000 fffff800`8e1ba180 fffff800`8e234940 ffffb380`8cddb080 : nt!KiRetireDpcList+0x598
- fffff800`8fcedc60 00000000`00000000 : fffff800`8fcee000 fffff800`8fce8000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
- STACK_COMMAND: kb
- THREAD_SHA1_HASH_MOD_FUNC: 8bf4c35a9afebf54fec0657a41fdb5214542f0a1
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 62508bb319c654d5e8ca741495a72286ebd2c4b0
- THREAD_SHA1_HASH_MOD: ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693
- SYMBOL_NAME: PAGE_NOT_ZERO
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: Unknown_Module
- IMAGE_NAME: Unknown_Image
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- BUCKET_ID: PAGE_NOT_ZERO_AV
- PRIMARY_PROBLEM_CLASS: PAGE_NOT_ZERO
- FAILURE_BUCKET_ID: PAGE_NOT_ZERO_AV
- TARGET_TIME: 2017-07-26T05:23:07.000Z
- OSBUILD: 14393
- OSSERVICEPACK: 1480
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
- BUILDDATESTAMP_STR: 170706-2004
- BUILDLAB_STR: rs1_release
- BUILDOSVER_STR: 10.0.14393.1480
- ANALYSIS_SESSION_ELAPSED_TIME: f0d
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:page_not_zero_av
- FAILURE_ID_HASH: {91fefd05-7a2b-5d37-e27f-7af624353ffc}
- Followup: MachineOwner
- *** Memory manager detected 1 instance(s) of page corruption, target is likely to have memory corruption.
- ========================================================================
- =================== Dump File: 072717-6218-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 14393 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 14393.1480.amd64fre.rs1_release.170706-2004
- Kernel base = 0xfffff803`90814000 PsLoadedModuleList = 0xfffff803`90b13040
- Debug session time: Thu Jul 27 11:53:06.107 2017 (UTC - 4:00)
- System Uptime: 0 days 0:07:25.864
- BugCheck 1E, {ffffffffc0000005, fffff803909694c7, 0, ffffffffffffffff}
- Probably caused by : memory_corruption
- Followup: memory_corruption
- KMODE_EXCEPTION_NOT_HANDLED (1e)
- This is a very common bugcheck. Usually the exception address pinpoints
- the driver/function that caused the problem. Always note this address
- as well as the link date of the driver/image that contains this address.
- Arguments:
- Arg1: ffffffffc0000005, The exception code that was not handled
- Arg2: fffff803909694c7, The address that the exception occurred at
- Arg3: 0000000000000000, Parameter 0 of the exception
- Arg4: ffffffffffffffff, Parameter 1 of the exception
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
- SYSTEM_MANUFACTURER: MSI
- SYSTEM_PRODUCT_NAME: MS-7693
- SYSTEM_VERSION: 4.0
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: V22.4
- BIOS_DATE: 12/21/2015
- BASEBOARD_MANUFACTURER: MSI
- BASEBOARD_PRODUCT: 970 GAMING (MS-7693)
- BASEBOARD_VERSION: 4.0
- DUMP_TYPE: 2
- READ_ADDRESS: fffff80390bb4338: Unable to get MiVisibleState
- ffffffffffffffff
- EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- FAULTING_IP:
- nt!ExpInterlockedPopEntrySListFault+0
- fffff803`909694c7 498b08 mov rcx,qword ptr [r8]
- EXCEPTION_PARAMETER2: ffffffffffffffff
- BUGCHECK_STR: 0x1E_c0000005_R
- CPU_COUNT: 8
- CPU_MHZ: fa0
- CPU_VENDOR: AuthenticAMD
- CPU_FAMILY: 15
- CPU_MODEL: 2
- CPU_STEPPING: 0
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- PROCESS_NAME: chrome.exe
- CURRENT_IRQL: 2
- EXCEPTION_RECORD: ffffe000623f6250 -- (.exr 0xffffe000623f6250)
- ExceptionAddress: 0000000000000000
- ExceptionCode: 00000000
- ExceptionFlags: 00000000
- NumberParameters: -1869164867
- Parameter[0]: fffff80390b32700
- Parameter[1]: fffff80390883887
- Parameter[2]: ffffa80000000000
- Parameter[3]: 00000000000406f8
- Parameter[4]: 0000000000000017
- Parameter[5]: 00001f80018685d4
- Parameter[6]: 00000000fb820004
- Parameter[7]: ffffa80000000a30
- Parameter[8]: fffba500020e6e90
- Parameter[9]: fffba500020e6e90
- Parameter[10]: 0000000000000000
- Parameter[11]: ffffa80000000a30
- Parameter[12]: fffff80390b32080
- Parameter[13]: 0000000000000009
- Parameter[14]: 0000000000000000
- TRAP_FRAME: 000000399a481000 -- (.trap 0x399a481000)
- Unable to read trap frame at 00000039`9a481000
- LAST_CONTROL_TRANSFER: from fffff803908bc270 to fffff80390963960
- STACK_TEXT:
- ffffe000`623f59c8 fffff803`908bc270 : 00000000`0000001e ffffffff`c0000005 fffff803`909694c7 00000000`00000000 : nt!KeBugCheckEx
- ffffe000`623f59d0 fffff803`9096ec0e : ffffe000`623f6250 ffffb580`1ccd2408 00000039`9a481000 ffffe000`623f69b0 : nt!KiDispatchException+0x220
- ffffe000`623f6090 fffff803`9096cebd : fffff803`90b32700 fffff803`90883887 ffffa800`00000000 00000000`000406f8 : nt!KiExceptionDispatch+0xce
- ffffe000`623f6270 fffff803`909694c7 : 00000000`00000003 fffff803`908685d4 00000000`00000000 00000000`00000001 : nt!KiGeneralProtectionFault+0xfd
- ffffe000`623f6400 fffff803`908685d4 : 00000000`00000000 00000000`00000001 ffffb580`e406d330 ffffe000`623f66f0 : nt!ExpInterlockedPopEntrySListFault
- ffffe000`623f6410 fffff803`908683c0 : fffff803`90b32080 ffffa500`00000003 ffffffff`00000002 00000000`00000002 : nt!MiGetFreeOrZeroPage+0x64
- ffffe000`623f64e0 fffff803`90867f8e : fffff803`90b32080 ffff8200`00000000 00000000`00000000 00000000`00000000 : nt!MiGetPage+0x80
- ffffe000`623f6560 fffff803`9086600d : ffff8200`b42fd080 ffffe000`5d39c180 ffffe000`623f67a0 fffff803`90b32080 : nt!MiGetPageChain+0x24e
- ffffe000`623f66a0 fffff803`9086570e : ffffdcbf`60a131a4 ffffe000`623f6b00 00000336`3c000018 ffff8200`b437f080 : nt!MiResolvePrivateZeroFault+0x46d
- ffffe000`623f67f0 fffff803`9086964f : ffff8200`b437f580 ffffb581`9b1e0000 ffffe000`623f6a68 ffff8200`b437f580 : nt!MiResolveDemandZeroFault+0x2fe
- ffffe000`623f6900 fffff803`9096cffc : ffff8200`b42fd080 00000000`000061a7 ffffe000`623f6ad8 ffff8200`b3d3d200 : nt!MmAccessFault+0x7cf
- ffffe000`623f6b00 00007ff8`b42bcc64 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x13c
- 000000d3`7f1fb5a0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`b42bcc64
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff8039083aaad-fffff8039083aaae 2 bytes - nt!MiDeletePteList+20d
- [ 80 fa:00 a5 ]
- fffff8039083aabb - nt!MiDeletePteList+21b (+0x0e)
- [ f6:b5 ]
- fffff80390866033-fffff80390866035 3 bytes - nt!MiResolvePrivateZeroFault+493 (+0x2b578)
- [ 40 fb f6:c0 da b5 ]
- fffff8039086605b-fffff8039086605c 2 bytes - nt!MiResolvePrivateZeroFault+4bb (+0x28)
- [ 80 fa:00 a5 ]
- fffff803908669d0-fffff803908669d1 2 bytes - nt!MiCompletePrivateZeroFault+820 (+0x975)
- [ 80 fa:00 a5 ]
- fffff80390866a93-fffff80390866a94 2 bytes - nt!MiCompletePrivateZeroFault+8e3 (+0xc3)
- [ 80 fa:00 a5 ]
- fffff80390867fb0-fffff80390867fb1 2 bytes - nt!MiGetPageChain+270 (+0x151d)
- [ 80 fa:00 a5 ]
- fffff803908683d7-fffff803908683d8 2 bytes - nt!MiGetPage+97 (+0x427)
- [ 80 fa:00 a5 ]
- fffff803908685ea-fffff803908685eb 2 bytes - nt!MiGetFreeOrZeroPage+7a (+0x213)
- [ 80 fa:00 a5 ]
- fffff8039086974e - nt!MmAccessFault+8ce (+0x1164)
- [ f6:b5 ]
- fffff80390882e12-fffff80390882e14 3 bytes - nt!MiPfnShareCountIsZero+192 (+0x196c4)
- [ 40 fb f6:c0 da b5 ]
- fffff80390882e37 - nt!MiPfnShareCountIsZero+1b7 (+0x25)
- [ f6:b5 ]
- fffff80390882e56-fffff80390882e57 2 bytes - nt!MiPfnShareCountIsZero+1d6 (+0x1f)
- [ a0 7d:60 ed ]
- fffff803909272dd-fffff803909272de 2 bytes - nt!MiPurgeZeroList+6d (+0xa4487)
- [ 80 fa:00 a5 ]
- 27 errors : !nt (fffff8039083aaad-fffff803909272de)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-07-27T15:53:06.000Z
- OSBUILD: 14393
- OSSERVICEPACK: 1480
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
- BUILDDATESTAMP_STR: 170706-2004
- BUILDLAB_STR: rs1_release
- BUILDOSVER_STR: 10.0.14393.1480
- ANALYSIS_SESSION_ELAPSED_TIME: 2ad7
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- ========================================================================
- =================== Dump File: 072717-9843-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 14393 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 14393.1480.amd64fre.rs1_release.170706-2004
- Kernel base = 0xfffff801`cf67f000 PsLoadedModuleList = 0xfffff801`cf97e040
- Debug session time: Thu Jul 27 11:59:50.375 2017 (UTC - 4:00)
- System Uptime: 0 days 0:06:03.131
- BugCheck 1000007E, {ffffffffc0000005, fffff801cf6dcae8, ffffb60010132208, ffffb60010131a40}
- Probably caused by : memory_corruption
- Followup: memory_corruption
- SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
- This is a very common bugcheck. Usually the exception address pinpoints
- the driver/function that caused the problem. Always note this address
- as well as the link date of the driver/image that contains this address.
- Some common problems are exception code 0x80000003. This means a hard
- coded breakpoint or assertion was hit, but this system was booted
- /NODEBUG. This is not supposed to happen as developers should never have
- hardcoded breakpoints in retail code, but ...
- If this happens, make sure a debugger gets connected, and the
- system is booted /DEBUG. This will let us see why this breakpoint is
- happening.
- Arguments:
- Arg1: ffffffffc0000005, The exception code that was not handled
- Arg2: fffff801cf6dcae8, The address that the exception occurred at
- Arg3: ffffb60010132208, Exception Record Address
- Arg4: ffffb60010131a40, Context Record Address
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
- SYSTEM_MANUFACTURER: MSI
- SYSTEM_PRODUCT_NAME: MS-7693
- SYSTEM_VERSION: 4.0
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: V22.4
- BIOS_DATE: 12/21/2015
- BASEBOARD_MANUFACTURER: MSI
- BASEBOARD_PRODUCT: 970 GAMING (MS-7693)
- BASEBOARD_VERSION: 4.0
- DUMP_TYPE: 2
- EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- FAULTING_IP:
- nt!MiAgeWorkingSet+68
- fffff801`cf6dcae8 488b4310 mov rax,qword ptr [rbx+10h]
- EXCEPTION_RECORD: ffffb60010132208 -- (.exr 0xffffb60010132208)
- ExceptionAddress: fffff801cf6dcae8 (nt!MiAgeWorkingSet+0x0000000000000068)
- ExceptionCode: c0000005 (Access violation)
- ExceptionFlags: 00000000
- NumberParameters: 2
- Parameter[0]: 0000000000000000
- Parameter[1]: ffffffffffffffff
- Attempt to read from address ffffffffffffffff
- CONTEXT: ffffb60010131a40 -- (.cxr 0xffffb60010131a40)
- rax=0000000000000000 rbx=fffb880010804310 rcx=ffffde8f95da3580
- rdx=0000000000000000 rsi=0000000000000000 rdi=ffffde8f95da3580
- rip=fffff801cf6dcae8 rsp=ffffb60010132440 rbp=ffffb600101324a0
- r8=0000000000000001 r9=0000000000000007 r10=0000000000000000
- r11=00000000000003ff r12=ffffb60010132a80 r13=fffb880010804170
- r14=ffffde8f95da3580 r15=0000000000000001
- iopl=0 nv up ei ng nz ac pe cy
- cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00210293
- nt!MiAgeWorkingSet+0x68:
- fffff801`cf6dcae8 488b4310 mov rax,qword ptr [rbx+10h] ds:002b:fffb8800`10804320=????????????????
- Resetting default scope
- CPU_COUNT: 8
- CPU_MHZ: fa0
- CPU_VENDOR: AuthenticAMD
- CPU_FAMILY: 15
- CPU_MODEL: 2
- CPU_STEPPING: 0
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- PROCESS_NAME: chrome.exe
- CURRENT_IRQL: 2
- ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- EXCEPTION_CODE_STR: c0000005
- EXCEPTION_PARAMETER1: 0000000000000000
- EXCEPTION_PARAMETER2: ffffffffffffffff
- FOLLOWUP_IP:
- nt!MiAgeWorkingSet+68
- fffff801`cf6dcae8 488b4310 mov rax,qword ptr [rbx+10h]
- READ_ADDRESS: fffff801cfa1f338: Unable to get MiVisibleState
- ffffffffffffffff
- BUGCHECK_STR: AV
- LAST_CONTROL_TRANSFER: from fffff801cf72415c to fffff801cf6dcae8
- STACK_TEXT:
- ffffb600`10132440 fffff801`cf72415c : 00000000`00000000 fffff801`cf691e44 00000000`00000000 00000000`00000000 : nt!MiAgeWorkingSet+0x68
- ffffb600`101327c0 fffff801`cf72384e : ffffb600`00000000 ffffb600`10132a80 00000000`00000000 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x49c
- ffffb600`10132890 fffff801`cf70b95b : fffff801`00000000 00000000`00000000 fffff801`cf99d080 ffffde8f`8f817240 : nt!MiProcessWorkingSets+0x1ee
- ffffb600`10132a60 fffff801`cf7af35d : 00000000`00000004 00000000`00000004 00000000`ffffffff 00000000`00000001 : nt!MiWorkingSetManager+0xa7
- ffffb600`10132b20 fffff801`cf735965 : ffffde8f`8f941040 00000000`00000080 fffff801`cf7af20c ff38244c`83382454 : nt!KeBalanceSetManager+0x151
- ffffb600`10132c10 fffff801`cf7d3e26 : ffffb600`10460180 ffffde8f`8f941040 fffff801`cf735924 0ff575ff`c783c803 : nt!PspSystemThreadStartup+0x41
- ffffb600`10132c60 00000000`00000000 : ffffb600`10133000 ffffb600`1012d000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff801cf6d8d86 - nt!MiGetNextPageTable+1a6
- [ f6:9c ]
- fffff801cf6d8db9 - nt!MiGetNextPageTable+1d9 (+0x33)
- [ f6:9c ]
- fffff801cf6dc036 - nt!MiDeleteVirtualAddresses+986 (+0x327d)
- [ f6:9c ]
- fffff801cf6dc04d - nt!MiDeleteVirtualAddresses+99d (+0x17)
- [ f6:9c ]
- fffff801cf6dc0be - nt!MiDeleteVirtualAddresses+a0e (+0x71)
- [ fa:80 ]
- fffff801cf6dc41b - nt!MiDeleteVirtualAddresses+d6b (+0x35d)
- [ fa:80 ]
- fffff801cf6dc5c9 - nt!MiDeleteVirtualAddresses+f19 (+0x1ae)
- [ f6:9c ]
- fffff801cf6dc86e - nt!MiTryLocateWsle+15e (+0x2a5)
- [ f6:9c ]
- fffff801cf6dce75 - nt!MiAgeWorkingSet+3f5 (+0x607)
- [ f6:9c ]
- fffff801cf6dce97 - nt!MiAgeWorkingSet+417 (+0x22)
- [ fa:80 ]
- fffff801cf6dcffa - nt!MiAgeWorkingSet+57a (+0x163)
- [ f6:9c ]
- fffff801cf70bbdf - nt!MiEmptyDecayClusterTimers+bf (+0x2ebe5)
- [ fa:80 ]
- fffff801cf7922de - nt!MiPurgeZeroList+6e (+0x866ff)
- [ fa:80 ]
- fffff801cf7af516 - nt!MiDeleteZeroThreadContext+5a (+0x1d238)
- [ fa:80 ]
- 14 errors : !nt (fffff801cf6d8d86-fffff801cf7af516)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- STACK_COMMAND: .cxr 0xffffb60010131a40 ; kb
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-07-27T15:59:50.000Z
- OSBUILD: 14393
- OSSERVICEPACK: 1480
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
- BUILDDATESTAMP_STR: 170706-2004
- BUILDLAB_STR: rs1_release
- BUILDOSVER_STR: 10.0.14393.1480
- ANALYSIS_SESSION_ELAPSED_TIME: 38a7
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- ========================================================================
- =================== Dump File: 013017-4968-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 14393 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 14393.693.amd64fre.rs1_release.161220-1747
- Kernel base = 0xfffff800`5da13000 PsLoadedModuleList = 0xfffff800`5dd18060
- Debug session time: Mon Jan 30 16:22:47.787 2017 (UTC - 4:00)
- System Uptime: 3 days 0:34:16.542
- BugCheck 116, {ffffae8b48f273d0, fffff80a3763f284, 0, d}
- *** WARNING: Unable to verify timestamp for atikmpag.sys
- *** ERROR: Module load completed but symbols could not be loaded for atikmpag.sys
- Probably caused by : atikmpag.sys ( atikmpag+f284 )
- Followup: MachineOwner
- VIDEO_TDR_FAILURE (116)
- Attempt to reset the display driver and recover from timeout failed.
- Arguments:
- Arg1: ffffae8b48f273d0, Optional pointer to internal TDR recovery context (TDR_RECOVERY_CONTEXT).
- Arg2: fffff80a3763f284, The pointer into responsible device driver module (e.g. owner tag).
- Arg3: 0000000000000000, Optional error code (NTSTATUS) of the last failed operation.
- Arg4: 000000000000000d, Optional internal context dependent data.
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.14393.693 (rs1_release.161220-1747)
- SYSTEM_MANUFACTURER: MSI
- SYSTEM_PRODUCT_NAME: MS-7693
- SYSTEM_VERSION: 4.0
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: V22.4
- BIOS_DATE: 12/21/2015
- BASEBOARD_MANUFACTURER: MSI
- BASEBOARD_PRODUCT: 970 GAMING (MS-7693)
- BASEBOARD_VERSION: 4.0
- DUMP_TYPE: 2
- FAULTING_IP:
- atikmpag+f284
- fffff80a`3763f284 4883ec28 sub rsp,28h
- DEFAULT_BUCKET_ID: GRAPHICS_DRIVER_TDR_FAULT
- CPU_COUNT: 8
- CPU_MHZ: fa0
- CPU_VENDOR: AuthenticAMD
- CPU_FAMILY: 15
- CPU_MODEL: 2
- CPU_STEPPING: 0
- CUSTOMER_CRASH_COUNT: 1
- BUGCHECK_STR: 0x116
- PROCESS_NAME: System
- CURRENT_IRQL: 0
- STACK_TEXT:
- ffffe000`349b37c8 fffff80a`37c3ba88 : 00000000`00000116 ffffae8b`48f273d0 fffff80a`3763f284 00000000`00000000 : nt!KeBugCheckEx
- ffffe000`349b37d0 fffff80a`37c3b193 : fffff80a`3763f284 ffffae8b`48f273d0 ffffe000`349b38d9 00000000`00000000 : dxgkrnl!TdrBugcheckOnTimeout+0xec
- ffffe000`349b3810 fffff80a`38af77b5 : ffffae8b`48f273d0 00000000`003b9b4e 00000000`00000009 fffff80a`37ad909d : dxgkrnl!TdrIsRecoveryRequired+0x193
- ffffe000`349b3840 fffff80a`38b53842 : ffffae8b`462cc000 00000000`00000002 ffffae8b`462cc000 ffffae8b`462ce000 : dxgmms2!VidSchiReportHwHang+0x4c1
- ffffe000`349b3940 fffff80a`38b32b87 : 00000000`00000002 00000000`00ff216e 00000000`003b9b4e 00000000`00000001 : dxgmms2!VidSchiCheckHwProgress+0x20772
- ffffe000`349b39b0 fffff80a`38ada4b4 : 00000000`00000000 ffffae8b`462ce000 00000000`0000000f 00000000`00000000 : dxgmms2!VidSchiWaitForSchedulerEvents+0x337
- ffffe000`349b3a70 fffff80a`38b3ec1f : ffffae8b`462ffc00 ffffe000`349b3bd0 ffffae8b`462ffc20 ffffae8b`00000000 : dxgmms2!VidSchiScheduleCommandToRun+0x3d4
- ffffe000`349b3b80 fffff80a`38b3ebe0 : ffffae8b`462ce500 ffffae8b`462ce000 00000000`00000080 fffff80a`38b3eb60 : dxgmms2!VidSchiRun_PriorityTable+0x2f
- ffffe000`349b3bd0 fffff800`5da15729 : ffffe000`34880180 fffff800`5db62adf 00000000`0157a2da ffffae8b`465cf800 : dxgmms2!VidSchiWorkerThread+0x80
- ffffe000`349b3c10 fffff800`5db62bb6 : ffffe000`34880180 ffffae8b`465cf800 fffff800`5da156e8 00000000`00000008 : nt!PspSystemThreadStartup+0x41
- ffffe000`349b3c60 00000000`00000000 : ffffe000`349b4000 ffffe000`349ae000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
- STACK_COMMAND: kb
- THREAD_SHA1_HASH_MOD_FUNC: a05e887139f0ff6cbfa648fbee599294462fd682
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: c0858cbefadebd900fba1d64c1ff0d52ab6be1bb
- THREAD_SHA1_HASH_MOD: 65b26f16328fe41a723c00193723d68b091ef48d
- FOLLOWUP_IP:
- atikmpag+f284
- fffff80a`3763f284 4883ec28 sub rsp,28h
- FAULT_INSTR_CODE: 28ec8348
- SYMBOL_NAME: atikmpag+f284
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: atikmpag
- IMAGE_NAME: atikmpag.sys
- DEBUG_FLR_IMAGE_TIMESTAMP: 58443f42
- FAILURE_BUCKET_ID: 0x116_IMAGE_atikmpag.sys
- BUCKET_ID: 0x116_IMAGE_atikmpag.sys
- PRIMARY_PROBLEM_CLASS: 0x116_IMAGE_atikmpag.sys
- TARGET_TIME: 2017-01-30T20:22:47.000Z
- OSBUILD: 14393
- OSSERVICEPACK: 693
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2016-12-21 01:50:57
- BUILDDATESTAMP_STR: 161220-1747
- BUILDLAB_STR: rs1_release
- BUILDOSVER_STR: 10.0.14393.693
- ANALYSIS_SESSION_ELAPSED_TIME: 16b6
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:0x116_image_atikmpag.sys
- FAILURE_ID_HASH: {e300aa8c-6915-3f37-7957-d2e4fc30a6fd}
- Followup: MachineOwner
- ========================================================================
- =================== Dump File: 020817-5312-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 14393 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 14393.693.amd64fre.rs1_release.161220-1747
- Kernel base = 0xfffff801`17887000 PsLoadedModuleList = 0xfffff801`17b8c060
- Debug session time: Wed Feb 8 02:40:44.772 2017 (UTC - 4:00)
- System Uptime: 1 days 0:55:18.527
- BugCheck 116, {ffffa78058ad0260, fffff809d68bf284, 0, d}
- *** WARNING: Unable to verify timestamp for atikmpag.sys
- *** ERROR: Module load completed but symbols could not be loaded for atikmpag.sys
- Probably caused by : atikmpag.sys ( atikmpag+f284 )
- Followup: MachineOwner
- VIDEO_TDR_FAILURE (116)
- Attempt to reset the display driver and recover from timeout failed.
- Arguments:
- Arg1: ffffa78058ad0260, Optional pointer to internal TDR recovery context (TDR_RECOVERY_CONTEXT).
- Arg2: fffff809d68bf284, The pointer into responsible device driver module (e.g. owner tag).
- Arg3: 0000000000000000, Optional error code (NTSTATUS) of the last failed operation.
- Arg4: 000000000000000d, Optional internal context dependent data.
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.14393.693 (rs1_release.161220-1747)
- SYSTEM_MANUFACTURER: MSI
- SYSTEM_PRODUCT_NAME: MS-7693
- SYSTEM_VERSION: 4.0
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: V22.4
- BIOS_DATE: 12/21/2015
- BASEBOARD_MANUFACTURER: MSI
- BASEBOARD_PRODUCT: 970 GAMING (MS-7693)
- BASEBOARD_VERSION: 4.0
- DUMP_TYPE: 2
- FAULTING_IP:
- atikmpag+f284
- fffff809`d68bf284 4883ec28 sub rsp,28h
- DEFAULT_BUCKET_ID: GRAPHICS_DRIVER_TDR_FAULT
- CPU_COUNT: 8
- CPU_MHZ: fa0
- CPU_VENDOR: AuthenticAMD
- CPU_FAMILY: 15
- CPU_MODEL: 2
- CPU_STEPPING: 0
- CUSTOMER_CRASH_COUNT: 1
- BUGCHECK_STR: 0x116
- PROCESS_NAME: System
- CURRENT_IRQL: 0
- STACK_TEXT:
- ffff9681`cb5e17c8 fffff809`d672ba88 : 00000000`00000116 ffffa780`58ad0260 fffff809`d68bf284 00000000`00000000 : nt!KeBugCheckEx
- ffff9681`cb5e17d0 fffff809`d672b193 : fffff809`d68bf284 ffffa780`58ad0260 ffff9681`cb5e18d9 00000000`00000000 : dxgkrnl!TdrBugcheckOnTimeout+0xec
- ffff9681`cb5e1810 fffff809`d6e977b5 : ffffa780`58ad0260 00000000`003b9b41 00000000`00000009 fffff809`d65c909d : dxgkrnl!TdrIsRecoveryRequired+0x193
- ffff9681`cb5e1840 fffff809`d6ef3842 : ffffa780`589cf000 00000000`00000002 ffffa780`589cf000 ffffa780`589d1000 : dxgmms2!VidSchiReportHwHang+0x4c1
- ffff9681`cb5e1940 fffff809`d6ed2b87 : 00000000`00000002 00000000`00579cd6 00000000`003b9b41 00000000`00000001 : dxgmms2!VidSchiCheckHwProgress+0x20772
- ffff9681`cb5e19b0 fffff809`d6e7a4b4 : ffffa780`55c7c7e0 ffffa780`589d1000 ffffa780`55c7c7e8 00000000`00000002 : dxgmms2!VidSchiWaitForSchedulerEvents+0x337
- ffff9681`cb5e1a70 fffff809`d6edec1f : ffffa780`57b53c00 ffff9681`cb5e1bd0 ffffa780`57b53c00 ffffa780`00000000 : dxgmms2!VidSchiScheduleCommandToRun+0x3d4
- ffff9681`cb5e1b80 fffff809`d6edebe0 : ffffa780`589d1500 ffffa780`589d1000 00000000`00000080 fffff809`d6edeb60 : dxgmms2!VidSchiRun_PriorityTable+0x2f
- ffff9681`cb5e1bd0 fffff801`17889729 : ffff9681`c9900180 fffff801`179d6adf 00000000`015c99ec ffffa780`58b87800 : dxgmms2!VidSchiWorkerThread+0x80
- ffff9681`cb5e1c10 fffff801`179d6bb6 : ffff9681`c9900180 ffffa780`58b87800 fffff801`178896e8 00000438`00000780 : nt!PspSystemThreadStartup+0x41
- ffff9681`cb5e1c60 00000000`00000000 : ffff9681`cb5e2000 ffff9681`cb5dc000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
- STACK_COMMAND: kb
- THREAD_SHA1_HASH_MOD_FUNC: a05e887139f0ff6cbfa648fbee599294462fd682
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: c0858cbefadebd900fba1d64c1ff0d52ab6be1bb
- THREAD_SHA1_HASH_MOD: 65b26f16328fe41a723c00193723d68b091ef48d
- FOLLOWUP_IP:
- atikmpag+f284
- fffff809`d68bf284 4883ec28 sub rsp,28h
- FAULT_INSTR_CODE: 28ec8348
- SYMBOL_NAME: atikmpag+f284
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: atikmpag
- IMAGE_NAME: atikmpag.sys
- DEBUG_FLR_IMAGE_TIMESTAMP: 58443f42
- FAILURE_BUCKET_ID: 0x116_IMAGE_atikmpag.sys
- BUCKET_ID: 0x116_IMAGE_atikmpag.sys
- PRIMARY_PROBLEM_CLASS: 0x116_IMAGE_atikmpag.sys
- TARGET_TIME: 2017-02-08T06:40:44.000Z
- OSBUILD: 14393
- OSSERVICEPACK: 693
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2016-12-21 01:50:57
- BUILDDATESTAMP_STR: 161220-1747
- BUILDLAB_STR: rs1_release
- BUILDOSVER_STR: 10.0.14393.693
- ANALYSIS_SESSION_ELAPSED_TIME: f68
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:0x116_image_atikmpag.sys
- FAILURE_ID_HASH: {e300aa8c-6915-3f37-7957-d2e4fc30a6fd}
- Followup: MachineOwner
- ========================================================================
- =================== Dump File: 070617-6781-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 14393 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 14393.1358.amd64fre.rs1_release.170602-2252
- Kernel base = 0xfffff802`dba13000 PsLoadedModuleList = 0xfffff802`dbd12000
- Debug session time: Thu Jul 6 19:05:37.087 2017 (UTC - 4:00)
- System Uptime: 2 days 5:27:55.842
- BugCheck 1E, {ffffffffc0000005, fffff802dbae2c68, 0, ffffffffffffffff}
- Probably caused by : ntkrnlmp.exe ( nt!KiProcessThreadWaitList+58 )
- Followup: MachineOwner
- KMODE_EXCEPTION_NOT_HANDLED (1e)
- This is a very common bugcheck. Usually the exception address pinpoints
- the driver/function that caused the problem. Always note this address
- as well as the link date of the driver/image that contains this address.
- Arguments:
- Arg1: ffffffffc0000005, The exception code that was not handled
- Arg2: fffff802dbae2c68, The address that the exception occurred at
- Arg3: 0000000000000000, Parameter 0 of the exception
- Arg4: ffffffffffffffff, Parameter 1 of the exception
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.14393.1358 (rs1_release.170602-2252)
- SYSTEM_MANUFACTURER: MSI
- SYSTEM_PRODUCT_NAME: MS-7693
- SYSTEM_VERSION: 4.0
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: V22.4
- BIOS_DATE: 12/21/2015
- BASEBOARD_MANUFACTURER: MSI
- BASEBOARD_PRODUCT: 970 GAMING (MS-7693)
- BASEBOARD_VERSION: 4.0
- DUMP_TYPE: 2
- READ_ADDRESS: fffff802dbdb3338: Unable to get MiVisibleState
- ffffffffffffffff
- EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- FAULTING_IP:
- nt!KiProcessThreadWaitList+58
- fffff802`dbae2c68 0fb64311 movzx eax,byte ptr [rbx+11h]
- EXCEPTION_PARAMETER2: ffffffffffffffff
- BUGCHECK_STR: 0x1E_c0000005_R
- CPU_COUNT: 8
- CPU_MHZ: fa0
- CPU_VENDOR: AuthenticAMD
- CPU_FAMILY: 15
- CPU_MODEL: 2
- CPU_STEPPING: 0
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- PROCESS_NAME: System
- CURRENT_IRQL: 2
- EXCEPTION_RECORD: 0000000000000002 -- (.exr 0x2)
- Cannot read Exception record @ 0000000000000002
- TRAP_FRAME: 0000000300000030 -- (.trap 0x300000030)
- Unable to read trap frame at 00000003`00000030
- LAST_CONTROL_TRANSFER: from fffff802dbbe0a7a to fffff802dbb61ce0
- STACK_TEXT:
- fffff802`dd8a57d8 fffff802`dbbe0a7a : 00000000`0000001e ffffffff`c0000005 fffff802`dbae2c68 00000000`00000000 : nt!KeBugCheckEx
- fffff802`dd8a57e0 fffff802`dbb680dd : fffff802`dbd62000 fffff802`dba13000 0004eaa4`00818000 00000000`00000018 : nt!KiFatalExceptionHandler+0x22
- fffff802`dd8a5820 fffff802`dbabbb01 : fffff802`dd8a7000 00000000`00000000 fffff802`dd8a1000 00000000`00000000 : nt!RtlpExecuteHandlerForException+0xd
- fffff802`dd8a5850 fffff802`dbaba877 : fffff802`dd8a6748 fffff802`dd8a6480 fffff802`dd8a6748 00000000`0010001f : nt!RtlDispatchException+0x421
- fffff802`dd8a5f50 fffff802`dbb6cf0e : 00000000`00000002 00000000`00000000 00000003`00000030 ffff9f88`0000000a : nt!KiDispatchException+0x1d7
- fffff802`dd8a6610 fffff802`dbb6b1bd : ffff9f88`00000000 00000000`000000ff ffff9f88`7bdd7110 fffff802`dbdc9100 : nt!KiExceptionDispatch+0xce
- fffff802`dd8a67f0 fffff802`dbae2c68 : ffff9f88`7e78b1f0 fffff802`dd8a6b60 ffff9f88`00000001 ffff9f88`00000000 : nt!KiGeneralProtectionFault+0xfd
- fffff802`dd8a6980 fffff802`dba49cfd : ffff9f88`00000000 ffff9f88`7e78b180 00000000`00000004 00000000`00000002 : nt!KiProcessThreadWaitList+0x58
- fffff802`dd8a69e0 fffff802`dbb64d6a : 00000000`00000000 fffff802`dbd4f180 fffff802`dbdc9940 ffff9f88`8363f080 : nt!KiRetireDpcList+0x80d
- fffff802`dd8a6c60 00000000`00000000 : fffff802`dd8a7000 fffff802`dd8a1000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
- STACK_COMMAND: kb
- THREAD_SHA1_HASH_MOD_FUNC: b45e3e059857431382c5bc6fbc99a86064b3edb3
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: c2501133492dd5bb278a3f59301124ef362b5c0e
- THREAD_SHA1_HASH_MOD: bc100a5647b828107ac4e18055e00abcbe1ec406
- FOLLOWUP_IP:
- nt!KiProcessThreadWaitList+58
- fffff802`dbae2c68 0fb64311 movzx eax,byte ptr [rbx+11h]
- FAULT_INSTR_CODE: 1143b60f
- SYMBOL_STACK_INDEX: 7
- SYMBOL_NAME: nt!KiProcessThreadWaitList+58
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- DEBUG_FLR_IMAGE_TIMESTAMP: 593278b1
- IMAGE_VERSION: 10.0.14393.1358
- BUCKET_ID_FUNC_OFFSET: 58
- FAILURE_BUCKET_ID: 0x1E_c0000005_R_nt!KiProcessThreadWaitList
- BUCKET_ID: 0x1E_c0000005_R_nt!KiProcessThreadWaitList
- PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_R_nt!KiProcessThreadWaitList
- TARGET_TIME: 2017-07-06T23:05:37.000Z
- OSBUILD: 14393
- OSSERVICEPACK: 1358
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-06-03 04:52:01
- BUILDDATESTAMP_STR: 170602-2252
- BUILDLAB_STR: rs1_release
- BUILDOSVER_STR: 10.0.14393.1358
- ANALYSIS_SESSION_ELAPSED_TIME: c781
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:0x1e_c0000005_r_nt!kiprocessthreadwaitlist
- FAILURE_ID_HASH: {4443821a-61af-afaa-5831-91aee323faf4}
- Followup: MachineOwner
- ========================================================================
- =================== Dump File: 071317-6890-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 14393 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 14393.1480.amd64fre.rs1_release.170706-2004
- Kernel base = 0xfffff800`86685000 PsLoadedModuleList = 0xfffff800`86984040
- Debug session time: Thu Jul 13 18:26:32.170 2017 (UTC - 4:00)
- System Uptime: 2 days 0:07:39.926
- BugCheck 119, {1, 8a6a, b, ffffc48fbc7ef180}
- *** WARNING: Unable to verify timestamp for atikmpag.sys
- *** ERROR: Module load completed but symbols could not be loaded for atikmpag.sys
- *************************************************************************
- *** Either you specified an unqualified symbol, or your debugger ***
- *** doesn't have full symbol information. Unqualified symbol ***
- *** resolution is turned off by default. Please either specify a ***
- *** fully qualified symbol module!symbolname, or enable resolution ***
- *** of unqualified symbols by typing ".symopt- 100". Note that ***
- *** enabling unqualified symbol resolution with network symbol ***
- *** server shares in the symbol path may cause the debugger to ***
- *** appear to hang for long periods of time when an incorrect ***
- *** symbol name is typed or the network symbol server is down. ***
- *** For some commands to work properly, your symbol path ***
- *** must point to .pdb files that have full type information. ***
- *** Certain .pdb files (such as the public OS symbols) do not ***
- *** contain the required information. Contact the group that ***
- *** provided you with these symbols if you need this command to ***
- *** work. ***
- *** Type referenced: dxgkrnl!DXGADAPTER ***
- *************************************************************************
- Probably caused by : dxgmms2.sys ( dxgmms2! ?? ::FNODOBFM::`string'+56eb )
- Followup: MachineOwner
- VIDEO_SCHEDULER_INTERNAL_ERROR (119)
- The video scheduler has detected that fatal violation has occurred. This resulted
- in a condition that video scheduler can no longer progress. Any other values after
- parameter 1 must be individually examined according to the subtype.
- Arguments:
- Arg1: 0000000000000001, The driver has reported an invalid fence ID.
- Arg2: 0000000000008a6a
- Arg3: 000000000000000b
- Arg4: ffffc48fbc7ef180
- Debugging Details:
- *************************************************************************
- *** Either you specified an unqualified symbol, or your debugger ***
- *** doesn't have full symbol information. Unqualified symbol ***
- *** resolution is turned off by default. Please either specify a ***
- *** fully qualified symbol module!symbolname, or enable resolution ***
- *** of unqualified symbols by typing ".symopt- 100". Note that ***
- *** enabling unqualified symbol resolution with network symbol ***
- *** server shares in the symbol path may cause the debugger to ***
- *** appear to hang for long periods of time when an incorrect ***
- *** symbol name is typed or the network symbol server is down. ***
- *** For some commands to work properly, your symbol path ***
- *** must point to .pdb files that have full type information. ***
- *** Certain .pdb files (such as the public OS symbols) do not ***
- *** contain the required information. Contact the group that ***
- *** provided you with these symbols if you need this command to ***
- *** work. ***
- *** Type referenced: dxgkrnl!DXGADAPTER ***
- *************************************************************************
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
- SYSTEM_MANUFACTURER: MSI
- SYSTEM_PRODUCT_NAME: MS-7693
- SYSTEM_VERSION: 4.0
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: V22.4
- BIOS_DATE: 12/21/2015
- BASEBOARD_MANUFACTURER: MSI
- BASEBOARD_PRODUCT: 970 GAMING (MS-7693)
- BASEBOARD_VERSION: 4.0
- DUMP_TYPE: 2
- CPU_COUNT: 8
- CPU_MHZ: fa0
- CPU_VENDOR: AuthenticAMD
- CPU_FAMILY: 15
- CPU_MODEL: 2
- CPU_STEPPING: 0
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- BUGCHECK_STR: 0x119
- PROCESS_NAME: Discord.exe
- CURRENT_IRQL: 9
- LAST_CONTROL_TRANSFER: from fffff80bfcba34ae to fffff800867d4960
- STACK_TEXT:
- fffff800`8855ea38 fffff80b`fcba34ae : 00000000`00000119 00000000`00000001 00000000`00008a6a 00000000`0000000b : nt!KeBugCheckEx
- fffff800`8855ea40 fffff80b`feb4abdb : 00000000`00008a6a ffffc48f`bc3f7000 00000000`00000000 00000000`00000000 : watchdog!WdLogEvent5_WdCriticalError+0xce
- fffff800`8855ea80 fffff80b`feb3c320 : ffffc48f`bc7ef180 ffffc48f`bc3f7000 00000000`00000000 00000000`00000000 : dxgmms2! ?? ::FNODOBFM::`string'+0x56eb
- fffff800`8855eab0 fffff80b`feb3c0ad : fffff800`8855ebe0 ffffc48f`baae9040 ffffc48f`bc7ef180 00000000`00000000 : dxgmms2!VidSchDdiNotifyInterruptWorker+0x220
- fffff800`8855eb00 fffff80b`fdcac414 : ffffc48f`ba99d030 00000000`00000000 00000000`00000000 00000000`00000000 : dxgmms2!VidSchDdiNotifyInterrupt+0x8d
- fffff800`8855eb30 fffff80b`fcc0787b : ffffc48f`bc1c7198 00000000`00000000 00000000`00000000 00000000`00000000 : dxgkrnl!DxgNotifyInterruptCB+0x74
- fffff800`8855eb60 ffffc48f`bc1c7198 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : atikmpag+0x4787b
- fffff800`8855eb68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffc48f`bc1c7198
- STACK_COMMAND: kb
- THREAD_SHA1_HASH_MOD_FUNC: fce24e5dcfaaeac4d321017961c3d429ad6b2e1c
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: de7aeb4ee24594af3be8b62392e14e6b464d9f7f
- THREAD_SHA1_HASH_MOD: d60cd8b8a1d6f216240d13716025af607894a8c7
- FOLLOWUP_IP:
- dxgmms2! ?? ::FNODOBFM::`string'+56eb
- fffff80b`feb4abdb cc int 3
- FAULT_INSTR_CODE: 9680b8cc
- SYMBOL_STACK_INDEX: 2
- SYMBOL_NAME: dxgmms2! ?? ::FNODOBFM::`string'+56eb
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: dxgmms2
- IMAGE_NAME: dxgmms2.sys
- DEBUG_FLR_IMAGE_TIMESTAMP: 58ba5e7e
- IMAGE_VERSION: 10.0.14393.953
- BUCKET_ID_FUNC_OFFSET: 56eb
- FAILURE_BUCKET_ID: 0x119_1_DRIVER_REPORTED_INVALID_FENCE_ID_dxgmms2!_??_::FNODOBFM::_string_
- BUCKET_ID: 0x119_1_DRIVER_REPORTED_INVALID_FENCE_ID_dxgmms2!_??_::FNODOBFM::_string_
- PRIMARY_PROBLEM_CLASS: 0x119_1_DRIVER_REPORTED_INVALID_FENCE_ID_dxgmms2!_??_::FNODOBFM::_string_
- TARGET_TIME: 2017-07-13T22:26:32.000Z
- OSBUILD: 14393
- OSSERVICEPACK: 1480
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
- BUILDDATESTAMP_STR: 170706-2004
- BUILDLAB_STR: rs1_release
- BUILDOSVER_STR: 10.0.14393.1480
- ANALYSIS_SESSION_ELAPSED_TIME: 1ccd3
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:0x119_1_driver_reported_invalid_fence_id_dxgmms2!_??_::fnodobfm::_string_
- FAILURE_ID_HASH: {1e3e5dd8-c408-6829-a01b-21aa1aab0bd3}
- Followup: MachineOwner
- ========================================================================
- =================== Dump File: 071717-9109-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 14393 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 14393.1480.amd64fre.rs1_release.170706-2004
- Kernel base = 0xfffff801`2001a000 PsLoadedModuleList = 0xfffff801`20319040
- Debug session time: Mon Jul 17 03:09:28.559 2017 (UTC - 4:00)
- System Uptime: 3 days 8:42:14.315
- BugCheck 119, {1, 5b094c, 5b094d, ffff918d55fb8010}
- *** WARNING: Unable to verify timestamp for atikmpag.sys
- *** ERROR: Module load completed but symbols could not be loaded for atikmpag.sys
- *** WARNING: Unable to verify timestamp for atikmdag.sys
- *** ERROR: Module load completed but symbols could not be loaded for atikmdag.sys
- *************************************************************************
- *** Either you specified an unqualified symbol, or your debugger ***
- *** doesn't have full symbol information. Unqualified symbol ***
- *** resolution is turned off by default. Please either specify a ***
- *** fully qualified symbol module!symbolname, or enable resolution ***
- *** of unqualified symbols by typing ".symopt- 100". Note that ***
- *** enabling unqualified symbol resolution with network symbol ***
- *** server shares in the symbol path may cause the debugger to ***
- *** appear to hang for long periods of time when an incorrect ***
- *** symbol name is typed or the network symbol server is down. ***
- *** For some commands to work properly, your symbol path ***
- *** must point to .pdb files that have full type information. ***
- *** Certain .pdb files (such as the public OS symbols) do not ***
- *** contain the required information. Contact the group that ***
- *** provided you with these symbols if you need this command to ***
- *** work. ***
- *** Type referenced: dxgkrnl!DXGADAPTER ***
- *************************************************************************
- *** WARNING: Unable to verify timestamp for win32k.sys
- *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
- Probably caused by : dxgmms2.sys ( dxgmms2! ?? ::FNODOBFM::`string'+53f3 )
- Followup: MachineOwner
- VIDEO_SCHEDULER_INTERNAL_ERROR (119)
- The video scheduler has detected that fatal violation has occurred. This resulted
- in a condition that video scheduler can no longer progress. Any other values after
- parameter 1 must be individually examined according to the subtype.
- Arguments:
- Arg1: 0000000000000001, The driver has reported an invalid fence ID.
- Arg2: 00000000005b094c
- Arg3: 00000000005b094d
- Arg4: ffff918d55fb8010
- Debugging Details:
- *************************************************************************
- *** Either you specified an unqualified symbol, or your debugger ***
- *** doesn't have full symbol information. Unqualified symbol ***
- *** resolution is turned off by default. Please either specify a ***
- *** fully qualified symbol module!symbolname, or enable resolution ***
- *** of unqualified symbols by typing ".symopt- 100". Note that ***
- *** enabling unqualified symbol resolution with network symbol ***
- *** server shares in the symbol path may cause the debugger to ***
- *** appear to hang for long periods of time when an incorrect ***
- *** symbol name is typed or the network symbol server is down. ***
- *** For some commands to work properly, your symbol path ***
- *** must point to .pdb files that have full type information. ***
- *** Certain .pdb files (such as the public OS symbols) do not ***
- *** contain the required information. Contact the group that ***
- *** provided you with these symbols if you need this command to ***
- *** work. ***
- *** Type referenced: dxgkrnl!DXGADAPTER ***
- *************************************************************************
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
- SYSTEM_MANUFACTURER: MSI
- SYSTEM_PRODUCT_NAME: MS-7693
- SYSTEM_VERSION: 4.0
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: V22.4
- BIOS_DATE: 12/21/2015
- BASEBOARD_MANUFACTURER: MSI
- BASEBOARD_PRODUCT: 970 GAMING (MS-7693)
- BASEBOARD_VERSION: 4.0
- DUMP_TYPE: 2
- CPU_COUNT: 8
- CPU_MHZ: fa0
- CPU_VENDOR: AuthenticAMD
- CPU_FAMILY: 15
- CPU_MODEL: 2
- CPU_STEPPING: 0
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- BUGCHECK_STR: 0x119
- PROCESS_NAME: audiodg.exe
- CURRENT_IRQL: 9
- LAST_CONTROL_TRANSFER: from fffff80b0ce434ae to fffff80120169960
- STACK_TEXT:
- fffff801`21efb9d8 fffff80b`0ce434ae : 00000000`00000119 00000000`00000001 00000000`005b094c 00000000`005b094d : nt!KeBugCheckEx
- fffff801`21efb9e0 fffff80b`0ed3a8e3 : 00000000`005b094d 00000000`00000000 ffff918d`569c9000 fffff801`2016e6e0 : watchdog!WdLogEvent5_WdCriticalError+0xce
- fffff801`21efba20 fffff80b`0ed3a66f : ffff918d`598f5010 ffff918d`55fb8010 ffff918d`5469d090 00000000`00000001 : dxgmms2! ?? ::FNODOBFM::`string'+0x53f3
- fffff801`21efbac0 fffff80b`0ed2c0ad : fffff801`005b094c ffff918d`54725040 ffff918d`55fb8010 00000000`00000006 : dxgmms2! ?? ::FNODOBFM::`string'+0x517f
- fffff801`21efbb10 fffff80b`0ce6c414 : ffff918d`5438f030 ffff918d`55fbf000 ffff918d`557cc678 fffff80b`112e9550 : dxgmms2!VidSchDdiNotifyInterrupt+0x8d
- fffff801`21efbb40 fffff80b`0daf787b : ffff918d`547e0518 fffff80b`111453e4 00000000`00000000 00000000`00000000 : dxgkrnl!DxgNotifyInterruptCB+0x74
- fffff801`21efbb70 ffff918d`547e0518 : fffff80b`111453e4 00000000`00000000 00000000`00000000 00000000`00000005 : atikmpag+0x4787b
- fffff801`21efbb78 fffff80b`111453e4 : 00000000`00000000 00000000`00000000 00000000`00000005 00000000`01c87702 : 0xffff918d`547e0518
- fffff801`21efbb80 00000000`00000000 : 00000000`00000000 00000000`00000005 00000000`01c87702 00000000`00000009 : atikmdag+0xf53e4
- STACK_COMMAND: kb
- THREAD_SHA1_HASH_MOD_FUNC: c7e1421ce0872587f4e8436e224bcb164f85f04a
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 5d61949a0d51f92b8aa63650b76ec8e106830c4b
- THREAD_SHA1_HASH_MOD: 69aea6f2d3faac8041251d2a7e00b7e9b67d9769
- FOLLOWUP_IP:
- dxgmms2! ?? ::FNODOBFM::`string'+53f3
- fffff80b`0ed3a8e3 cc int 3
- FAULT_INSTR_CODE: 48d233cc
- SYMBOL_STACK_INDEX: 2
- SYMBOL_NAME: dxgmms2! ?? ::FNODOBFM::`string'+53f3
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: dxgmms2
- IMAGE_NAME: dxgmms2.sys
- DEBUG_FLR_IMAGE_TIMESTAMP: 58ba5e7e
- IMAGE_VERSION: 10.0.14393.953
- BUCKET_ID_FUNC_OFFSET: 53f3
- FAILURE_BUCKET_ID: 0x119_1_DRIVER_REPORTED_INVALID_FENCE_ID_dxgmms2!_??_::FNODOBFM::_string_
- BUCKET_ID: 0x119_1_DRIVER_REPORTED_INVALID_FENCE_ID_dxgmms2!_??_::FNODOBFM::_string_
- PRIMARY_PROBLEM_CLASS: 0x119_1_DRIVER_REPORTED_INVALID_FENCE_ID_dxgmms2!_??_::FNODOBFM::_string_
- TARGET_TIME: 2017-07-17T07:09:28.000Z
- OSBUILD: 14393
- OSSERVICEPACK: 1480
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
- BUILDDATESTAMP_STR: 170706-2004
- BUILDLAB_STR: rs1_release
- BUILDOSVER_STR: 10.0.14393.1480
- ANALYSIS_SESSION_ELAPSED_TIME: 19212
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:0x119_1_driver_reported_invalid_fence_id_dxgmms2!_??_::fnodobfm::_string_
- FAILURE_ID_HASH: {1e3e5dd8-c408-6829-a01b-21aa1aab0bd3}
- Followup: MachineOwner
- ========================================================================
- =================== Dump File: 071917-6343-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 14393 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 14393.1480.amd64fre.rs1_release.170706-2004
- Kernel base = 0xfffff801`dd014000 PsLoadedModuleList = 0xfffff801`dd313040
- Debug session time: Wed Jul 19 00:20:33.908 2017 (UTC - 4:00)
- System Uptime: 0 days 4:12:31.665
- BugCheck 116, {ffffca8bd9fa44a0, fffff80a6df0f654, 0, d}
- *** WARNING: Unable to verify timestamp for atikmpag.sys
- *** ERROR: Module load completed but symbols could not be loaded for atikmpag.sys
- Probably caused by : atikmpag.sys ( atikmpag+f654 )
- Followup: MachineOwner
- VIDEO_TDR_FAILURE (116)
- Attempt to reset the display driver and recover from timeout failed.
- Arguments:
- Arg1: ffffca8bd9fa44a0, Optional pointer to internal TDR recovery context (TDR_RECOVERY_CONTEXT).
- Arg2: fffff80a6df0f654, The pointer into responsible device driver module (e.g. owner tag).
- Arg3: 0000000000000000, Optional error code (NTSTATUS) of the last failed operation.
- Arg4: 000000000000000d, Optional internal context dependent data.
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
- SYSTEM_MANUFACTURER: MSI
- SYSTEM_PRODUCT_NAME: MS-7693
- SYSTEM_VERSION: 4.0
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: V22.4
- BIOS_DATE: 12/21/2015
- BASEBOARD_MANUFACTURER: MSI
- BASEBOARD_PRODUCT: 970 GAMING (MS-7693)
- BASEBOARD_VERSION: 4.0
- DUMP_TYPE: 2
- FAULTING_IP:
- atikmpag+f654
- fffff80a`6df0f654 4883ec28 sub rsp,28h
- DEFAULT_BUCKET_ID: GRAPHICS_DRIVER_TDR_FAULT
- CPU_COUNT: 8
- CPU_MHZ: fa0
- CPU_VENDOR: AuthenticAMD
- CPU_FAMILY: 15
- CPU_MODEL: 2
- CPU_STEPPING: 0
- CUSTOMER_CRASH_COUNT: 1
- BUGCHECK_STR: 0x116
- PROCESS_NAME: System
- CURRENT_IRQL: 0
- STACK_TEXT:
- ffffe181`2774d7c8 fffff80a`6e31a298 : 00000000`00000116 ffffca8b`d9fa44a0 fffff80a`6df0f654 00000000`00000000 : nt!KeBugCheckEx
- ffffe181`2774d7d0 fffff80a`6e3199a3 : fffff80a`6df0f654 ffffca8b`d9fa44a0 ffffe181`2774d8d9 00000000`00000000 : dxgkrnl!TdrBugcheckOnTimeout+0xec
- ffffe181`2774d810 fffff80a`6e0577b5 : ffffca8b`d9fa44a0 00000000`003b9b42 00000000`00000009 fffff80a`6e1b90bd : dxgkrnl!TdrIsRecoveryRequired+0x193
- ffffe181`2774d840 fffff80a`6e0b3a9e : ffffca8b`d47bc000 00000000`00000002 ffffca8b`d47bc000 ffffca8b`d47be000 : dxgmms2!VidSchiReportHwHang+0x4c1
- ffffe181`2774d940 fffff80a`6e092eb7 : 00000000`00000002 00000000`000ecb5c 00000000`003b9b42 00000000`00000001 : dxgmms2! ?? ::NNGAKEGL::`string'+0xf91e
- ffffe181`2774d9b0 fffff80a`6e03a4c4 : 00000000`00000000 ffffca8b`d47be000 00000000`0000000f 00000000`00000000 : dxgmms2!VidSchiWaitForSchedulerEvents+0x337
- ffffe181`2774da70 fffff80a`6e09f27f : ffffca8b`d47db000 ffffe181`2774dbd0 ffffca8b`d47db010 ffffca8b`00000000 : dxgmms2!VidSchiScheduleCommandToRun+0x3d4
- ffffe181`2774db80 fffff80a`6e09f240 : ffffca8b`d47be500 ffffca8b`d47be000 00000000`00000080 fffff80a`6e09f1c0 : dxgmms2!VidSchiRun_PriorityTable+0x2f
- ffffe181`2774dbd0 fffff801`dd0ca965 : ffffe181`26b07180 fffff801`dd168d4f 00000000`010b12a8 ffffca8b`d51a0800 : dxgmms2!VidSchiWorkerThread+0x80
- ffffe181`2774dc10 fffff801`dd168e26 : ffffe181`26b07180 ffffca8b`d51a0800 fffff801`dd0ca924 00000000`00000000 : nt!PspSystemThreadStartup+0x41
- ffffe181`2774dc60 00000000`00000000 : ffffe181`2774e000 ffffe181`27748000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
- STACK_COMMAND: kb
- THREAD_SHA1_HASH_MOD_FUNC: b894b9fd964d0d623be8fa8c727117633542f015
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 415f1eb38427f8c1e04eef804b3fcdda2dacb6cd
- THREAD_SHA1_HASH_MOD: 65b26f16328fe41a723c00193723d68b091ef48d
- FOLLOWUP_IP:
- atikmpag+f654
- fffff80a`6df0f654 4883ec28 sub rsp,28h
- FAULT_INSTR_CODE: 28ec8348
- SYMBOL_NAME: atikmpag+f654
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: atikmpag
- IMAGE_NAME: atikmpag.sys
- DEBUG_FLR_IMAGE_TIMESTAMP: 58fe9eff
- FAILURE_BUCKET_ID: 0x116_IMAGE_atikmpag.sys
- BUCKET_ID: 0x116_IMAGE_atikmpag.sys
- PRIMARY_PROBLEM_CLASS: 0x116_IMAGE_atikmpag.sys
- TARGET_TIME: 2017-07-19T04:20:33.000Z
- OSBUILD: 14393
- OSSERVICEPACK: 1480
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
- BUILDDATESTAMP_STR: 170706-2004
- BUILDLAB_STR: rs1_release
- BUILDOSVER_STR: 10.0.14393.1480
- ANALYSIS_SESSION_ELAPSED_TIME: 19df
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:0x116_image_atikmpag.sys
- FAILURE_ID_HASH: {e300aa8c-6915-3f37-7957-d2e4fc30a6fd}
- Followup: MachineOwner
- ========================================================================
- =================== Dump File: 072017-6937-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 14393 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 14393.1480.amd64fre.rs1_release.170706-2004
- Kernel base = 0xfffff801`d5416000 PsLoadedModuleList = 0xfffff801`d5715040
- Debug session time: Thu Jul 20 22:22:10.067 2017 (UTC - 4:00)
- System Uptime: 0 days 22:40:02.823
- BugCheck 116, {ffffbf83ff477100, fffff804c366f654, 0, d}
- *** WARNING: Unable to verify timestamp for atikmpag.sys
- *** ERROR: Module load completed but symbols could not be loaded for atikmpag.sys
- Probably caused by : atikmpag.sys ( atikmpag+f654 )
- Followup: MachineOwner
- VIDEO_TDR_FAILURE (116)
- Attempt to reset the display driver and recover from timeout failed.
- Arguments:
- Arg1: ffffbf83ff477100, Optional pointer to internal TDR recovery context (TDR_RECOVERY_CONTEXT).
- Arg2: fffff804c366f654, The pointer into responsible device driver module (e.g. owner tag).
- Arg3: 0000000000000000, Optional error code (NTSTATUS) of the last failed operation.
- Arg4: 000000000000000d, Optional internal context dependent data.
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
- SYSTEM_MANUFACTURER: MSI
- SYSTEM_PRODUCT_NAME: MS-7693
- SYSTEM_VERSION: 4.0
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: V22.4
- BIOS_DATE: 12/21/2015
- BASEBOARD_MANUFACTURER: MSI
- BASEBOARD_PRODUCT: 970 GAMING (MS-7693)
- BASEBOARD_VERSION: 4.0
- DUMP_TYPE: 2
- FAULTING_IP:
- atikmpag+f654
- fffff804`c366f654 4883ec28 sub rsp,28h
- DEFAULT_BUCKET_ID: GRAPHICS_DRIVER_TDR_FAULT
- CPU_COUNT: 8
- CPU_MHZ: fa0
- CPU_VENDOR: AuthenticAMD
- CPU_FAMILY: 15
- CPU_MODEL: 2
- CPU_STEPPING: 0
- CUSTOMER_CRASH_COUNT: 1
- BUGCHECK_STR: 0x116
- PROCESS_NAME: System
- CURRENT_IRQL: 0
- STACK_TEXT:
- ffffa980`15bf87c8 fffff804`c3a0a298 : 00000000`00000116 ffffbf83`ff477100 fffff804`c366f654 00000000`00000000 : nt!KeBugCheckEx
- ffffa980`15bf87d0 fffff804`c3a099a3 : fffff804`c366f654 ffffbf83`ff477100 ffffa980`15bf88d9 00000000`00000000 : dxgkrnl!TdrBugcheckOnTimeout+0xec
- ffffa980`15bf8810 fffff804`c37177b5 : ffffbf83`ff477100 00000000`003b9b54 00000000`00000009 fffff804`c38a90bd : dxgkrnl!TdrIsRecoveryRequired+0x193
- ffffa980`15bf8840 fffff804`c3773a9e : ffffbf84`017d9000 00000000`00000002 ffffbf84`017d9000 ffffbf84`017db000 : dxgmms2!VidSchiReportHwHang+0x4c1
- ffffa980`15bf8940 fffff804`c3752eb7 : 00000000`00000002 00000000`004fb01f 00000000`003b9b54 00000000`00000001 : dxgmms2! ?? ::NNGAKEGL::`string'+0xf91e
- ffffa980`15bf89b0 fffff804`c36fa4c4 : 00000000`00000000 ffffbf84`017db000 00000000`0000000f 00000000`00000000 : dxgmms2!VidSchiWaitForSchedulerEvents+0x337
- ffffa980`15bf8a70 fffff804`c375f27f : ffffbf84`019e9400 ffffa980`15bf8bd0 ffffbf84`019e94c0 ffffbf84`00000000 : dxgmms2!VidSchiScheduleCommandToRun+0x3d4
- ffffa980`15bf8b80 fffff804`c375f240 : ffffbf84`017db500 ffffbf84`017db000 00000000`00000080 fffff804`c375f1c0 : dxgmms2!VidSchiRun_PriorityTable+0x2f
- ffffa980`15bf8bd0 fffff801`d54cc965 : ffffa980`13f07180 fffff801`d556ad4f 00000000`0110042e ffffbf84`0097d800 : dxgmms2!VidSchiWorkerThread+0x80
- ffffa980`15bf8c10 fffff801`d556ae26 : ffffa980`13f07180 ffffbf84`0097d800 fffff801`d54cc924 00000000`00000465 : nt!PspSystemThreadStartup+0x41
- ffffa980`15bf8c60 00000000`00000000 : ffffa980`15bf9000 ffffa980`15bf3000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
- STACK_COMMAND: kb
- THREAD_SHA1_HASH_MOD_FUNC: b894b9fd964d0d623be8fa8c727117633542f015
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 415f1eb38427f8c1e04eef804b3fcdda2dacb6cd
- THREAD_SHA1_HASH_MOD: 65b26f16328fe41a723c00193723d68b091ef48d
- FOLLOWUP_IP:
- atikmpag+f654
- fffff804`c366f654 4883ec28 sub rsp,28h
- FAULT_INSTR_CODE: 28ec8348
- SYMBOL_NAME: atikmpag+f654
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: atikmpag
- IMAGE_NAME: atikmpag.sys
- DEBUG_FLR_IMAGE_TIMESTAMP: 58fe9eff
- FAILURE_BUCKET_ID: 0x116_IMAGE_atikmpag.sys
- BUCKET_ID: 0x116_IMAGE_atikmpag.sys
- PRIMARY_PROBLEM_CLASS: 0x116_IMAGE_atikmpag.sys
- TARGET_TIME: 2017-07-21T02:22:10.000Z
- OSBUILD: 14393
- OSSERVICEPACK: 1480
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
- BUILDDATESTAMP_STR: 170706-2004
- BUILDLAB_STR: rs1_release
- BUILDOSVER_STR: 10.0.14393.1480
- ANALYSIS_SESSION_ELAPSED_TIME: 19df
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:0x116_image_atikmpag.sys
- FAILURE_ID_HASH: {e300aa8c-6915-3f37-7957-d2e4fc30a6fd}
- Followup: MachineOwner
- ========================================================================
- =================== Dump File: 072117-6843-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 14393 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 14393.1480.amd64fre.rs1_release.170706-2004
- Kernel base = 0xfffff801`93611000 PsLoadedModuleList = 0xfffff801`93910040
- Debug session time: Fri Jul 21 11:40:05.615 2017 (UTC - 4:00)
- System Uptime: 0 days 13:17:12.371
- BugCheck 116, {ffffcb03757be010, fffff80ae1c0f654, 0, d}
- *** WARNING: Unable to verify timestamp for atikmpag.sys
- *** ERROR: Module load completed but symbols could not be loaded for atikmpag.sys
- Probably caused by : atikmpag.sys ( atikmpag+f654 )
- Followup: MachineOwner
- VIDEO_TDR_FAILURE (116)
- Attempt to reset the display driver and recover from timeout failed.
- Arguments:
- Arg1: ffffcb03757be010, Optional pointer to internal TDR recovery context (TDR_RECOVERY_CONTEXT).
- Arg2: fffff80ae1c0f654, The pointer into responsible device driver module (e.g. owner tag).
- Arg3: 0000000000000000, Optional error code (NTSTATUS) of the last failed operation.
- Arg4: 000000000000000d, Optional internal context dependent data.
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
- SYSTEM_MANUFACTURER: MSI
- SYSTEM_PRODUCT_NAME: MS-7693
- SYSTEM_VERSION: 4.0
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: V22.4
- BIOS_DATE: 12/21/2015
- BASEBOARD_MANUFACTURER: MSI
- BASEBOARD_PRODUCT: 970 GAMING (MS-7693)
- BASEBOARD_VERSION: 4.0
- DUMP_TYPE: 2
- FAULTING_IP:
- atikmpag+f654
- fffff80a`e1c0f654 4883ec28 sub rsp,28h
- DEFAULT_BUCKET_ID: GRAPHICS_DRIVER_TDR_FAULT
- CPU_COUNT: 8
- CPU_MHZ: fa0
- CPU_VENDOR: AuthenticAMD
- CPU_FAMILY: 15
- CPU_MODEL: 2
- CPU_STEPPING: 0
- CUSTOMER_CRASH_COUNT: 1
- BUGCHECK_STR: 0x116
- PROCESS_NAME: System
- CURRENT_IRQL: 0
- STACK_TEXT:
- ffff9100`646467c8 fffff80a`e12da298 : 00000000`00000116 ffffcb03`757be010 fffff80a`e1c0f654 00000000`00000000 : nt!KeBugCheckEx
- ffff9100`646467d0 fffff80a`e12d99a3 : fffff80a`e1c0f654 ffffcb03`757be010 ffff9100`646468d9 00000000`00000000 : dxgkrnl!TdrBugcheckOnTimeout+0xec
- ffff9100`64646810 fffff80a`e10277b5 : ffffcb03`757be010 00000000`003b9b4d 00000000`00000009 fffff80a`e11790bd : dxgkrnl!TdrIsRecoveryRequired+0x193
- ffff9100`64646840 fffff80a`e1083a9e : ffffcb03`729fd000 00000000`00000002 ffffcb03`729fd000 ffffcb03`729fb000 : dxgmms2!VidSchiReportHwHang+0x4c1
- ffff9100`64646940 fffff80a`e1062eb7 : 00000000`00000002 00000000`002eb587 00000000`003b9b4d 00000000`00000001 : dxgmms2! ?? ::NNGAKEGL::`string'+0xf91e
- ffff9100`646469b0 fffff80a`e100a4c4 : ffffcb03`73ae5010 ffffcb03`729fb000 ffffcb03`73ae5018 00000000`00000002 : dxgmms2!VidSchiWaitForSchedulerEvents+0x337
- ffff9100`64646a70 fffff80a`e106f27f : ffffcb03`72be7800 ffff9100`64646bd0 ffffcb03`72be7800 ffffcb03`00000000 : dxgmms2!VidSchiScheduleCommandToRun+0x3d4
- ffff9100`64646b80 fffff80a`e106f240 : ffffcb03`729fb500 ffffcb03`729fb000 00000000`00000080 fffff80a`e106f1c0 : dxgmms2!VidSchiRun_PriorityTable+0x2f
- ffff9100`64646bd0 fffff801`936c7965 : ffff9100`63b07180 fffff801`93765d4f 00000000`011457d0 ffffcb03`72bfc800 : dxgmms2!VidSchiWorkerThread+0x80
- ffff9100`64646c10 fffff801`93765e26 : ffff9100`63b07180 ffffcb03`72bfc800 fffff801`936c7924 00000000`00000000 : nt!PspSystemThreadStartup+0x41
- ffff9100`64646c60 00000000`00000000 : ffff9100`64647000 ffff9100`64641000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
- STACK_COMMAND: kb
- THREAD_SHA1_HASH_MOD_FUNC: b894b9fd964d0d623be8fa8c727117633542f015
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 415f1eb38427f8c1e04eef804b3fcdda2dacb6cd
- THREAD_SHA1_HASH_MOD: 65b26f16328fe41a723c00193723d68b091ef48d
- FOLLOWUP_IP:
- atikmpag+f654
- fffff80a`e1c0f654 4883ec28 sub rsp,28h
- FAULT_INSTR_CODE: 28ec8348
- SYMBOL_NAME: atikmpag+f654
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: atikmpag
- IMAGE_NAME: atikmpag.sys
- DEBUG_FLR_IMAGE_TIMESTAMP: 58fe9eff
- FAILURE_BUCKET_ID: 0x116_IMAGE_atikmpag.sys
- BUCKET_ID: 0x116_IMAGE_atikmpag.sys
- PRIMARY_PROBLEM_CLASS: 0x116_IMAGE_atikmpag.sys
- TARGET_TIME: 2017-07-21T15:40:05.000Z
- OSBUILD: 14393
- OSSERVICEPACK: 1480
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
- BUILDDATESTAMP_STR: 170706-2004
- BUILDLAB_STR: rs1_release
- BUILDOSVER_STR: 10.0.14393.1480
- ANALYSIS_SESSION_ELAPSED_TIME: 1d0e
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:0x116_image_atikmpag.sys
- FAILURE_ID_HASH: {e300aa8c-6915-3f37-7957-d2e4fc30a6fd}
- Followup: MachineOwner
- ========================================================================
- =================== Dump File: 072217-7046-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 14393 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 14393.1480.amd64fre.rs1_release.170706-2004
- Kernel base = 0xfffff802`cac7a000 PsLoadedModuleList = 0xfffff802`caf79040
- Debug session time: Sat Jul 22 06:19:02.990 2017 (UTC - 4:00)
- System Uptime: 0 days 18:38:18.747
- BugCheck 116, {ffffbc88348514a0, fffff80210bef654, 0, d}
- *** WARNING: Unable to verify timestamp for atikmpag.sys
- *** ERROR: Module load completed but symbols could not be loaded for atikmpag.sys
- Probably caused by : atikmpag.sys ( atikmpag+f654 )
- Followup: MachineOwner
- VIDEO_TDR_FAILURE (116)
- Attempt to reset the display driver and recover from timeout failed.
- Arguments:
- Arg1: ffffbc88348514a0, Optional pointer to internal TDR recovery context (TDR_RECOVERY_CONTEXT).
- Arg2: fffff80210bef654, The pointer into responsible device driver module (e.g. owner tag).
- Arg3: 0000000000000000, Optional error code (NTSTATUS) of the last failed operation.
- Arg4: 000000000000000d, Optional internal context dependent data.
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
- SYSTEM_MANUFACTURER: MSI
- SYSTEM_PRODUCT_NAME: MS-7693
- SYSTEM_VERSION: 4.0
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: V22.4
- BIOS_DATE: 12/21/2015
- BASEBOARD_MANUFACTURER: MSI
- BASEBOARD_PRODUCT: 970 GAMING (MS-7693)
- BASEBOARD_VERSION: 4.0
- DUMP_TYPE: 2
- FAULTING_IP:
- atikmpag+f654
- fffff802`10bef654 4883ec28 sub rsp,28h
- DEFAULT_BUCKET_ID: GRAPHICS_DRIVER_TDR_FAULT
- CPU_COUNT: 8
- CPU_MHZ: fa0
- CPU_VENDOR: AuthenticAMD
- CPU_FAMILY: 15
- CPU_MODEL: 2
- CPU_STEPPING: 0
- CUSTOMER_CRASH_COUNT: 1
- BUGCHECK_STR: 0x116
- PROCESS_NAME: System
- CURRENT_IRQL: 0
- STACK_TEXT:
- ffff9800`da7fe7c8 fffff802`1010a298 : 00000000`00000116 ffffbc88`348514a0 fffff802`10bef654 00000000`00000000 : nt!KeBugCheckEx
- ffff9800`da7fe7d0 fffff802`101099a3 : fffff802`10bef654 ffffbc88`348514a0 ffff9800`da7fe8d9 00000000`00000000 : dxgkrnl!TdrBugcheckOnTimeout+0xec
- ffff9800`da7fe810 fffff802`11cc77b5 : ffffbc88`348514a0 00000000`003b9b4f 00000000`00000009 fffff802`0ffa90bd : dxgkrnl!TdrIsRecoveryRequired+0x193
- ffff9800`da7fe840 fffff802`11d23a9e : ffffbc88`33489000 00000000`00000002 ffffbc88`33489000 ffffbc88`3348b000 : dxgmms2!VidSchiReportHwHang+0x4c1
- ffff9800`da7fe940 fffff802`11d02eb7 : 00000000`00000002 00000000`0041861a 00000000`003b9b4f 00000000`00000001 : dxgmms2! ?? ::NNGAKEGL::`string'+0xf91e
- ffff9800`da7fe9b0 fffff802`11caa4c4 : 00000000`00000000 ffffbc88`3348b000 00000000`0000000f 00000000`00000000 : dxgmms2!VidSchiWaitForSchedulerEvents+0x337
- ffff9800`da7fea70 fffff802`11d0f27f : ffffbc88`335a9700 ffff9800`da7febd0 ffffbc88`335a9780 ffffbc88`00000000 : dxgmms2!VidSchiScheduleCommandToRun+0x3d4
- ffff9800`da7feb80 fffff802`11d0f240 : ffffbc88`3348b500 ffffbc88`3348b000 00000000`00000080 fffff802`11d0f1c0 : dxgmms2!VidSchiRun_PriorityTable+0x2f
- ffff9800`da7febd0 fffff802`cad30965 : ffff9800`d8b07180 fffff802`cadced4f 00000000`0112b26f ffffbc88`3356d800 : dxgmms2!VidSchiWorkerThread+0x80
- ffff9800`da7fec10 fffff802`cadcee26 : ffff9800`d8b07180 ffffbc88`3356d800 fffff802`cad30924 00000000`00000000 : nt!PspSystemThreadStartup+0x41
- ffff9800`da7fec60 00000000`00000000 : ffff9800`da7ff000 ffff9800`da7f9000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
- STACK_COMMAND: kb
- THREAD_SHA1_HASH_MOD_FUNC: b894b9fd964d0d623be8fa8c727117633542f015
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 415f1eb38427f8c1e04eef804b3fcdda2dacb6cd
- THREAD_SHA1_HASH_MOD: 65b26f16328fe41a723c00193723d68b091ef48d
- FOLLOWUP_IP:
- atikmpag+f654
- fffff802`10bef654 4883ec28 sub rsp,28h
- FAULT_INSTR_CODE: 28ec8348
- SYMBOL_NAME: atikmpag+f654
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: atikmpag
- IMAGE_NAME: atikmpag.sys
- DEBUG_FLR_IMAGE_TIMESTAMP: 58fe9eff
- FAILURE_BUCKET_ID: 0x116_IMAGE_atikmpag.sys
- BUCKET_ID: 0x116_IMAGE_atikmpag.sys
- PRIMARY_PROBLEM_CLASS: 0x116_IMAGE_atikmpag.sys
- TARGET_TIME: 2017-07-22T10:19:02.000Z
- OSBUILD: 14393
- OSSERVICEPACK: 1480
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
- BUILDDATESTAMP_STR: 170706-2004
- BUILDLAB_STR: rs1_release
- BUILDOSVER_STR: 10.0.14393.1480
- ANALYSIS_SESSION_ELAPSED_TIME: 1451
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:0x116_image_atikmpag.sys
- FAILURE_ID_HASH: {e300aa8c-6915-3f37-7957-d2e4fc30a6fd}
- Followup: MachineOwner
- ========================================================================
- =================== Dump File: 072617-6109-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 14393 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 14393.1480.amd64fre.rs1_release.170706-2004
- Kernel base = 0xfffff803`04092000 PsLoadedModuleList = 0xfffff803`04391040
- Debug session time: Wed Jul 26 01:58:24.649 2017 (UTC - 4:00)
- System Uptime: 0 days 0:00:15.406
- BugCheck 1E, {ffffffffc0000005, fffff803041e74c7, 0, ffffffffffffffff}
- Probably caused by : memory_corruption
- Followup: memory_corruption
- KMODE_EXCEPTION_NOT_HANDLED (1e)
- This is a very common bugcheck. Usually the exception address pinpoints
- the driver/function that caused the problem. Always note this address
- as well as the link date of the driver/image that contains this address.
- Arguments:
- Arg1: ffffffffc0000005, The exception code that was not handled
- Arg2: fffff803041e74c7, The address that the exception occurred at
- Arg3: 0000000000000000, Parameter 0 of the exception
- Arg4: ffffffffffffffff, Parameter 1 of the exception
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
- SYSTEM_MANUFACTURER: MSI
- SYSTEM_PRODUCT_NAME: MS-7693
- SYSTEM_VERSION: 4.0
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: V22.4
- BIOS_DATE: 12/21/2015
- BASEBOARD_MANUFACTURER: MSI
- BASEBOARD_PRODUCT: 970 GAMING (MS-7693)
- BASEBOARD_VERSION: 4.0
- DUMP_TYPE: 2
- READ_ADDRESS: fffff80304432338: Unable to get MiVisibleState
- ffffffffffffffff
- EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- FAULTING_IP:
- nt!ExpInterlockedPopEntrySListFault+0
- fffff803`041e74c7 498b08 mov rcx,qword ptr [r8]
- EXCEPTION_PARAMETER2: ffffffffffffffff
- BUGCHECK_STR: 0x1E_c0000005_R
- CPU_COUNT: 8
- CPU_MHZ: fa0
- CPU_VENDOR: AuthenticAMD
- CPU_FAMILY: 15
- CPU_MODEL: 2
- CPU_STEPPING: 0
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- PROCESS_NAME: explorer.exe
- CURRENT_IRQL: 0
- EXCEPTION_RECORD: 0000000000000001 -- (.exr 0x1)
- Cannot read Exception record @ 0000000000000001
- TRAP_FRAME: 0000000000000001 -- (.trap 0x1)
- Unable to read trap frame at 00000000`00000001
- LAST_CONTROL_TRANSFER: from fffff8030413a270 to fffff803041e1960
- STACK_TEXT:
- ffffb080`1467b548 fffff803`0413a270 : 00000000`0000001e ffffffff`c0000005 fffff803`041e74c7 00000000`00000000 : nt!KeBugCheckEx
- ffffb080`1467b550 fffff803`041ecc0e : 00000000`00000001 fffff803`043b0080 00000000`00000001 00000000`00000010 : nt!KiDispatchException+0x220
- ffffb080`1467bc10 fffff803`041eaebd : ffff9380`0b1f9360 00000000`00000000 00000000`00000000 00000000`00060000 : nt!KiExceptionDispatch+0xce
- ffffb080`1467bdf0 fffff803`041e74c7 : 00000000`00000001 fffff803`042dab45 ffffd88a`00279080 fffff803`041058b6 : nt!KiGeneralProtectionFault+0xfd
- ffffb080`1467bf80 fffff803`042dab45 : ffffd88a`00279080 fffff803`041058b6 ffffd88a`00279400 00000000`00000001 : nt!ExpInterlockedPopEntrySListFault
- ffffb080`1467bf90 fffff809`e00d9254 : ffffd88a`00000001 00000000`000000b0 00000000`00000000 fffff809`e00da329 : nt!ExAllocatePoolWithTag+0x105
- ffffb080`1467c080 fffff809`e099d9c8 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffb080`1467c1f0 : FLTMGR!FltAllocateContext+0x194
- ffffb080`1467c0c0 fffff809`e099dff1 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff809`e35941d1 : fileinfo!FIStreamCreate+0x88
- ffffb080`1467c140 fffff809`e0991b3e : ffffd889`fce2bb40 fffff803`00000001 00000000`00000110 00000000`00000000 : fileinfo!FIStreamGet+0xf1
- ffffb080`1467c1c0 fffff809`e00d46ca : ffffb080`1467c369 ffffb080`1467c4a0 ffffd88a`00231820 ffffd889`fcb77010 : fileinfo!FIPreReadWriteCallback+0x8e
- ffffb080`1467c2c0 fffff809`e00d4278 : ffffb080`1467c4a0 00000000`00000000 00000000`00000003 ffffd889`fcb77000 : FLTMGR!FltpPerformPreCallbacks+0x2ea
- ffffb080`1467c3d0 fffff809`e00d3386 : 00000000`00000000 ffffb080`1467c4a0 ffffd88a`003bd010 ffffb080`1467c4b0 : FLTMGR!FltpPassThroughInternal+0x88
- ffffb080`1467c400 fffff809`e00d312e : 00000000`00000000 ffffb080`1467c598 00000000`0000000c fffff803`043b0080 : FLTMGR!FltpPassThrough+0x1a6
- ffffb080`1467c480 fffff803`040d0610 : ffffd88a`003bd010 ffffd88a`003d95f0 00000000`00000000 ffffd88a`003bd010 : FLTMGR!FltpDispatch+0x9e
- ffffb080`1467c4e0 fffff803`04171083 : ffffd88a`003d95a0 fffff803`04108e8d ffffd88a`003d9600 ffffd88a`003d95c0 : nt!IoPageReadEx+0x2b0
- ffffb080`1467c550 fffff803`040d411d : 00000000`00000002 00000000`00000000 ffffd88a`003d95a0 ffffd88a`003d16c0 : nt!MiIssueHardFaultIo+0xcb
- ffffb080`1467c5e0 fffff803`040e806c : 00000000`c0033333 ffffd88a`003d95a0 fffff803`043b15c0 ffff8287`c74c5000 : nt!MiIssueHardFault+0x15d
- ffffb080`1467c680 fffff803`040df1f5 : ffffa007`bb62a060 ffffd88a`00446e90 00000000`00000000 00000000`00000002 : nt!MmAccessFault+0x11ec
- ffffb080`1467c880 fffff803`040dec75 : 00000000`00000030 00000000`00000001 00000100`01000001 00000000`00000004 : nt!MmCheckCachedPageStates+0x495
- ffffb080`1467ca30 fffff803`044b2ab7 : ffffd889`00000000 00000000`00000000 ffffb080`1467cb01 00000000`00000001 : nt!CcMapAndRead+0xe5
- ffffb080`1467ca90 fffff809`e0aeb100 : ffffd889`fafe27a8 00000000`00005000 00000000`00006000 ffffa007`0003b000 : nt!CcMapData+0x97
- ffffb080`1467cb00 fffff809`e0aea99f : ffffd889`ff69bdc8 ffffa007`b932bb40 ffff8287`00000000 ffffd889`ff69bdc8 : NTFS!ReadIndexBuffer+0xe0
- ffffb080`1467cbe0 fffff809`e0ae7543 : ffffd889`ff69bdc8 ffffa007`be9ee3f0 00000000`00000000 ffff8287`d65a4de0 : NTFS!FindFirstIndexEntry+0x17f
- ffffb080`1467cc90 fffff809`e0b38b25 : ffffd889`ff69bdc8 ffffa007`b845f8c2 ffffb080`14bb11a0 ffffb080`14bb1100 : NTFS!NtfsFindIndexEntry+0x63
- ffffb080`1467cd10 fffff809`e0b37ffd : ffffd889`ff69bdc8 ffffd88a`0043b4c0 ffffb080`14bb1100 ffffd88a`004ea200 : NTFS!NtfsCommonCreate+0x845
- ffffb080`1467cf50 fffff803`041e47f7 : ffffb080`14bb1090 00000000`00000000 00000000`00000000 000000f5`48afefd0 : NTFS!NtfsCommonCreateCallout+0x1d
- ffffb080`1467cf80 fffff803`041e47bd : 00000000`00006000 ffffb080`1467d000 ffffd88a`00279080 fffff803`0412e3b4 : nt!KxSwitchKernelStackCallout+0x27
- ffffb080`14bb0ed0 fffff803`0412e3b4 : 00000000`00000012 00000000`00006000 00000000`00000000 00000000`00000006 : nt!KiSwitchKernelStackContinue
- ffffb080`14bb0ef0 fffff803`0412e126 : ffffb080`14bac000 00000000`00006000 00000000`00000000 ffffb080`14bb0f70 : nt!KiExpandKernelStackAndCalloutOnStackSegment+0x134
- ffffb080`14bb0f70 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExpandKernelStackAndCalloutSwitchStack+0xa6
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff803040b7195-fffff803040b7196 2 bytes - nt!MmMapLockedPagesSpecifyCache+105
- [ 80 f6:00 ef ]
- fffff803040b7230-fffff803040b7232 3 bytes - nt!MmMapLockedPagesSpecifyCache+1a0 (+0x9b)
- [ 40 fb f6:80 77 ef ]
- fffff803040d004b-fffff803040d004c 2 bytes - nt!MiFindActualFaultingPte+3b (+0x18e1b)
- [ 80 f6:00 ef ]
- fffff803040d0152-fffff803040d0154 3 bytes - nt!MI_IS_PHYSICAL_ADDRESS+22 (+0x107)
- [ 40 fb f6:80 77 ef ]
- fffff803040d0160-fffff803040d0161 2 bytes - nt!MI_IS_PHYSICAL_ADDRESS+30 (+0x0e)
- [ 80 f6:00 ef ]
- fffff803040d41be-fffff803040d41bf 2 bytes - nt!MiIssueHardFault+1fe (+0x405e)
- [ 80 f6:00 ef ]
- fffff803040dbc01 - nt!MiRemoveLockedPageChargeAndDecRef+1a1 (+0x7a43)
- [ fa:93 ]
- fffff803040dbc60 - nt!MiRemoveLockedPageChargeAndDecRef+200 (+0x5f)
- [ fa:93 ]
- fffff803040e41f4-fffff803040e41f5 2 bytes - nt!MiCompletePrivateZeroFault+44 (+0x8594)
- [ 80 f6:00 ef ]
- fffff803040e63d8 - nt!MiGetPage+98 (+0x21e4)
- [ fa:93 ]
- fffff803040e6853 - nt!MiGetFreeOrZeroPage+2e3 (+0x47b)
- [ fa:93 ]
- fffff803040e68a9 - nt!MiGetFreeOrZeroPage+339 (+0x56)
- [ fa:93 ]
- fffff803040e987d-fffff803040e987e 2 bytes - nt!MiResolveProtoPteFault+4d (+0x2fd4)
- [ 80 f6:00 ef ]
- fffff803040e98a0 - nt!MiResolveProtoPteFault+70 (+0x23)
- [ fa:93 ]
- fffff803040e9904 - nt!MiResolveProtoPteFault+d4 (+0x64)
- [ fa:93 ]
- fffff803041a52de - nt!MiPurgeZeroList+6e (+0xbb9da)
- [ fa:93 ]
- fffff803042da387-fffff803042da389 3 bytes - nt!ExFreePoolWithTag+387
- [ 40 fb f6:80 77 ef ]
- 29 errors : !nt (fffff803040b7195-fffff803042da389)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-07-26T05:58:24.000Z
- OSBUILD: 14393
- OSSERVICEPACK: 1480
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
- BUILDDATESTAMP_STR: 170706-2004
- BUILDLAB_STR: rs1_release
- BUILDOSVER_STR: 10.0.14393.1480
- ANALYSIS_SESSION_ELAPSED_TIME: 39e3
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- ========================================================================
- =================== Dump File: 072617-6218-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 14393 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 14393.1480.amd64fre.rs1_release.170706-2004
- Kernel base = 0xfffff800`4c07d000 PsLoadedModuleList = 0xfffff800`4c37c040
- Debug session time: Wed Jul 26 14:08:49.811 2017 (UTC - 4:00)
- System Uptime: 0 days 0:01:07.567
- BugCheck 3B, {c0000005, fffff8004c0f059b, ffffb38024f9c460, 0}
- Probably caused by : memory_corruption
- Followup: memory_corruption
- SYSTEM_SERVICE_EXCEPTION (3b)
- An exception happened while executing a system service routine.
- Arguments:
- Arg1: 00000000c0000005, Exception code that caused the bugcheck
- Arg2: fffff8004c0f059b, Address of the instruction which caused the bugcheck
- Arg3: ffffb38024f9c460, Address of the context record for the exception that caused the bugcheck
- Arg4: 0000000000000000, zero.
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
- SYSTEM_MANUFACTURER: MSI
- SYSTEM_PRODUCT_NAME: MS-7693
- SYSTEM_VERSION: 4.0
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: V22.4
- BIOS_DATE: 12/21/2015
- BASEBOARD_MANUFACTURER: MSI
- BASEBOARD_PRODUCT: 970 GAMING (MS-7693)
- BASEBOARD_VERSION: 4.0
- DUMP_TYPE: 2
- EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- FAULTING_IP:
- nt!ObReferenceObjectSafeWithTag+b
- fffff800`4c0f059b 488b01 mov rax,qword ptr [rcx]
- CONTEXT: ffffb38024f9c460 -- (.cxr 0xffffb38024f9c460)
- rax=7ffff8004c7bcc00 rbx=ffff9d814ae683c0 rcx=fffb9d81472a57d0
- rdx=000000006e457350 rsi=ffff9d814acbb080 rdi=fffb9d81472a5af0
- rip=fffff8004c0f059b rsp=ffffb38024f9ce60 rbp=ffffb38024f9db80
- r8=0000000000000000 r9=fffff8004c07d000 r10=ffffb38022017fa0
- r11=ffff9d814ba8a740 r12=fffff8004c3763f0 r13=fffb9d81472a5800
- r14=0000000000000000 r15=0000000000000011
- iopl=0 nv up ei ng nz na pe cy
- cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010283
- nt!ObReferenceObjectSafeWithTag+0xb:
- fffff800`4c0f059b 488b01 mov rax,qword ptr [rcx] ds:002b:fffb9d81`472a57d0=????????????????
- Resetting default scope
- CPU_COUNT: 8
- CPU_MHZ: fa0
- CPU_VENDOR: AuthenticAMD
- CPU_FAMILY: 15
- CPU_MODEL: 2
- CPU_STEPPING: 0
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- BUGCHECK_STR: 0x3B
- PROCESS_NAME: KillerService.exe
- CURRENT_IRQL: 0
- LAST_CONTROL_TRANSFER: from fffff8004c4a4440 to fffff8004c0f059b
- STACK_TEXT:
- ffffb380`24f9ce60 fffff800`4c4a4440 : ffff9d81`4ae683c0 ffffb380`24f9db80 00000000`00000000 00000000`00000010 : nt!ObReferenceObjectSafeWithTag+0xb
- ffffb380`24f9ce90 fffff800`4c481175 : ffffe80b`9f769aa0 fffff800`00010000 00000000`00000000 00000000`00000000 : nt!ExpGetProcessInformation+0xd10
- ffffb380`24f9d2f0 fffff800`4c480b6b : 00000000`00000000 00000000`00000000 00000000`00000102 ffffffff`fffe7960 : nt!ExpQuerySystemInformation+0x4f5
- ffffb380`24f9dac0 fffff800`4c1d7693 : ffff9d81`4acbb080 00000000`0000000a ffffb380`24f9dad8 ffff9d81`4ae8b2b0 : nt!NtQuerySystemInformation+0x2b
- ffffb380`24f9db00 00007ff9`205467a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
- 0000000e`3f2fe6e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`205467a4
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff8004c0d33a4 - nt!MiResolvePageTablePage+54
- [ f6:fa ]
- fffff8004c0d487e - nt!MiResolveProtoPteFault+4e (+0x14da)
- [ f6:fa ]
- fffff8004c0d48a0 - nt!MiResolveProtoPteFault+70 (+0x22)
- [ fa:c3 ]
- fffff8004c0d4904 - nt!MiResolveProtoPteFault+d4 (+0x64)
- [ fa:c3 ]
- fffff8004c0df231 - nt!MiDeleteValidSystemPage+251 (+0xa92d)
- [ f6:fa ]
- fffff8004c0df24e - nt!MiDeleteValidSystemPage+26e (+0x1d)
- [ fa:c3 ]
- fffff8004c1902de - nt!MiPurgeZeroList+6e (+0xb1090)
- [ fa:c3 ]
- fffff8004c2c5388-fffff8004c2c5389 2 bytes - nt!ExFreePoolWithTag+388
- [ fb f6:fd fa ]
- 9 errors : !nt (fffff8004c0d33a4-fffff8004c2c5389)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- STACK_COMMAND: .cxr 0xffffb38024f9c460 ; kb
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-07-26T18:08:49.000Z
- OSBUILD: 14393
- OSSERVICEPACK: 1480
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
- BUILDDATESTAMP_STR: 170706-2004
- BUILDLAB_STR: rs1_release
- BUILDOSVER_STR: 10.0.14393.1480
- ANALYSIS_SESSION_ELAPSED_TIME: 3c36
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- ========================================================================
- =================== Dump File: 072617-6500-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 14393 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 14393.1480.amd64fre.rs1_release.170706-2004
- Kernel base = 0xfffff803`1a808000 PsLoadedModuleList = 0xfffff803`1ab07040
- Debug session time: Wed Jul 26 14:49:00.164 2017 (UTC - 4:00)
- System Uptime: 0 days 0:00:40.921
- BugCheck 3B, {c0000005, fffff8031a817c25, ffffa480a14d9df0, 0}
- Probably caused by : memory_corruption
- Followup: memory_corruption
- SYSTEM_SERVICE_EXCEPTION (3b)
- An exception happened while executing a system service routine.
- Arguments:
- Arg1: 00000000c0000005, Exception code that caused the bugcheck
- Arg2: fffff8031a817c25, Address of the instruction which caused the bugcheck
- Arg3: ffffa480a14d9df0, Address of the context record for the exception that caused the bugcheck
- Arg4: 0000000000000000, zero.
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
- SYSTEM_MANUFACTURER: MSI
- SYSTEM_PRODUCT_NAME: MS-7693
- SYSTEM_VERSION: 4.0
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: V22.4
- BIOS_DATE: 12/21/2015
- BASEBOARD_MANUFACTURER: MSI
- BASEBOARD_PRODUCT: 970 GAMING (MS-7693)
- BASEBOARD_VERSION: 4.0
- DUMP_TYPE: 2
- EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- FAULTING_IP:
- nt!PspReturnQuota+45
- fffff803`1a817c25 488b3b mov rdi,qword ptr [rbx]
- CONTEXT: ffffa480a14d9df0 -- (.cxr 0xffffa480a14d9df0)
- rax=fffff8031aba96e8 rbx=fffb900601c392c0 rcx=fffb900601c392c0
- rdx=0000000000000000 rsi=0000000000000000 rdi=00ffff900602ea87
- rip=fffff8031a817c25 rsp=ffffa480a14da7f0 rbp=0000000000000000
- r8=0000000000000000 r9=00000000000007e0 r10=0000000000000000
- r11=ffffa480a14da890 r12=fffb900601c392c0 r13=0000000000000005
- r14=00000000000007e0 r15=0000000000000000
- iopl=0 nv up ei pl zr ac po nc
- cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010256
- nt!PspReturnQuota+0x45:
- fffff803`1a817c25 488b3b mov rdi,qword ptr [rbx] ds:002b:fffb9006`01c392c0=????????????????
- Resetting default scope
- CPU_COUNT: 8
- CPU_MHZ: fa0
- CPU_VENDOR: AuthenticAMD
- CPU_FAMILY: 15
- CPU_MODEL: 2
- CPU_STEPPING: 0
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- BUGCHECK_STR: 0x3B
- PROCESS_NAME: ShellExperienceHost.exe
- CURRENT_IRQL: 0
- LAST_CONTROL_TRANSFER: from fffff8031ac1057d to fffff8031a817c25
- STACK_TEXT:
- ffffa480`a14da7f0 fffff803`1ac1057d : ffff9006`02ea87d0 ffff9006`02ea87d0 ffff9005`fd6aca70 fffb9006`01c392c0 : nt!PspReturnQuota+0x45
- ffffa480`a14da850 fffff803`1ac10400 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpFreeObject+0x12d
- ffffa480`a14da8c0 fffff803`1a87b566 : 00000000`00000000 00000000`00000000 ffff9006`02ea87d0 ffff9006`02ea8800 : nt!ObpRemoveObjectRoutine+0x80
- ffffa480`a14da920 fffff803`1ac2baeb : 00000000`00000000 00000000`00000000 ffff9006`02ea87d0 00000000`00000000 : nt!ObfDereferenceObjectWithTag+0xc6
- ffffa480`a14da960 fffff803`1ac7666b : ffff9006`02fa2080 00000083`388ff6e8 00000083`388ff760 00000000`00000000 : nt!ObCloseHandleTableEntry+0x28b
- ffffa480`a14daaa0 fffff803`1a962693 : ffff9006`02fa2080 ffffa480`a14dab10 00000000`00000000 000001d5`dbeb14c0 : nt!NtClose+0xcb
- ffffa480`a14dab00 00007ff8`1e1462c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
- 00000083`388ff6c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`1e1462c4
- CHKIMG_EXTENSION: !chkimg -lo 50 -db !win32k
- 256 errors : !win32k (ffff830fc8461ac0-ffff830fc8461bbf)
- ffff830fc8461ac0 *00 *ea *d1 *ff *00 *f2 *d1 *ff *00 *fa *d1 *ff *80 *f3 *cf *ff ................
- ffff830fc8461ad0 *e1 *f3 *cf *ff *40 *f4 *cf *ff *a0 *f4 *cf *ff *00 *f5 *cf *ff ....@...........
- ffff830fc8461ae0 *60 *f5 *cf *ff *c0 *f5 *cf *ff *23 *f6 *cf *ff *87 *f6 *cf *ff `.......#.......
- ffff830fc8461af0 *e0 *f6 *cf *ff *40 *f7 *cf *ff *a0 *f7 *cf *ff *00 *f8 *cf *ff ....@...........
- ffff830fc8461b00 *60 *f8 *cf *ff *c0 *f8 *cf *ff *20 *f9 *cf *ff *80 *f9 *cf *ff `....... .......
- ffff830fc8461b10 *00 *02 *d2 *ff *40 *fa *cf *ff *a0 *fa *cf *ff *00 *fb *cf *ff ....@...........
- ffff830fc8461b20 *60 *fb *cf *ff *c0 *fb *cf *ff *20 *fc *cf *ff *81 *fc *cf *ff `....... .......
- ffff830fc8461b30 *e0 *fc *cf *ff *40 *fd *cf *ff *a0 *fd *cf *ff *04 *fe *cf *ff ....@...........
- ffff830fc8461b40 *60 *fe *cf *ff *c0 *fe *cf *ff *20 *ff *cf *ff *81 *ff *cf *ff `....... .......
- ffff830fc8461b50 *e0 *ff *cf *ff *40 *00 *d0 *ff *a0 *00 *d0 *ff *03 *01 *d0 *ff ....@...........
- ffff830fc8461b60 *60 *01 *d0 *ff *00 *0a *d2 *ff *20 *02 *d0 *ff *80 *02 *d0 *ff `....... .......
- ffff830fc8461b70 *ec *02 *d0 *ff *40 *03 *d0 *ff *a0 *03 *d0 *ff *00 *12 *d2 *ff ....@...........
- ffff830fc8461b80 *60 *04 *d0 *ff *c0 *04 *d0 *ff *20 *05 *d0 *ff *80 *05 *d0 *ff `....... .......
- ffff830fc8461b90 *e8 *05 *d0 *ff *40 *06 *d0 *ff *a0 *06 *d0 *ff *00 *07 *d0 *ff ....@...........
- ffff830fc8461ba0 *60 *07 *d0 *ff *c0 *07 *d0 *ff *20 *08 *d0 *ff *85 *08 *d0 *ff `....... .......
- ffff830fc8461bb0 *e0 *08 *d0 *ff *40 *09 *d0 *ff *a0 *09 *d0 *ff *00 *0a *d0 *ff ....@...........
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE_256
- STACK_COMMAND: .cxr 0xffffa480a14d9df0 ; kb
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE_256
- BUCKET_ID: MEMORY_CORRUPTION_LARGE_256
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE_256
- TARGET_TIME: 2017-07-26T18:49:00.000Z
- OSBUILD: 14393
- OSSERVICEPACK: 1480
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
- BUILDDATESTAMP_STR: 170706-2004
- BUILDLAB_STR: rs1_release
- BUILDOSVER_STR: 10.0.14393.1480
- ANALYSIS_SESSION_ELAPSED_TIME: 29b2
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large_256
- FAILURE_ID_HASH: {c4e440c8-f34a-f4bb-4c2a-b6acf02f9cce}
- Followup: memory_corruption
- ========================================================================
- =================== Dump File: 072617-6703-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 14393 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 14393.1480.amd64fre.rs1_release.170706-2004
- Kernel base = 0xfffff803`20c86000 PsLoadedModuleList = 0xfffff803`20f85040
- Debug session time: Wed Jul 26 04:29:12.540 2017 (UTC - 4:00)
- System Uptime: 0 days 1:35:12.297
- BugCheck 50, {ffffdd00dc6c4048, 0, fffff803212e5de7, 2}
- Could not read faulting driver name
- Probably caused by : memory_corruption
- Followup: memory_corruption
- PAGE_FAULT_IN_NONPAGED_AREA (50)
- Invalid system memory was referenced. This cannot be protected by try-except.
- Typically the address is just plain bad or it is pointing at freed memory.
- Arguments:
- Arg1: ffffdd00dc6c4048, memory referenced.
- Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
- Arg3: fffff803212e5de7, If non-zero, the instruction address which referenced the bad memory
- address.
- Arg4: 0000000000000002, (reserved)
- Debugging Details:
- Could not read faulting driver name
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
- SYSTEM_MANUFACTURER: MSI
- SYSTEM_PRODUCT_NAME: MS-7693
- SYSTEM_VERSION: 4.0
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: V22.4
- BIOS_DATE: 12/21/2015
- BASEBOARD_MANUFACTURER: MSI
- BASEBOARD_PRODUCT: 970 GAMING (MS-7693)
- BASEBOARD_VERSION: 4.0
- DUMP_TYPE: 2
- READ_ADDRESS: fffff80321026338: Unable to get MiVisibleState
- ffffdd00dc6c4048
- FAULTING_IP:
- nt!ObpCaptureHandleInformation+63
- fffff803`212e5de7 0fb64218 movzx eax,byte ptr [rdx+18h]
- MM_INTERNAL_CODE: 2
- CPU_COUNT: 8
- CPU_MHZ: fa0
- CPU_VENDOR: AuthenticAMD
- CPU_FAMILY: 15
- CPU_MODEL: 2
- CPU_STEPPING: 0
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- BUGCHECK_STR: AV
- PROCESS_NAME: GameOverlayUI.exe
- CURRENT_IRQL: 0
- TRAP_FRAME: ffff8001f07cd050 -- (.trap 0xffff8001f07cd050)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=00ffffdd00dc6c40 rbx=0000000000000000 rcx=0000000000000040
- rdx=ffffdd00dc6c4030 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff803212e5de7 rsp=ffff8001f07cd1e8 rbp=ffffae033efee550
- r8=ffffae033efee550 r9=0000000000001954 r10=ffff8001f07cd278
- r11=00000000000016a4 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl nz ac pe nc
- nt!ObpCaptureHandleInformation+0x63:
- fffff803`212e5de7 0fb64218 movzx eax,byte ptr [rdx+18h] ds:ffffdd00`dc6c4048=??
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff80320dffe11 to fffff80320dd5960
- STACK_TEXT:
- ffff8001`f07ccd58 fffff803`20dffe11 : 00000000`00000050 ffffdd00`dc6c4048 00000000`00000000 ffff8001`f07cd050 : nt!KeBugCheckEx
- ffff8001`f07ccd60 fffff803`20cdb0fd : 00000000`00000000 00000000`00000000 ffff8001`f07cd050 ffffdd00`dc6c4048 : nt!MiSystemFault+0x100201
- ffff8001`f07cce50 fffff803`20ddeffc : 00000000`00000000 00001f80`00000001 dd04dc46`7e400001 ffffae03`3e6c2580 : nt!MmAccessFault+0x27d
- ffff8001`f07cd050 fffff803`212e5de7 : fffff803`2132b527 00000000`00001954 00000000`00000000 ffffdd04`00000000 : nt!KiPageFault+0x13c
- ffff8001`f07cd1e8 fffff803`2132b527 : 00000000`00001954 00000000`00000000 ffffdd04`00000000 00000000`00000000 : nt!ObpCaptureHandleInformation+0x63
- ffff8001`f07cd1f0 fffff803`212e5cfc : fffff803`212e5d84 ffff8fff`4f2c3580 ffff8001`00372aa0 ffff8001`f07cd324 : nt!ExpSnapShotHandleTables+0x127
- ffff8001`f07cd270 fffff803`21329237 : ffff8001`f07cd324 00000000`000c3548 00000000`00372aa0 00000000`00000000 : nt!ObGetHandleInformation+0x3c
- ffff8001`f07cd2b0 fffff803`2120d1d3 : 00000000`00000010 00000000`00020000 ffff8fff`4f200050 ffffdd04`de96b000 : nt!ExpGetHandleInformation+0x53
- ffff8001`f07cd2f0 fffff803`21089b6b : 00000000`00000002 00000000`0000c000 ffffffff`ffffffff 00000000`00ad0000 : nt!ExpQuerySystemInformation+0x183553
- ffff8001`f07cdac0 fffff803`20de0693 : ffffdd04`dcedf080 00000000`00000000 ffff8001`f07cdad8 ffffdd04`dcce3c50 : nt!NtQuerySystemInformation+0x2b
- ffff8001`f07cdb00 00007ffb`836d67a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
- 00000000`00c8df98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`836d67a4
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff80320cab383-fffff80320cab384 2 bytes - nt!MmMapLockedPagesSpecifyCache+2f3
- [ 80 fa:00 92 ]
- fffff80320cab406-fffff80320cab407 2 bytes - nt!MmMapLockedPagesSpecifyCache+376 (+0x83)
- [ 80 fa:00 92 ]
- fffff80320cd81f4-fffff80320cd81f5 2 bytes - nt!MiCompletePrivateZeroFault+44 (+0x2cdee)
- [ 80 f6:00 c5 ]
- fffff80320cd89d0-fffff80320cd89d1 2 bytes - nt!MiCompletePrivateZeroFault+820 (+0x7dc)
- [ 80 fa:00 92 ]
- fffff80320cd8a93-fffff80320cd8a94 2 bytes - nt!MiCompletePrivateZeroFault+8e3 (+0xc3)
- [ 80 fa:00 92 ]
- fffff80320cd8f21-fffff80320cd8f22 2 bytes - nt!MiAllocateWsle+421 (+0x48e)
- [ 80 f6:00 c5 ]
- fffff80320cda3d7-fffff80320cda3d8 2 bytes - nt!MiGetPage+97 (+0x14b6)
- [ 80 fa:00 92 ]
- fffff80320cda5ea-fffff80320cda5eb 2 bytes - nt!MiGetFreeOrZeroPage+7a (+0x213)
- [ 80 fa:00 92 ]
- fffff80320cdc3a3-fffff80320cdc3a4 2 bytes - nt!MiResolvePageTablePage+53 (+0x1db9)
- [ 80 f6:00 c5 ]
- fffff80320d992dd-fffff80320d992de 2 bytes - nt!MiPurgeZeroList+6d (+0xbcf3a)
- [ 80 fa:00 92 ]
- 20 errors : !nt (fffff80320cab383-fffff80320d992de)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-07-26T08:29:12.000Z
- OSBUILD: 14393
- OSSERVICEPACK: 1480
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
- BUILDDATESTAMP_STR: 170706-2004
- BUILDLAB_STR: rs1_release
- BUILDOSVER_STR: 10.0.14393.1480
- ANALYSIS_SESSION_ELAPSED_TIME: 3113
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement