Advertisement
Guest User

Untitled

a guest
Jul 21st, 2017
210
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 41.92 KB | None | 0 0
  1. Microsoft (R) Windows Debugger Version 10.0.14321.1024 X86
  2. Copyright (c) Microsoft Corporation. All rights reserved.
  3.  
  4. ========================================================================
  5. =================== Dump File: 072017-12593-01.dmp ===================
  6. ========================================================================
  7. Mini Kernel Dump File: Only registers and stack trace are available
  8. Windows 10 Kernel Version 15063 MP (4 procs) Free x64
  9. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  10. Built by: 15063.0.amd64fre.rs2_release.170317-1834
  11. Kernel base = 0xfffff802`a1601000 PsLoadedModuleList = 0xfffff802`a194d5e0
  12. Debug session time: Thu Jul 20 04:51:52.788 2017 (UTC - 4:00)
  13. System Uptime: 0 days 10:16:30.542
  14.  
  15. BugCheck 4E, {2, 38a51, 41ffff, 1}
  16. Probably caused by : memory_corruption
  17. Followup: memory_corruption
  18.  
  19. PFN_LIST_CORRUPT (4e)
  20. Typically caused by drivers passing bad memory descriptor lists (ie: calling
  21. MmUnlockPages twice with the same list, etc). If a kernel debugger is
  22. available get the stack trace.
  23.  
  24. Arguments:
  25. Arg1: 0000000000000002, A list entry was corrupt
  26. Arg2: 0000000000038a51, entry in list being removed
  27. Arg3: 000000000041ffff, highest physical page number
  28. Arg4: 0000000000000001, reference count of entry being removed
  29.  
  30. Debugging Details:
  31. DUMP_CLASS: 1
  32. DUMP_QUALIFIER: 400
  33. BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
  34. SYSTEM_MANUFACTURER: HP-Pavilion
  35. SYSTEM_PRODUCT_NAME: AY614AAR-ABA p6347c
  36. SYSTEM_SKU: AY614AAR#ABA
  37. BIOS_VENDOR: American Megatrends Inc.
  38. BIOS_VERSION: 5.12
  39. BIOS_DATE: 05/21/2010
  40. BASEBOARD_MANUFACTURER: FOXCONN
  41. BASEBOARD_PRODUCT: ALOE
  42. BASEBOARD_VERSION: 1.01
  43. DUMP_TYPE: 2
  44. BUGCHECK_STR: 0x4E_2
  45. CPU_COUNT: 4
  46. CPU_MHZ: af0
  47. CPU_VENDOR: AuthenticAMD
  48. CPU_FAMILY: 10
  49. CPU_MODEL: 5
  50. CPU_STEPPING: 2
  51. CUSTOMER_CRASH_COUNT: 1
  52. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  53.  
  54. PROCESS_NAME: bztransmit64.exe
  55.  
  56. CURRENT_IRQL: 2
  57. LAST_CONTROL_TRANSFER: from fffff802a17a749b to fffff802a176d4c0
  58. STACK_TEXT:
  59. ffffc100`72148758 fffff802`a17a749b : 00000000`0000004e 00000000`00000002 00000000`00038a51 00000000`0041ffff : nt!KeBugCheckEx
  60. ffffc100`72148760 fffff802`a169a02c : ffffd50f`9d7c2d90 ffffd50f`00000000 fffff802`a197e100 ffffd50f`9d7c2d90 : nt!MiUnlinkPageFromList+0x10c8cb
  61. ffffc100`72148800 fffff802`a168fa38 : 00000000`04d6be38 ffffba00`00026b58 ffffd50f`9d9d83f8 ffffd50f`9d45f580 : nt!MiResolveTransitionFault+0x16c
  62. ffffc100`721488d0 fffff802`a168de63 : 80000000`38a51820 00000000`04d6be38 ffffc100`72148bb0 00000000`00000000 : nt!MiDispatchFault+0xc88
  63. ffffc100`72148a50 fffff802`a1776d72 : ffffd50f`985137c0 00000000`00000000 00000000`00000000 00000000`001a0ee0 : nt!MmAccessFault+0x673
  64. ffffc100`72148c40 00000001`40183820 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x132
  65. 00000000`009fe9b0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00000001`40183820
  66. STACK_COMMAND: kb
  67. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  68. fffff802a168fac8 - nt!MiDispatchFault+d18
  69. [ fa:b1 ]
  70. fffff802a169a119-fffff802a169a11a 2 bytes - nt!MiResolveTransitionFault+259 (+0xa651)
  71. [ 80 f6:00 ba ]
  72. 3 errors : !nt (fffff802a168fac8-fffff802a169a11a)
  73. MODULE_NAME: memory_corruption
  74.  
  75. IMAGE_NAME: memory_corruption
  76.  
  77. FOLLOWUP_NAME: memory_corruption
  78. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  79. MEMORY_CORRUPTOR: LARGE
  80. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  81. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  82. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  83. TARGET_TIME: 2017-07-20T08:51:52.000Z
  84. OSBUILD: 15063
  85. OSSERVICEPACK: 483
  86. SERVICEPACK_NUMBER: 0
  87. OS_REVISION: 0
  88. SUITE_MASK: 784
  89. PRODUCT_TYPE: 1
  90. OSPLATFORM_TYPE: x64
  91. OSNAME: Windows 10
  92. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  93. USER_LCID: 0
  94. OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
  95. BUILDDATESTAMP_STR: 160101.0800
  96. BUILDLAB_STR: WinBuild
  97. BUILDOSVER_STR: 10.0.15063.483
  98. ANALYSIS_SESSION_ELAPSED_TIME: 29d9
  99. ANALYSIS_SOURCE: KM
  100. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  101. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  102. Followup: memory_corruption
  103.  
  104. =============================== Drivers ================================
  105. ffffe51c`bafd0000 ffffe51c`bb011000 cdd (deferred)
  106. Image path: \SystemRoot\System32\cdd.dll
  107. Image name: cdd.dll
  108. Timestamp: unavailable (00000000)
  109. ffffe51c`bb020000 ffffe51c`bb082000 ATMFD (deferred)
  110. Image path: \SystemRoot\System32\ATMFD.DLL
  111. Image name: ATMFD.DLL
  112. Timestamp: unavailable (00000000)
  113. fffff802`a0cc0000 fffff802`a0d86000 peauth (deferred)
  114. Image path: \SystemRoot\system32\drivers\peauth.sys
  115. Image name: peauth.sys
  116. Timestamp: Sat Dec 9 21:03:08 1989 (2581B95C)
  117. fffff802`a0ef0000 fffff802`a0efe000 MpKslba214679 (deferred)
  118. Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{6B0F939C-1767-46DF-B2B8-91B3E0940F17}\MpKslba214679.sys
  119. Image name: MpKslba214679.sys
  120. Timestamp: Tue May 19 21:50:37 2015 (555BE86D)
  121. fffff802`a0f40000 fffff802`a0faf000 dump_ahcix64s (deferred)
  122. Image path: \SystemRoot\System32\Drivers\dump_ahcix64s.sys
  123. Image name: dump_ahcix64s.sys
  124. Timestamp: Fri Apr 4 03:56:04 2008 (47F5DF14)
  125. fffff80f`96af0000 fffff80f`96afbe00 PxHlpa64 (deferred)
  126. Image path: \SystemRoot\System32\Drivers\PxHlpa64.sys
  127. Image name: PxHlpa64.sys
  128. Timestamp: Tue Jun 23 19:16:35 2009 (4A416253)
  129. fffff80f`970c0000 fffff80f`970dc000 mcupdate_AuthenticAMD (deferred)
  130. Image path: \SystemRoot\system32\mcupdate_AuthenticAMD.dll
  131. Image name: mcupdate_AuthenticAMD.dll
  132. Timestamp: Tue Jan 31 06:16:29 1978 (0F346A8D)
  133. fffff80f`97540000 fffff80f`975af000 ahcix64s (deferred)
  134. Image path: \SystemRoot\System32\drivers\ahcix64s.sys
  135. Image name: ahcix64s.sys
  136. Timestamp: Fri Apr 4 03:56:04 2008 (47F5DF14)
  137. fffff80f`97850000 fffff80f`9785a000 Null (deferred)
  138. Image path: \SystemRoot\System32\Drivers\Null.SYS
  139. Image name: Null.SYS
  140. Timestamp: unavailable (00000000)
  141. fffff80f`98190000 fffff80f`9819a000 SASKUTIL64 (deferred)
  142. Image path: \??\C:\Program Files\SUPERAntiSpyware\SASKUTIL64.SYS
  143. Image name: SASKUTIL64.SYS
  144. Timestamp: Tue Jul 12 17:00:01 2011 (4E1CB5D1)
  145. fffff80f`981a0000 fffff80f`981aa000 SASDIFSV64 (deferred)
  146. Image path: \??\C:\Program Files\SUPERAntiSpyware\SASDIFSV64.SYS
  147. Image name: SASDIFSV64.SYS
  148. Timestamp: Thu Jul 21 19:03:00 2011 (4E28B024)
  149. fffff80f`981f0000 fffff80f`981fe000 MpKslf27c42fa (deferred)
  150. Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{01B80F9B-85D2-4DB0-990A-36D7C35449F7}\MpKslf27c42fa.sys
  151. Image name: MpKslf27c42fa.sys
  152. Timestamp: Tue May 19 21:50:37 2015 (555BE86D)
  153. fffff80f`98200000 fffff80f`9820e000 MpKsled2e402c (deferred)
  154. Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{169092EE-1439-4C3C-808A-6C965F9ED1F7}\MpKsled2e402c.sys
  155. Image name: MpKsled2e402c.sys
  156. Timestamp: Tue May 19 21:50:37 2015 (555BE86D)
  157. fffff80f`98210000 fffff80f`9821e000 MpKsldaaa8b1f (deferred)
  158. Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{077C5A6B-D9ED-4051-B5C4-A0BE8869DEEB}\MpKsldaaa8b1f.sys
  159. Image name: MpKsldaaa8b1f.sys
  160. Timestamp: Tue May 19 21:50:37 2015 (555BE86D)
  161. fffff80f`98220000 fffff80f`9822e000 MpKslbb0407e9 (deferred)
  162. Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{195B3084-1C56-46DE-B3D1-6AA393D5F3A0}\MpKslbb0407e9.sys
  163. Image name: MpKslbb0407e9.sys
  164. Timestamp: Tue May 19 21:50:37 2015 (555BE86D)
  165. fffff80f`98230000 fffff80f`9823e000 MpKslb0c8cfeb (deferred)
  166. Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{D48EEE93-BF6F-433A-BDF3-BE4D9BE6A867}\MpKslb0c8cfeb.sys
  167. Image name: MpKslb0c8cfeb.sys
  168. Timestamp: Tue May 19 21:50:37 2015 (555BE86D)
  169. fffff80f`98240000 fffff80f`9824e000 MpKsla1911328 (deferred)
  170. Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{58DF769D-C35A-4939-8909-B2F42BE2163A}\MpKsla1911328.sys
  171. Image name: MpKsla1911328.sys
  172. Timestamp: Tue May 19 21:50:37 2015 (555BE86D)
  173. fffff80f`98250000 fffff80f`9825e000 MpKsl5ab50aff (deferred)
  174. Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{567CFB22-4587-4745-9756-43E6DF3F4DE4}\MpKsl5ab50aff.sys
  175. Image name: MpKsl5ab50aff.sys
  176. Timestamp: Tue May 19 21:50:37 2015 (555BE86D)
  177. fffff80f`98260000 fffff80f`9826e000 MpKsl4633795b (deferred)
  178. Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{8FDFD769-9728-4356-B9E3-A6598CBA6CE1}\MpKsl4633795b.sys
  179. Image name: MpKsl4633795b.sys
  180. Timestamp: Tue May 19 21:50:37 2015 (555BE86D)
  181. fffff80f`98270000 fffff80f`9827e000 MpKsl20d2fb22 (deferred)
  182. Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{F85C5305-1F53-4842-BD5A-6CF64FC01C82}\MpKsl20d2fb22.sys
  183. Image name: MpKsl20d2fb22.sys
  184. Timestamp: Tue May 19 21:50:37 2015 (555BE86D)
  185. fffff80f`98280000 fffff80f`9828e000 MpKsl15a31c6b (deferred)
  186. Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{8FDFD769-9728-4356-B9E3-A6598CBA6CE1}\MpKsl15a31c6b.sys
  187. Image name: MpKsl15a31c6b.sys
  188. Timestamp: Tue May 19 21:50:37 2015 (555BE86D)
  189. fffff80f`983f0000 fffff80f`9844f000 atikmpag (deferred)
  190. Image path: \SystemRoot\system32\DRIVERS\atikmpag.sys
  191. Image name: atikmpag.sys
  192. Timestamp: Tue Jan 13 11:20:43 2015 (54B545DB)
  193. fffff80f`98450000 fffff80f`9882ed80 RTKVHD64 (deferred)
  194. Image path: \SystemRoot\system32\drivers\RTKVHD64.sys
  195. Image name: RTKVHD64.sys
  196. Timestamp: Tue Jun 19 04:50:56 2012 (4FE03D70)
  197. fffff80f`98cf0000 fffff80f`98d04000 fortknoxfw (deferred)
  198. Image path: \SystemRoot\system32\drivers\fortknoxfw.sys
  199. Image name: fortknoxfw.sys
  200. Timestamp: Tue Dec 23 10:01:38 2014 (549983D2)
  201. fffff80f`99a00000 fffff80f`99a98000 rt640x64 (deferred)
  202. Image path: \SystemRoot\System32\drivers\rt640x64.sys
  203. Image name: rt640x64.sys
  204. Timestamp: Wed Oct 5 09:32:55 2016 (57F50107)
  205. fffff80f`99be0000 fffff80f`99c01000 drmk (deferred)
  206. Image path: \SystemRoot\System32\drivers\drmk.sys
  207. Image name: drmk.sys
  208. Timestamp: ***** Invalid (A01C1986)
  209. fffff80f`99dc0000 fffff80f`9a973000 atikmdag (deferred)
  210. Image path: \SystemRoot\system32\DRIVERS\atikmdag.sys
  211. Image name: atikmdag.sys
  212. Timestamp: Tue Jan 13 11:48:21 2015 (54B54C55)
  213. Unloaded modules:
  214. fffff802`a0ff0000 fffff802`a1013000 WdNisDrv.sys
  215. Timestamp: unavailable (00000000)
  216. Checksum: 00000000
  217. ImageSize: 00023000
  218. fffff802`a0ff0000 fffff802`a1013000 WdNisDrv.sys
  219. Timestamp: unavailable (00000000)
  220. Checksum: 00000000
  221. ImageSize: 00023000
  222. fffff802`a1000000 fffff802`a1023000 WdNisDrv.sys
  223. Timestamp: unavailable (00000000)
  224. Checksum: 00000000
  225. ImageSize: 00023000
  226. fffff802`a0ff0000 fffff802`a0ffe000 MpKslc7de30d
  227. Timestamp: unavailable (00000000)
  228. Checksum: 00000000
  229. ImageSize: 0000E000
  230. fffff802`a1000000 fffff802`a103d000 WUDFRd.sys
  231. Timestamp: unavailable (00000000)
  232. Checksum: 00000000
  233. ImageSize: 0003D000
  234. fffff802`a0fc0000 fffff802`a0ffd000 WUDFRd.sys
  235. Timestamp: unavailable (00000000)
  236. Checksum: 00000000
  237. ImageSize: 0003D000
  238. fffff802`a0f80000 fffff802`a0fbd000 WUDFRd.sys
  239. Timestamp: unavailable (00000000)
  240. Checksum: 00000000
  241. ImageSize: 0003D000
  242. fffff802`a0f40000 fffff802`a0f7d000 WUDFRd.sys
  243. Timestamp: unavailable (00000000)
  244. Checksum: 00000000
  245. ImageSize: 0003D000
  246. fffff802`a0ee0000 fffff802`a0f1d000 WUDFRd.sys
  247. Timestamp: unavailable (00000000)
  248. Checksum: 00000000
  249. ImageSize: 0003D000
  250. fffff802`a0ea0000 fffff802`a0edd000 WUDFRd.sys
  251. Timestamp: unavailable (00000000)
  252. Checksum: 00000000
  253. ImageSize: 0003D000
  254. fffff802`a0e60000 fffff802`a0e9d000 WUDFRd.sys
  255. Timestamp: unavailable (00000000)
  256. Checksum: 00000000
  257. ImageSize: 0003D000
  258. fffff80f`98df0000 fffff80f`98dfb000 cldflt.sys
  259. Timestamp: unavailable (00000000)
  260. Checksum: 00000000
  261. ImageSize: 0000B000
  262. fffff80f`989a0000 fffff80f`989bc000 EhStorClass.
  263. Timestamp: unavailable (00000000)
  264. Checksum: 00000000
  265. ImageSize: 0001C000
  266. fffff80f`98910000 fffff80f`9892c000 EhStorClass.
  267. Timestamp: unavailable (00000000)
  268. Checksum: 00000000
  269. ImageSize: 0001C000
  270. fffff80f`988f0000 fffff80f`9890c000 EhStorClass.
  271. Timestamp: unavailable (00000000)
  272. Checksum: 00000000
  273. ImageSize: 0001C000
  274. fffff80f`988d0000 fffff80f`988ec000 EhStorClass.
  275. Timestamp: unavailable (00000000)
  276. Checksum: 00000000
  277. ImageSize: 0001C000
  278. fffff80f`988b0000 fffff80f`988cc000 EhStorClass.
  279. Timestamp: unavailable (00000000)
  280. Checksum: 00000000
  281. ImageSize: 0001C000
  282. fffff80f`976c0000 fffff80f`976cf000 dump_storpor
  283. Timestamp: unavailable (00000000)
  284. Checksum: 00000000
  285. ImageSize: 0000F000
  286. fffff80f`97740000 fffff80f`977af000 dump_ahcix64
  287. Timestamp: unavailable (00000000)
  288. Checksum: 00000000
  289. ImageSize: 0006F000
  290. fffff80f`977d0000 fffff80f`977ed000 dump_dumpfve
  291. Timestamp: unavailable (00000000)
  292. Checksum: 00000000
  293. ImageSize: 0001D000
  294. fffff80f`9a9b0000 fffff80f`9a9cc000 EhStorClass.
  295. Timestamp: unavailable (00000000)
  296. Checksum: 00000000
  297. ImageSize: 0001C000
  298. fffff80f`96a20000 fffff80f`96a3c000 EhStorClass.
  299. Timestamp: unavailable (00000000)
  300. Checksum: 00000000
  301. ImageSize: 0001C000
  302. fffff80f`982d0000 fffff80f`982f0000 dam.sys
  303. Timestamp: unavailable (00000000)
  304. Checksum: 00000000
  305. ImageSize: 00020000
  306. fffff80f`96750000 fffff80f`9675f000 WdBoot.sys
  307. Timestamp: unavailable (00000000)
  308. Checksum: 00000000
  309. ImageSize: 0000F000
  310. fffff80f`979d0000 fffff80f`979df000 hwpolicy.sys
  311. Timestamp: unavailable (00000000)
  312. Checksum: 00000000
  313. ImageSize: 0000F000
  314.  
  315. ============================= BIOS INFO ================================
  316. [SMBIOS Data Tables v2.6]
  317. [DMI Version - 0]
  318. [2.0 Calling Convention - No]
  319. [Table Size - 3291 bytes]
  320. [BIOS Information (Type 0) - Length 24 - Handle 0000h]
  321. Vendor American Megatrends Inc.
  322. BIOS Version 5.12
  323. BIOS Starting Address Segment f000
  324. BIOS Release Date 05/21/2010
  325. BIOS ROM Size 100000
  326. BIOS Characteristics
  327. 04: - ISA Supported
  328. 07: - PCI Supported
  329. 09: - Plug and Play Supported
  330. 11: - Upgradeable FLASH BIOS
  331. 12: - BIOS Shadowing Supported
  332. 14: - ESCD Supported
  333. 15: - CD-Boot Supported
  334. 16: - Selectable Boot Supported
  335. 17: - BIOS ROM Socketed
  336. 19: - EDD Supported
  337. 23: - 1.2MB Floppy Supported
  338. 24: - 720KB Floppy Supported
  339. 25: - 2.88MB Floppy Supported
  340. 26: - Print Screen Device Supported
  341. 27: - Keyboard Services Supported
  342. 28: - Serial Services Supported
  343. 29: - Printer Services Supported
  344. 30: - CGA/Mono Services Supported
  345. 32: - BIOS Vendor Reserved
  346. 48: - System Vendor Reserved
  347. BIOS Characteristic Extensions
  348. 00: - ACPI Supported
  349. 01: - USB Legacy Supported
  350. 04: - LS120-Boot Supported
  351. 05: - ATAPI ZIP-Boot Supported
  352. 08: - BIOS Boot Specification Supported
  353. 09: - Fn-Key NET-Boot Supported
  354. 10: - Specification Reserved
  355. BIOS Major Revision 5
  356. BIOS Minor Revision 18
  357. EC Firmware Major Revision 255
  358. EC Firmware Minor Revision 255
  359. [System Information (Type 1) - Length 27 - Handle 0001h]
  360. Manufacturer HP-Pavilion
  361. Product Name AY614AAR-ABA p6347c
  362. Version
  363. UUID 00000000-0000-0000-0000-000000000000
  364. Wakeup Type Power Switch
  365. SKUNumber AY614AAR#ABA
  366. Family 103C_53316J
  367. [BaseBoard Information (Type 2) - Length 15 - Handle 0002h]
  368. Manufacturer FOXCONN
  369. Product ALOE
  370. Version 1.01
  371. Feature Flags 09h
  372. 1750016520: - ?ÿU?ì?ì¡H.bh3Å?Eü3ÀW?}?Eô?Eø?ÿu
  373. ¸@
  374. 1750016560: - ?ÿU?ì?ì¡H.bh3Å?Eü3ÀW?}?Eô?Eø?ÿu
  375. ¸@
  376. Location
  377. Chassis Handle 0003h
  378. Board Type 0ah - Processor/Memory Module
  379. Number of Child Handles 0
  380. [System Enclosure (Type 3) - Length 21 - Handle 0003h]
  381. Manufacturer Hewlett-Packard
  382. Chassis Type Desktop
  383. Version
  384. Bootup State Safe
  385. Power Supply State Safe
  386. Thermal State Safe
  387. Security Status None
  388. OEM Defined 0
  389. Height 0U
  390. Number of Power Cords 1
  391. Number of Contained Elements 0
  392. Contained Element Size 0
  393. [Processor Information (Type 4) - Length 42 - Handle 0004h]
  394. Socket Designation CPU 1
  395. Processor Type Central Processor
  396. Processor Family edh - Specification Reserved
  397. Processor Manufacturer AMD
  398. Processor ID 520f1000fffb8b17
  399. Processor Version AMD Athlon(tm) II X4 630 Processor
  400. Processor Voltage 8fh - 1.5V
  401. External Clock 200MHz
  402. Max Speed 2800MHz
  403. Current Speed 2800MHz
  404. Status Enabled Populated
  405. Processor Upgrade Other
  406. L1 Cache Handle 0005h
  407. L2 Cache Handle 0006h
  408. L3 Cache Handle 0007h
  409. Part Number
  410. [Cache Information (Type 7) - Length 19 - Handle 0005h]
  411. Socket Designation L1-Cache
  412. Cache Configuration 0280h - Varies Enabled Int NonSocketed L1
  413. Maximum Cache Size 0200h - 512K
  414. Installed Size 0200h - 512K
  415. Supported SRAM Type 0010h - Pipeline-Burst
  416. Current SRAM Type 0010h - Pipeline-Burst
  417. Cache Speed 0ns
  418. Error Correction Type Multi-Bit ECC
  419. System Cache Type Specification Reserved
  420. Associativity 4-way Set-Associative
  421. [Cache Information (Type 7) - Length 19 - Handle 0006h]
  422. Socket Designation L2-Cache
  423. Cache Configuration 0281h - Varies Enabled Int NonSocketed L2
  424. Maximum Cache Size 0800h - 2048K
  425. Installed Size 0800h - 2048K
  426. Supported SRAM Type 0010h - Pipeline-Burst
  427. Current SRAM Type 0010h - Pipeline-Burst
  428. Cache Speed 0ns
  429. Error Correction Type Multi-Bit ECC
  430. System Cache Type Specification Reserved
  431. Associativity 4-way Set-Associative
  432. [Cache Information (Type 7) - Length 19 - Handle 0007h]
  433. Socket Designation L3-Cache
  434. Cache Configuration 0302h - Unknown Disabled Int NonSocketed L3
  435. Maximum Cache Size 0000h - 0K
  436. Installed Size 0000h - 0K
  437. Supported SRAM Type 0002h - Unknown
  438. Current SRAM Type 0002h - Unknown
  439. Cache Speed 0ns
  440. Error Correction Type Unknown
  441. System Cache Type Unknown
  442. Associativity Unknown
  443. [OEM Strings (Type 11) - Length 5 - Handle 000dh]
  444. Number of Strings 32
  445. 1 bid=A1NAv6PrA3;PROD_MSWORKS;SFCHK;DLED;IS.N60d;ACPwrFail=Off;Cha
  446. 2 n=Refurb;CPUFan=On;DVDRW;LegacyFloppy=No;TVout=NTSC;PCBRAND=Pavi
  447. 3 lion;OS=MSV;LScribe;DVDP_STD;Vos.P;PROD_MSOFFHST;FPA=HM;C_VEN2;C
  448. 4 DS_D;SW_Main;.B2;##HPCPC=00000000<900000060200000004200002535141
  449. 5 30040000010001000;5;:0665<;85>18>1<2=1:<55>?4;;=?=19:<8494;>:801
  450. 6 1<=31953=?76?>378139;594701:=;34:;55;9128<7937==0<722<:<1:2489>:
  451. 7 088=6:?1;2>8=8>12691>>286:9?;4454>3<3>89909>=738375;02951<;>=??2
  452. 8 ?70>75;04<815:33<20846?312127;?24876>7488457<0;0?39>9;?407;8;8;0
  453. 9 9>=;==>231>;?456:100000006;00000000002000840515?454=435<49434=23
  454. 10 405347594>444?47535021000200000000000000000000000000000000000176
  455. 11 0:<4;1?6??6:=:30393:=<:8>0733583=1;7=7:?6417;:83==335:93?179=82=
  456. 12 3<6<7:36018=:=05>2<7:76>9><?3=?3326<44;;515?5:05223?9=731563>:5>
  457. 13 :>:3?;752183168?<4641;15?1?:6;<46:36<39?682>03534:144>:?44867648
  458. 14 =32?5=6=56:3246?<8338;8?=?=<2:3?3<237?=6>8;=91=3;>??;>?0;<37=
  459. 15
  460. 16
  461. 17
  462. 18
  463. 19
  464. 20
  465. 21
  466. 22
  467. 23
  468. 24
  469. 25
  470. 26
  471. 27
  472. 28
  473. 29
  474. 30
  475. 31
  476. 32
  477. [Physical Memory Array (Type 16) - Length 15 - Handle 0010h]
  478. Location 03h - SystemBoard/Motherboard
  479. Use 03h - System Memory
  480. Memory Error Correction 03h - None
  481. Maximum Capacity 16777216KB
  482. Number of Memory Devices 4
  483. [Memory Array Mapped Address (Type 19) - Length 15 - Handle 0011h]
  484. Starting Address 00000000h
  485. Ending Address 0103ffffh
  486. Memory Array Handle 0010h
  487. Partition Width 01
  488. [Memory Device (Type 17) - Length 28 - Handle 0012h]
  489. Physical Memory Array Handle 0010h
  490. Total Width 64 bits
  491. Data Width 64 bits
  492. Size 4096MB
  493. Form Factor 09h - DIMM
  494. Device Locator DIMM1
  495. Bank Locator BANK0
  496. Memory Type 18h - Specification Reserved
  497. Type Detail 0080h - Synchronous
  498. Speed 1066MHz
  499. Manufacturer Manufacturer00
  500. Part Number CT51264BD160B.C16F
  501. [Memory Device (Type 17) - Length 28 - Handle 0013h]
  502. Physical Memory Array Handle 0010h
  503. Total Width 64 bits
  504. Data Width 64 bits
  505. Size 4096MB
  506. Form Factor 09h - DIMM
  507. Device Locator DIMM2
  508. Bank Locator BANK1
  509. Memory Type 18h - Specification Reserved
  510. Type Detail 0080h - Synchronous
  511. Speed 1066MHz
  512. Manufacturer Manufacturer01
  513. Part Number CT51264BD160B.C16F
  514. [Memory Device (Type 17) - Length 28 - Handle 0014h]
  515. Physical Memory Array Handle 0010h
  516. Total Width 64 bits
  517. Data Width 64 bits
  518. Size 4096MB
  519. Form Factor 09h - DIMM
  520. Device Locator DIMM3
  521. Bank Locator BANK2
  522. Memory Type 18h - Specification Reserved
  523. Type Detail 0080h - Synchronous
  524. Speed 1066MHz
  525. Manufacturer Manufacturer02
  526. Part Number CT51264BD160B.C16F
  527. [Memory Device (Type 17) - Length 28 - Handle 0015h]
  528. Physical Memory Array Handle 0010h
  529. Total Width 64 bits
  530. Data Width 64 bits
  531. Size 4096MB
  532. Form Factor 09h - DIMM
  533. Device Locator DIMM4
  534. Bank Locator BANK3
  535. Memory Type 18h - Specification Reserved
  536. Type Detail 0080h - Synchronous
  537. Speed 1066MHz
  538. Manufacturer Manufacturer03
  539. Part Number CT51264BD160B.C16F
  540. bztransmit64.exe
  541.  
  542. ========================================================================
  543. =================== Dump File: 071817-14812-01.dmp ===================
  544. ========================================================================
  545. Mini Kernel Dump File: Only registers and stack trace are available
  546. Windows 10 Kernel Version 15063 MP (4 procs) Free x64
  547. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  548. Built by: 15063.0.amd64fre.rs2_release.170317-1834
  549. Kernel base = 0xfffff800`4fe1b000 PsLoadedModuleList = 0xfffff800`501675e0
  550. Debug session time: Tue Jul 18 23:02:22.178 2017 (UTC - 4:00)
  551. System Uptime: 0 days 6:16:44.608
  552.  
  553. BugCheck 1E, {ffffffffc0000005, fffff805cb3763a5, 0, 7802c6}
  554. Probably caused by : memory_corruption
  555. Followup: memory_corruption
  556.  
  557. KMODE_EXCEPTION_NOT_HANDLED (1e)
  558. This is a very common bugcheck. Usually the exception address pinpoints
  559. the driver/function that caused the problem. Always note this address
  560. as well as the link date of the driver/image that contains this address.
  561.  
  562. Arguments:
  563. Arg1: ffffffffc0000005, The exception code that was not handled
  564. Arg2: fffff805cb3763a5, The address that the exception occurred at
  565. Arg3: 0000000000000000, Parameter 0 of the exception
  566. Arg4: 00000000007802c6, Parameter 1 of the exception
  567.  
  568. Debugging Details:
  569. DUMP_CLASS: 1
  570. DUMP_QUALIFIER: 400
  571. BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
  572. SYSTEM_MANUFACTURER: HP-Pavilion
  573. SYSTEM_PRODUCT_NAME: AY614AAR-ABA p6347c
  574. SYSTEM_SKU: AY614AAR#ABA
  575. BIOS_VENDOR: American Megatrends Inc.
  576. BIOS_VERSION: 5.12
  577. BIOS_DATE: 05/21/2010
  578. BASEBOARD_MANUFACTURER: FOXCONN
  579. BASEBOARD_PRODUCT: ALOE
  580. BASEBOARD_VERSION: 1.01
  581. DUMP_TYPE: 2
  582. READ_ADDRESS: fffff800501fc358: Unable to get MiVisibleState
  583. 00000000007802c6
  584. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  585. FAULTING_IP:
  586. NTFS!NtfsFindPrefixHashEntry+215
  587. fffff805`cb3763a5 0fb78678020000 movzx eax,word ptr [rsi+278h]
  588. EXCEPTION_PARAMETER2: 00000000007802c6
  589. BUGCHECK_STR: 0x1E_c0000005_R
  590. CPU_COUNT: 4
  591. CPU_MHZ: af0
  592. CPU_VENDOR: AuthenticAMD
  593. CPU_FAMILY: 10
  594. CPU_MODEL: 5
  595. CPU_STEPPING: 2
  596. CUSTOMER_CRASH_COUNT: 1
  597. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  598.  
  599. PROCESS_NAME: bzfilelist.exe
  600.  
  601. CURRENT_IRQL: 0
  602. EXCEPTION_RECORD: ffff80008f629910 -- (.exr 0xffff80008f629910)
  603. ExceptionAddress: 00000000007802c6
  604. ExceptionCode: 00000002
  605. ExceptionFlags: 00000000
  606. NumberParameters: 0
  607. TRAP_FRAME: ffff800000000000 -- (.trap 0xffff800000000000)
  608. Unable to read trap frame at ffff8000`00000000
  609. LAST_CONTROL_TRANSFER: from fffff8004fe45b7c to fffff8004ff874c0
  610. STACK_TEXT:
  611. ffff8000`8f629108 fffff800`4fe45b7c : 00000000`0000001e ffffffff`c0000005 fffff805`cb3763a5 00000000`00000000 : nt!KeBugCheckEx
  612. ffff8000`8f629110 fffff800`4ff9298e : ffff8000`8f629910 ffffd988`00000000 ffff8000`00000000 ffff8000`8f629800 : nt!KiDispatchException+0x23c
  613. ffff8000`8f6297c0 fffff800`4ff90e57 : 00000000`00000000 ffff8000`902876c0 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xce
  614. ffff8000`8f6299a0 fffff805`cb3763a5 : ffffc781`bd5a5180 ffffd988`00000000 ffffc781`00000001 ffffc781`bd5a6528 : nt!KiPageFault+0x217
  615. ffff8000`8f629b30 fffff805`cb3770ab : ffffc781`cdfbcb98 ffffc781`bd5a6528 ffffd988`8e311b40 fffff800`4fe7c901 : NTFS!NtfsFindPrefixHashEntry+0x215
  616. ffff8000`8f629c50 fffff805`cb377ff7 : ffffc781`cdfbcb98 ffffc781`c0e85a60 00000000`00000000 ffff8000`8f629e80 : NTFS!NtfsFindStartingNode+0x2cb
  617. ffff8000`8f629d10 fffff805`cb376d9d : ffffc781`cdfbcb98 ffffc781`c0e85a60 ffff8000`90287330 ffffc781`c83ba700 : NTFS!NtfsCommonCreate+0x487
  618. ffff8000`8f629f50 fffff800`4ff8a377 : ffff8000`902872c0 ffffc781`d04f7440 ffff8000`8f629fd0 ffffc781`d0e10080 : NTFS!NtfsCommonCreateCallout+0x1d
  619. ffff8000`8f629f80 fffff800`4ff8a33d : 00000000`00000012 ffffc781`c83ba7c0 ffff8000`8f62a000 fffff800`4fe314ac : nt!KxSwitchKernelStackCallout+0x27
  620. ffff8000`902870e0 fffff800`4fe314ac : 00000000`00000012 00000000`00000000 00000000`00000000 00000000`00000006 : nt!KiSwitchKernelStackContinue
  621. ffff8000`90287100 fffff800`4fe312ee : 00000000`00000005 00000000`00006000 00000000`00000000 ffff8000`90287180 : nt!KiExpandKernelStackAndCalloutOnStackSegment+0x12c
  622. ffff8000`90287180 fffff800`4fe311af : 00000000`00000008 ffff8000`902872c0 00000000`00000001 ffffc781`c0e85a60 : nt!KiExpandKernelStackAndCalloutSwitchStack+0x9e
  623. ffff8000`902871f0 fffff805`cb37b4ab : 00000000`00000000 00000000`00000000 ffffc781`cdfbcb98 ffffc781`c0e85a60 : nt!KeExpandKernelStackAndCalloutInternal+0x2f
  624. ffff8000`90287240 fffff805`c9d8563d : ffffc781`bd5a5030 ffffc781`c0e85a60 ffffc781`c0e85f00 fffff805`c9da6060 : NTFS!NtfsFsdCreate+0x1cb
  625. ffff8000`90287490 fffff805`c9db612b : ffff8000`90287540 ffffc781`c0e85f68 ffff8000`902875c8 00000000`00000011 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x18d
  626. ffff8000`90287500 fffff800`502b2265 : 00000000`00000000 00000000`00000005 ffffc781`bfa47060 ffffc781`00000000 : FLTMGR!FltpCreate+0x2eb
  627. ffff8000`902875b0 fffff800`502bd61b : fffff800`502b1a50 fffff800`502b1a50 ffff8000`00000000 ffffc781`bd574c50 : nt!IopParseDevice+0x815
  628. ffff8000`90287790 fffff800`502c1150 : ffffc781`d0a52000 ffff8000`902879f8 00000000`00000040 ffffc781`bd34ec60 : nt!ObpLookupObjectName+0x46b
  629. ffff8000`90287960 fffff800`502c50ca : ffffc781`00000001 ffffc781`c0f720b0 00000000`0009eeb0 00000000`00000000 : nt!ObOpenObjectByNameEx+0x1e0
  630. ffff8000`90287aa0 fffff800`503143a8 : 00000000`0009e658 20202020`00000000 00000000`0009eeb0 00000000`0009e5f8 : nt!IopCreateFile+0x3aa
  631. ffff8000`90287b40 fffff800`4ff92413 : 00000000`00000334 fffff800`502c0e6b 00000000`00000000 00000000`00000000 : nt!NtOpenFile+0x58
  632. ffff8000`90287bd0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
  633. STACK_COMMAND: kb
  634. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  635. fffff8004fe314e7 - nt!KiExpandKernelStackAndCalloutOnStackSegment+167
  636. [ f6:c3 ]
  637. fffff8004fe31517 - nt!KiExpandKernelStackAndCalloutOnStackSegment+197 (+0x30)
  638. [ fa:95 ]
  639. fffff8004fe3156b - nt!KiExpandKernelStackAndCalloutOnStackSegment+1eb (+0x54)
  640. [ fa:95 ]
  641. fffff8004fea8d28 - nt!MiResolvePageTablePage+3b8 (+0x777bd)
  642. [ f6:c3 ]
  643. fffff8004fea8d48-fffff8004fea8d4c 5 bytes - nt!MiResolvePageTablePage+3d8 (+0x20)
  644. [ df be 7d fb f6:7f f8 f0 e1 c3 ]
  645. fffff8005009b383-fffff8005009b385 3 bytes - nt!ExFreePoolWithTag+363
  646. [ 40 fb f6:c0 e1 c3 ]
  647. 12 errors : !nt (fffff8004fe314e7-fffff8005009b385)
  648. MODULE_NAME: memory_corruption
  649.  
  650. IMAGE_NAME: memory_corruption
  651.  
  652. FOLLOWUP_NAME: memory_corruption
  653. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  654. MEMORY_CORRUPTOR: LARGE
  655. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  656. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  657. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  658. TARGET_TIME: 2017-07-19T03:02:22.000Z
  659. OSBUILD: 15063
  660. OSSERVICEPACK: 483
  661. SERVICEPACK_NUMBER: 0
  662. OS_REVISION: 0
  663. SUITE_MASK: 784
  664. PRODUCT_TYPE: 1
  665. OSPLATFORM_TYPE: x64
  666. OSNAME: Windows 10
  667. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  668. USER_LCID: 0
  669. OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
  670. BUILDDATESTAMP_STR: 160101.0800
  671. BUILDLAB_STR: WinBuild
  672. BUILDOSVER_STR: 10.0.15063.483
  673. ANALYSIS_SESSION_ELAPSED_TIME: 2b0c
  674. ANALYSIS_SOURCE: KM
  675. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  676. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  677. Followup: memory_corruption
  678.  
  679. ========================================================================
  680. =================== Dump File: 071917-15500-01.dmp ===================
  681. ========================================================================
  682. Mini Kernel Dump File: Only registers and stack trace are available
  683. Windows 10 Kernel Version 15063 MP (4 procs) Free x64
  684. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  685. Built by: 15063.0.amd64fre.rs2_release.170317-1834
  686. Kernel base = 0xfffff802`2a493000 PsLoadedModuleList = 0xfffff802`2a7df5e0
  687. Debug session time: Wed Jul 19 18:33:59.219 2017 (UTC - 4:00)
  688. System Uptime: 0 days 19:28:23.970
  689.  
  690. BugCheck 50, {ffff95a20903b020, 0, fffff8022a60a2dd, 2}
  691. Could not read faulting driver name
  692. *** WARNING: Unable to verify timestamp for win32k.sys
  693. *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
  694. Probably caused by : memory_corruption
  695. Followup: memory_corruption
  696.  
  697. PAGE_FAULT_IN_NONPAGED_AREA (50)
  698. Invalid system memory was referenced. This cannot be protected by try-except.
  699. Typically the address is just plain bad or it is pointing at freed memory.
  700.  
  701. Arguments:
  702. Arg1: ffff95a20903b020, memory referenced.
  703. Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
  704. Arg3: fffff8022a60a2dd, If non-zero, the instruction address which referenced the bad memory
  705. address.
  706. Arg4: 0000000000000002, (reserved)
  707.  
  708. Debugging Details:
  709. Could not read faulting driver name
  710. DUMP_CLASS: 1
  711. DUMP_QUALIFIER: 400
  712. BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
  713. SYSTEM_MANUFACTURER: HP-Pavilion
  714. SYSTEM_PRODUCT_NAME: AY614AAR-ABA p6347c
  715. SYSTEM_SKU: AY614AAR#ABA
  716. BIOS_VENDOR: American Megatrends Inc.
  717. BIOS_VERSION: 5.12
  718. BIOS_DATE: 05/21/2010
  719. BASEBOARD_MANUFACTURER: FOXCONN
  720. BASEBOARD_PRODUCT: ALOE
  721. BASEBOARD_VERSION: 1.01
  722. DUMP_TYPE: 2
  723. READ_ADDRESS: fffff8022a874358: Unable to get MiVisibleState
  724. ffff95a20903b020
  725. FAULTING_IP:
  726. nt!KiSystemServiceRepeat+39
  727. fffff802`2a60a2dd 4d631c82 movsxd r11,dword ptr [r10+rax*4]
  728. MM_INTERNAL_CODE: 2
  729. CPU_COUNT: 4
  730. CPU_MHZ: af0
  731. CPU_VENDOR: AuthenticAMD
  732. CPU_FAMILY: 10
  733. CPU_MODEL: 5
  734. CPU_STEPPING: 2
  735. CUSTOMER_CRASH_COUNT: 1
  736. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  737. BUGCHECK_STR: AV
  738.  
  739. PROCESS_NAME: bzserv.exe
  740.  
  741. CURRENT_IRQL: 0
  742. TRAP_FRAME: ffffc100ea80fab0 -- (.trap 0xffffc100ea80fab0)
  743. NOTE: The trap frame does not contain all registers.
  744. Some register values may be zeroed or incorrect.
  745. rax=0000000000000008 rbx=0000000000000000 rcx=0000000000000004
  746. rdx=0000000000000008 rsi=0000000000000000 rdi=0000000000000000
  747. rip=fffff8022a60a2dd rsp=ffffc100ea80fc40 rbp=ffffc100ea80fcc0
  748. r8=0000000000000001 r9=0000000000000006 r10=ffff95a20903b000
  749. r11=fffff8022a875500 r12=0000000000000000 r13=0000000000000000
  750. r14=0000000000000000 r15=0000000000000000
  751. iopl=0 nv up ei ng nz ac po cy
  752. nt!KiSystemServiceRepeat+0x39:
  753. fffff802`2a60a2dd 4d631c82 movsxd r11,dword ptr [r10+rax*4] ds:ffff95a2`0903b020=????????
  754. Resetting default scope
  755. LAST_CONTROL_TRANSFER: from fffff8022a634fb4 to fffff8022a5ff4c0
  756. STACK_TEXT:
  757. ffffc100`ea80f818 fffff802`2a634fb4 : 00000000`00000050 ffff95a2`0903b020 00000000`00000000 ffffc100`ea80fab0 : nt!KeBugCheckEx
  758. ffffc100`ea80f820 fffff802`2a5202d6 : 00000000`00000000 ffff95a2`0903b020 ffffc100`ea80fab0 ffffe68a`164fb700 : nt!MiSystemFault+0x116e84
  759. ffffc100`ea80f8c0 fffff802`2a608d72 : 00000000`002af001 fffff802`2a4f3b42 00000000`746c6644 00000000`00000000 : nt!MmAccessFault+0xae6
  760. ffffc100`ea80fab0 fffff802`2a60a2dd : ffffe68a`1599b300 00000000`00d8ea40 ffffe68a`1599b300 00000000`002af000 : nt!KiPageFault+0x132
  761. ffffc100`ea80fc40 00000000`6b1f1924 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceRepeat+0x39
  762. 00000000`00d8ea48 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x6b1f1924
  763. STACK_COMMAND: kb
  764. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  765. fffff8022a5203af-fffff8022a5203b0 2 bytes - nt!MmAccessFault+bbf
  766. [ 80 f6:00 8b ]
  767. fffff8022a634fd8-fffff8022a634fd9 2 bytes - nt!MiValidFault+1160f8 (+0x114c29)
  768. [ ff f6:7f 8b ]
  769. 4 errors : !nt (fffff8022a5203af-fffff8022a634fd9)
  770. MODULE_NAME: memory_corruption
  771.  
  772. IMAGE_NAME: memory_corruption
  773.  
  774. FOLLOWUP_NAME: memory_corruption
  775. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  776. MEMORY_CORRUPTOR: LARGE
  777. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  778. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  779. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  780. TARGET_TIME: 2017-07-19T22:33:59.000Z
  781. OSBUILD: 15063
  782. OSSERVICEPACK: 483
  783. SERVICEPACK_NUMBER: 0
  784. OS_REVISION: 0
  785. SUITE_MASK: 784
  786. PRODUCT_TYPE: 1
  787. OSPLATFORM_TYPE: x64
  788. OSNAME: Windows 10
  789. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  790. USER_LCID: 0
  791. OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
  792. BUILDDATESTAMP_STR: 160101.0800
  793. BUILDLAB_STR: WinBuild
  794. BUILDOSVER_STR: 10.0.15063.483
  795. ANALYSIS_SESSION_ELAPSED_TIME: 2b5a
  796. ANALYSIS_SOURCE: KM
  797. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  798. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  799. Followup: memory_corruption
  800.  
  801. ========================================================================
  802. =================== Dump File: 072117-12468-01.dmp ===================
  803. ========================================================================
  804. Mini Kernel Dump File: Only registers and stack trace are available
  805. Windows 10 Kernel Version 15063 MP (4 procs) Free x64
  806. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  807. Built by: 15063.0.amd64fre.rs2_release.170317-1834
  808. Kernel base = 0xfffff801`fd409000 PsLoadedModuleList = 0xfffff801`fd7555e0
  809. Debug session time: Fri Jul 21 12:18:54.413 2017 (UTC - 4:00)
  810. System Uptime: 1 days 7:25:15.166
  811.  
  812. BugCheck 4E, {2, 33b8ab, 41ffff, 1}
  813. *** WARNING: Unable to verify timestamp for win32k.sys
  814. *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
  815. Probably caused by : memory_corruption
  816. Followup: memory_corruption
  817.  
  818. PFN_LIST_CORRUPT (4e)
  819. Typically caused by drivers passing bad memory descriptor lists (ie: calling
  820. MmUnlockPages twice with the same list, etc). If a kernel debugger is
  821. available get the stack trace.
  822.  
  823. Arguments:
  824. Arg1: 0000000000000002, A list entry was corrupt
  825. Arg2: 000000000033b8ab, entry in list being removed
  826. Arg3: 000000000041ffff, highest physical page number
  827. Arg4: 0000000000000001, reference count of entry being removed
  828.  
  829. Debugging Details:
  830. DUMP_CLASS: 1
  831. DUMP_QUALIFIER: 400
  832. BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
  833. SYSTEM_MANUFACTURER: HP-Pavilion
  834. SYSTEM_PRODUCT_NAME: AY614AAR-ABA p6347c
  835. SYSTEM_SKU: AY614AAR#ABA
  836. BIOS_VENDOR: American Megatrends Inc.
  837. BIOS_VERSION: 5.12
  838. BIOS_DATE: 05/21/2010
  839. BASEBOARD_MANUFACTURER: FOXCONN
  840. BASEBOARD_PRODUCT: ALOE
  841. BASEBOARD_VERSION: 1.01
  842. DUMP_TYPE: 2
  843. BUGCHECK_STR: 0x4E_2
  844. CPU_COUNT: 4
  845. CPU_MHZ: af0
  846. CPU_VENDOR: AuthenticAMD
  847. CPU_FAMILY: 10
  848. CPU_MODEL: 5
  849. CPU_STEPPING: 2
  850. CUSTOMER_CRASH_COUNT: 1
  851. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  852.  
  853. PROCESS_NAME: bztransmit64.exe
  854.  
  855. CURRENT_IRQL: 2
  856. LAST_CONTROL_TRANSFER: from fffff801fd5af49b to fffff801fd5754c0
  857. STACK_TEXT:
  858. ffffe781`42ca5758 fffff801`fd5af49b : 00000000`0000004e 00000000`00000002 00000000`0033b8ab 00000000`0041ffff : nt!KeBugCheckEx
  859. ffffe781`42ca5760 fffff801`fd4a202c : ffff8f82`a9142690 fffff800`00000000 00000000`00000000 ffff8f82`a9142690 : nt!MiUnlinkPageFromList+0x10c8cb
  860. ffffe781`42ca5800 fffff801`fd497a38 : 00000000`4a5cb340 ffffc080`00252e58 ffffc181`c2a23e70 ffff8f82`a2da7580 : nt!MiResolveTransitionFault+0x16c
  861. ffffe781`42ca58d0 fffff801`fd495e63 : 80000003`3b8ab830 00000000`4a5cb340 ffffe781`42ca5bb0 00000000`00000000 : nt!MiDispatchFault+0xc88
  862. ffffe781`42ca5a50 fffff801`fd57ed72 : ffff8f82`a236f080 00000000`00000000 00000000`00000000 00000000`02c26d20 : nt!MmAccessFault+0x673
  863. ffffe781`42ca5c40 00000001`40183d86 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x132
  864. 00000000`009fea30 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00000001`40183d86
  865. STACK_COMMAND: kb
  866. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  867. fffff801fd497ac7-fffff801fd497ac8 2 bytes - nt!MiDispatchFault+d17
  868. [ 80 fa:00 fb ]
  869. fffff801fd4a211a - nt!MiResolveTransitionFault+25a (+0xa653)
  870. [ f6:c0 ]
  871. 3 errors : !nt (fffff801fd497ac7-fffff801fd4a211a)
  872. MODULE_NAME: memory_corruption
  873.  
  874. IMAGE_NAME: memory_corruption
  875.  
  876. FOLLOWUP_NAME: memory_corruption
  877. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  878. MEMORY_CORRUPTOR: LARGE
  879. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  880. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  881. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  882. TARGET_TIME: 2017-07-21T16:18:54.000Z
  883. OSBUILD: 15063
  884. OSSERVICEPACK: 483
  885. SERVICEPACK_NUMBER: 0
  886. OS_REVISION: 0
  887. SUITE_MASK: 784
  888. PRODUCT_TYPE: 1
  889. OSPLATFORM_TYPE: x64
  890. OSNAME: Windows 10
  891. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  892. USER_LCID: 0
  893. OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
  894. BUILDDATESTAMP_STR: 160101.0800
  895. BUILDLAB_STR: WinBuild
  896. BUILDOSVER_STR: 10.0.15063.483
  897. ANALYSIS_SESSION_ELAPSED_TIME: 3541
  898. ANALYSIS_SOURCE: KM
  899. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  900. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  901. Followup: memory_corruption
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement